ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2103.05292
  4. Cited By
Deep Learning for Android Malware Defenses: a Systematic Literature
  Review

Deep Learning for Android Malware Defenses: a Systematic Literature Review

9 March 2021
Yue Liu
C. Tantithamthavorn
Li Li
Yepang Liu
    AAML
ArXivPDFHTML

Papers citing "Deep Learning for Android Malware Defenses: a Systematic Literature Review"

25 / 25 papers shown
Title
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Mostafa Jafari
Alireza Shameli-Sendi
AAML
21
0
0
14 May 2025
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Ping He
Lorenzo Cavallaro
Shouling Ji
AAML
37
0
0
23 Jan 2025
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response
Dipo Dunsin
M. C. Ghanem
Karim Ouazzane
Vassil T. Vassilev
33
5
0
08 Jan 2025
Protect Your Secrets: Understanding and Measuring Data Exposure in
  VSCode Extensions
Protect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensions
Yue Liu
C. Tantithamthavorn
Li Li
67
0
0
01 Dec 2024
MASKDROID: Robust Android Malware Detection with Masked Graph
  Representations
MASKDROID: Robust Android Malware Detection with Masked Graph Representations
Jingnan Zheng
Jiaohao Liu
An Zhang
Jun Zeng
Ziqi Yang
Zhenkai Liang
Tat-Seng Chua
AAML
33
0
0
29 Sep 2024
PromptSAM+: Malware Detection based on Prompt Segment Anything Model
PromptSAM+: Malware Detection based on Prompt Segment Anything Model
Xingyuan Wei
Yichen Liu
Ce Li
Ning Li
Degang Sun
Yan Wang
VLM
AAML
27
0
0
04 Aug 2024
Investigating White-Box Attacks for On-Device Models
Investigating White-Box Attacks for On-Device Models
M. Zhou
Xiang Gao
Jing Wu
Kui Liu
Hailong Sun
Li Li
AAML
34
9
0
08 Feb 2024
Efficient Query-Based Attack against ML-Based Android Malware Detection
  under Zero Knowledge Setting
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting
Ping He
Yifan Xia
Xuhong Zhang
Shouling Ji
AAML
18
11
0
05 Sep 2023
Large Language Models for Software Engineering: A Systematic Literature
  Review
Large Language Models for Software Engineering: A Systematic Literature Review
Xinying Hou
Yanjie Zhao
Yue Liu
Zhou Yang
Kailong Wang
Li Li
Xiapu Luo
David Lo
John C. Grundy
Haoyu Wang
25
322
0
21 Aug 2023
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing
  Software Vulnerabilities
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities
Michael Fu
C. Tantithamthavorn
Trung Le
Yukinori Kume
Van Nguyen
Dinh Q. Phung
John C. Grundy
32
30
0
26 May 2023
A survey on hardware-based malware detection approaches
A survey on hardware-based malware detection approaches
C. P. Chenet
A. Savino
S. Di Carlo
8
12
0
22 Mar 2023
It Is All About Data: A Survey on the Effects of Data on Adversarial
  Robustness
It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness
Peiyu Xiong
Michael W. Tegegn
Jaskeerat Singh Sarin
Shubhraneel Pal
Julia Rubin
SILM
AAML
32
8
0
17 Mar 2023
PAD: Towards Principled Adversarial Malware Detection Against Evasion
  Attacks
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Deqiang Li
Shicheng Cui
Yun Li
Jia Xu
Fu Xiao
Shouhuai Xu
AAML
38
17
0
22 Feb 2023
Demystifying Hidden Sensitive Operations in Android apps
Demystifying Hidden Sensitive Operations in Android apps
Xiaoyu Sun
Xiao Chen
Li Li
Haipeng Cai
John C. Grundy
Jordan Samhi
Tegawende F. Bissyande
Jacques Klein
21
10
0
20 Oct 2022
Explainable AI for Android Malware Detection: Towards Understanding Why
  the Models Perform So Well?
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?
Yue Liu
C. Tantithamthavorn
Li Li
Yepang Liu
35
29
0
02 Sep 2022
Towards Using Data-Influence Methods to Detect Noisy Samples in Source
  Code Corpora
Towards Using Data-Influence Methods to Detect Noisy Samples in Source Code Corpora
An Dau
Thang Nguyen-Duc
Hoang Thanh-Tung
Nghi D. Q. Bui
TDI
11
4
0
25 May 2022
A two-steps approach to improve the performance of Android malware
  detectors
A two-steps approach to improve the performance of Android malware detectors
N. Daoudi
Kevin Allix
Tegawende F. Bissyande
Jacques Klein
AAML
11
3
0
17 May 2022
Trustworthy Graph Neural Networks: Aspects, Methods and Trends
Trustworthy Graph Neural Networks: Aspects, Methods and Trends
He Zhang
Bang Wu
Xingliang Yuan
Shirui Pan
Hanghang Tong
Jian Pei
41
104
0
16 May 2022
Malceiver: Perceiver with Hierarchical and Multi-modal Features for
  Android Malware Detection
Malceiver: Perceiver with Hierarchical and Multi-modal Features for Android Malware Detection
Niall McLaughlin
23
2
0
12 Apr 2022
Energy-bounded Learning for Robust Models of Code
Nghi D. Q. Bui
Yijun Yu
OODD
30
2
0
20 Dec 2021
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and
  Adversarial Examples in Android Malware Detection?
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Deqiang Li
Tian Qiu
Shuo Chen
Qianmu Li
Shouhuai Xu
AAML
54
11
0
20 Sep 2021
Pre-trained Models for Natural Language Processing: A Survey
Pre-trained Models for Natural Language Processing: A Survey
Xipeng Qiu
Tianxiang Sun
Yige Xu
Yunfan Shao
Ning Dai
Xuanjing Huang
LM&MA
VLM
241
1,450
0
18 Mar 2020
An Introduction to Deep Reinforcement Learning
An Introduction to Deep Reinforcement Learning
Vincent François-Lavet
Peter Henderson
Riashat Islam
Marc G. Bellemare
Joelle Pineau
OffRL
AI4CE
80
1,230
0
30 Nov 2018
Aggregated Residual Transformations for Deep Neural Networks
Aggregated Residual Transformations for Deep Neural Networks
Saining Xie
Ross B. Girshick
Piotr Dollár
Z. Tu
Kaiming He
268
10,214
0
16 Nov 2016
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
256
3,109
0
04 Nov 2016
1