ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.04218
  4. Cited By
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection
v1v2v3v4 (latest)

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

10 August 2018
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
    AAML
ArXiv (abs)PDFHTML

Papers citing "Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection"

35 / 35 papers shown
Title
On the Security Risks of ML-based Malware Detection Systems: A Survey
On the Security Risks of ML-based Malware Detection Systems: A Survey
Ping He
Yuhao Mao
Changjiang Li
Lorenzo Cavallaro
Ting Wang
Shouling Ji
270
0
0
16 May 2025
Evaluating the robustness of adversarial defenses in malware detection systems
Evaluating the robustness of adversarial defenses in malware detection systems
Mostafa Jafari
Alireza Shameli-Sendi
AAML
118
1
0
14 May 2025
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection
Shiwen Song
Xiaofei Xie
Ruitao Feng
Qi Guo
Sen Chen
AAML
207
0
0
28 Apr 2025
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Ping He
Lorenzo Cavallaro
R. Beyah
AAML
319
2
0
23 Jan 2025
MASKDROID: Robust Android Malware Detection with Masked Graph
  Representations
MASKDROID: Robust Android Malware Detection with Masked Graph RepresentationsInternational Conference on Automated Software Engineering (ASE), 2024
Jingnan Zheng
Jiaohao Liu
An Zhang
Jun Zeng
Ziqi Yang
Zhenkai Liang
Tat-Seng Chua
AAML
117
5
0
29 Sep 2024
Bayesian Learned Models Can Detect Adversarial Malware For Free
Bayesian Learned Models Can Detect Adversarial Malware For Free
Bao Gia Doan
Dang Quang Nguyen
Paul Montague
Tamas Abraham
O. Vel
S. Çamtepe
S. Kanhere
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
150
1
0
27 Mar 2024
Unraveling the Key of Machine Learning Solutions for Android Malware
  Detection
Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Jiahao Liu
Jun Zeng
Fabio Pierazzi
Lorenzo Cavallaro
Zhenkai Liang
AAML
147
11
0
05 Feb 2024
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with
  Black-box Backdoor Attack
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack
Jiayi Hua
Kailong Wang
Meizhen Wang
Guangdong Bai
Xiapu Luo
Haoyu Wang
AAML
118
8
0
05 Jan 2024
Can you See me? On the Visibility of NOPs against Android Malware
  Detectors
Can you See me? On the Visibility of NOPs against Android Malware Detectors
Diego Soi
Davide Maiorca
Giorgio Giacinto
Harel Berger
AAML
88
1
0
28 Dec 2023
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks
Yuyang Zhou
Guang Cheng
Zongyao Chen
Shui Yu
AAML
309
5
0
11 Dec 2023
Efficient Query-Based Attack against ML-Based Android Malware Detection
  under Zero Knowledge Setting
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge SettingConference on Computer and Communications Security (CCS), 2023
Ping He
Yifan Xia
Xuhong Zhang
R. Beyah
AAML
137
22
0
05 Sep 2023
PAD: Towards Principled Adversarial Malware Detection Against Evasion
  Attacks
PAD: Towards Principled Adversarial Malware Detection Against Evasion AttacksIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Deqiang Li
Shicheng Cui
Yun Li
Jia Xu
Fu Xiao
Shouhuai Xu
AAML
243
24
0
22 Feb 2023
Problem-Space Evasion Attacks in the Android OS: a Survey
Problem-Space Evasion Attacks in the Android OS: a Survey
Harel Berger
Chen Hajaj
A. Dvir
230
2
0
29 May 2022
Evaluating Membership Inference Through Adversarial Robustness
Evaluating Membership Inference Through Adversarial RobustnessComputer/law journal (JITPL), 2022
Zhaoxi Zhang
L. Zhang
Xufei Zheng
Bilal Hussain Abbasi
Shengshan Hu
AAML
160
19
0
14 May 2022
Do You Think You Can Hold Me? The Real Challenge of Problem-Space
  Evasion Attacks
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Harel Berger
A. Dvir
Chen Hajaj
Rony Ronen
AAML
174
3
0
09 May 2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Adversarial Patterns: Building Robust Android Malware ClassifiersACM Computing Surveys (ACM CSUR), 2022
Dipkamal Bhusal
Nidhi Rastogi
AAML
251
4
0
04 Mar 2022
MaMaDroid2.0 -- The Holes of Control Flow Graphs
MaMaDroid2.0 -- The Holes of Control Flow Graphs
Harel Berger
Chen Hajaj
Enrico Mariconti
A. Dvir
131
4
0
28 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware DetectionComputers & security (Comput. Secur.), 2022
Aqib Rashid
Jose Such
AAML
367
10
0
15 Feb 2022
FAAG: Fast Adversarial Audio Generation through Interactive Attack
  Optimisation
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation
Yuantian Miao
Chao Chen
Lei Pan
Jun Zhang
Yang Xiang
AAML
154
4
0
11 Feb 2022
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box
  Android Malware Detection
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection
Hamid Bostani
Veelasha Moonsamy
AAML
298
71
0
07 Oct 2021
Brief View and Analysis to Latest Android Security Issues and Approaches
Brief View and Analysis to Latest Android Security Issues and Approaches
Ruicong Huang
AAML
53
1
0
02 Sep 2021
HomDroid: Detecting Android Covert Malware by Social-Network Homophily
  Analysis
HomDroid: Detecting Android Covert Malware by Social-Network Homophily AnalysisInternational Symposium on Software Testing and Analysis (ISSTA), 2021
Yueming Wu
Deqing Zou
Wei Yang
Xiang Li
Hai Jin
69
22
0
10 Jul 2021
Information flow based defensive chain for data leakage detection and
  prevention: a survey
Information flow based defensive chain for data leakage detection and prevention: a survey
Ning Xi
Chao Chen
Jun Zhang
Cong Sun
Shigang Liu
Pengbin Feng
Jianfeng Ma
206
0
0
09 Jun 2021
Resilient and Adaptive Framework for Large Scale Android Malware
  Fingerprinting using Deep Learning and NLP Techniques
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques
E. Karbab
M. Debbabi
AAML
79
5
0
27 May 2021
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural
  Network: A Survey
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey
Xiaoyu Zhang
Chao Chen
Yi Xie
Xiaofeng Chen
Jun Zhang
Yang Xiang
FedML
94
7
0
13 May 2021
Metamorphic Detection of Repackaged Malware
Metamorphic Detection of Repackaged MalwareInternational Workshop on Metamorphic Testing (IWMT), 2021
S. Singh
Gail E. Kaiser
75
9
0
27 Apr 2021
Deep Learning for Android Malware Defenses: a Systematic Literature
  Review
Deep Learning for Android Malware Defenses: a Systematic Literature ReviewACM Computing Surveys (CSUR), 2021
Yue Liu
Chakkrit Tantithamthavorn
Li Li
Yepang Liu
AAML
226
98
0
09 Mar 2021
I Want My App That Way: Reclaiming Sovereignty Over Personal Devices
I Want My App That Way: Reclaiming Sovereignty Over Personal Devices
Konrad Kollnig
Siddhartha Datta
Max Van Kleek
114
29
0
23 Feb 2021
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware
  Detection
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Deqiang Li
Qianmu Li
AAML
154
143
0
30 Jun 2020
Arms Race in Adversarial Malware Detection: A Survey
Arms Race in Adversarial Malware Detection: A Survey
Deqiang Li
Qianmu Li
Yanfang Ye
Shouhuai Xu
AAML
210
55
0
24 May 2020
A Performance-Sensitive Malware Detection System Using Deep Learning on
  Mobile Devices
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
Ruitao Feng
Sen Chen
Xiaofei Xie
Guozhu Meng
Shang-Wei Lin
Yang Liu
157
119
0
11 May 2020
When the Guard failed the Droid: A case study of Android malware
When the Guard failed the Droid: A case study of Android malware
Harel Berger
Chen Hajaj
A. Dvir
AAML
90
7
0
31 Mar 2020
Droidetec: Android Malware Detection and Malicious Code Localization
  through Deep Learning
Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning
Zhuo Ma
Haoran Ge
Zhuzhu Wang
Yang Liu
Ximeng Liu
133
41
0
10 Feb 2020
Don't Pick the Cherry: An Evaluation Methodology for Android Malware
  Detection Methods
Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods
Aleieldin Salem
Sebastian Banescu
A. Pretschner
91
10
0
25 Mar 2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via
  Adversarial Examples
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
Derui Wang
Chaoran Li
S. Wen
Qing-Long Han
Surya Nepal
Xiangyu Zhang
Yang Xiang
AAML
203
43
0
06 Feb 2019
1