Affiliation:
1. State Key Laboratory of Mathematical Engineering and Advanced Computing
2. College of Information Engineering, Nanjing University of Finance and Economics
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference11 articles.
1. [1] H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, “Structural detection of android malware using embedded call graphs,” Proc. 2013 ACM workshop on Artificial intelligence and security, pp.45-54, ACM, 2013. 10.1145/2517312.2517315
2. [2] G. Lyu, H. Yin, X. Yu, and S. Luo, “A Local Characteristic Image Restoration Based on Convolutional Neural Network,” IEICE Trans. Inf. & Syst., vol.E99-D, no.8, pp.2190-2193, 2016. 10.1587/transinf.2016edl8021
3. [3] S.H. Shin, W.J. Jang, H.W. Yun, et al., “Encoding detection and bit rate classification of AMR-coded speech based on deep neural network,” IEICE Trans. Inf. & Syst., vol.101, 2018,
4. [4] D.I. Shuman, S.K. Narang, P. Frossard, A. Ortega, and P.Vandergheynst, “The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains,” IEEE Signal Process. Mag., vol.30, no.3, pp.83-98, 2013. 10.1109/msp.2012.2235192
5. [5] M. Defferrard, X. Bresson, and P. Vandergheynst, “Convolutional neural networks on graphs with fast localized spectral filtering,” NIPS, pp.3837-3845, 2016.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Similarity-Based Malware Classification Using Graph Neural Networks;Applied Sciences;2022-10-26
2. Advanced Persistent Threat intelligent profiling technique: A survey;Computers and Electrical Engineering;2022-10
3. Malware Detection Based on Term Frequency Analysis of GPRs Features;2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2020-12