2020
DOI: 10.1016/j.adhoc.2020.102098
|View full text |Cite
|
Sign up to set email alerts
|

End-to-end malware detection for android IoT devices using deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 108 publications
(44 citation statements)
references
References 6 publications
0
38
0
Order By: Relevance
“…In the data set containing 8K benign application and 8K malicious application, the DexCNN method can achieve 93.4% detection accuracy, and the DexCRNN method can achieve 95.8% detection accuracy. Simultaneously, both methods are not limited by the input file's size, do not need artificial feature engineering, and low resource consumption [23].…”
Section: A Malware Detection Using Deep Learning Based On Static Anamentioning
confidence: 99%
See 1 more Smart Citation
“…In the data set containing 8K benign application and 8K malicious application, the DexCNN method can achieve 93.4% detection accuracy, and the DexCRNN method can achieve 95.8% detection accuracy. Simultaneously, both methods are not limited by the input file's size, do not need artificial feature engineering, and low resource consumption [23].…”
Section: A Malware Detection Using Deep Learning Based On Static Anamentioning
confidence: 99%
“…In these papers, many detection models use a combination of various deep learning models for detection, such as CNN + LSTM [23], DAE + CNN [17], RNN + CNN [28]. Compared with the model using a deep learning model, the hybrid detection model can also achieve satisfactory results.…”
Section: Research Status Analysismentioning
confidence: 99%
“…These features were then used for complex pattern and feature recogni-tion. Ren et al [6] used an end-to-end architecture to build deep learning models and characterize Android applications. Kolosnjaji et al [18] proposed the classification of malware system call sequences using convolution and recurrent network layers, in which the convolutional layer is used for feature extraction.…”
Section: Related Workmentioning
confidence: 99%
“…Mclaug et al [7] used the opcode call sequence as a feature input into the model. Ren et al [6] resampled the original bytecode of the Android application classes.dex file as an end-to-end Android malware detection method based on deep learning. The comparison of the methods shows that the proposed algorithm is superior over the previous research methods.…”
Section: ) Effect Of Test Set Distribution On Model Performancementioning
confidence: 99%
See 1 more Smart Citation