Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference43 articles.
1. Wermke D, Huaman N, Acar Y, Reaves B, Traynor P, Fahl S. A large scale investigation of obfuscation use in google play. In: Proceedings of the 34th annual computer security applications conference; 2018, p. 222–35.
2. Understanding android obfuscation techniques: A large-scale investigation in the wild;Dong,2018
3. Linares-Vásquez M, Holtzhauer A, Bernal-Cárdenas C, Poshyvanyk D. Revisiting android reuse studies in the context of code obfuscation and library usages. In: Proceedings of the 11th working conference on mining software repositories; 2014, p. 242–51.
4. AndrODet: An adaptive android obfuscation detector;Mirzaei;Future Gener Comput Syst,2019
5. Who changed you? Obfuscator identification for android;Wang,2017
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献