期刊文献+
共找到10,305篇文章
< 1 2 250 >
每页显示 20 50 100
BArcherFuzzer:An Android System Services Fuzzier via Transaction Dependencies of BpBinder
1
作者 Jiawei Qin Hua Zhang +3 位作者 Hanbing Yan Tian Zhu Song Hu Dingyu Yan 《Intelligent Automation & Soft Computing》 2024年第3期527-544,共18页
By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The ... By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage.In this paper,we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy.Based on the above method,we implement a detection tool-BArcherFuzzer to detect vulnerabilities of Android native system services.The experiment results show that BArcherFuzzer found four vulnerabilities of hundreds of exception messages,all of them were confirmed by Google and one was assigned a Common Vulnerabilities and Exposures(CVE)number(CVE-2020-0363). 展开更多
关键词 android OS vulnerability detection BINDER fuzz testing genetic algorithm
在线阅读 下载PDF
基于Android手机的植物工厂多变量环控系统设计 被引量:1
2
作者 崔玉萍 《电子产品世界》 2025年第2期31-33,共3页
旨在开发一种智能的环境控制系统,进一步优化植物生长条件,提高作物产量。在系统设计中结合现代传感器技术、数据分析方法和移动通信技术,将Android手机作为用户界面,实时监控植物工厂内部的温度、湿度、光照、营养液等数据。基于此,研... 旨在开发一种智能的环境控制系统,进一步优化植物生长条件,提高作物产量。在系统设计中结合现代传感器技术、数据分析方法和移动通信技术,将Android手机作为用户界面,实时监控植物工厂内部的温度、湿度、光照、营养液等数据。基于此,研究植物工厂多变量环控系统总体架构,明确分模块功能,设计健全的多变量环控系统,进一步开发Android手机应用。结果表明,基于Android手机的植物工厂多变量环控系统能够显著提高植物生长的稳定性,为现代农业生产提供创新的解决方案。 展开更多
关键词 植物工厂 环境控制 android手机 传感器技术 智能农业
在线阅读 下载PDF
基于特征选择与机器学习的Android恶意软件检测方法 被引量:1
3
作者 张绍龙 《自动化与仪器仪表》 2025年第1期61-64,共4页
Android恶意软件能够侵害用户手机内的隐藏信息,导致用户隐私泄露,实现Android恶意软件检测能够保护用户隐私安全,因此,提出一种基于特征选择与机器学习的Android恶意软件检测方法。该方法提取了Android系统中的硬件特征、请求权限特征... Android恶意软件能够侵害用户手机内的隐藏信息,导致用户隐私泄露,实现Android恶意软件检测能够保护用户隐私安全,因此,提出一种基于特征选择与机器学习的Android恶意软件检测方法。该方法提取了Android系统中的硬件特征、请求权限特征、请求权限特征等共8类特征,通过对所有特征Droid-TF-IDF值进行计算,依据计算值的大小排序,选取排名靠前的特征构建特征集合,将选取特征作为双向长短期记忆网络的输入,通过注意力机制对各特征分配权重,经三个门控机制控制信息的流动和记忆单元的状态更新后,输出Android系统恶意软件的检测结果。实验分析显示,该方法依据频率选取的Android系统软件特征可靠性高,可实现变种和全未知Android恶意软件的准确检测,且可有效检测Android手机中的多种恶意软件。 展开更多
关键词 特征选择 机器学习 android恶意软件 异常检测 注意力机制 长短期记忆网络
原文传递
基于Android的外业踏勘数据采集可视化平台建设
4
作者 苏建锋 杨艳竹 《地震工程学报》 北大核心 2025年第3期663-670,共8页
针对目前地震监测外业踏勘工作中存在的实际问题,研发一个外业踏勘数据采集可视化系统平台。该系统平台以地震监测外业踏勘数据采集业务为出发点,基于Java语言实现了Android移动端的外业踏勘数据采集,能将外业踏勘采集的数据、图片、影... 针对目前地震监测外业踏勘工作中存在的实际问题,研发一个外业踏勘数据采集可视化系统平台。该系统平台以地震监测外业踏勘数据采集业务为出发点,基于Java语言实现了Android移动端的外业踏勘数据采集,能将外业踏勘采集的数据、图片、影像等不同类型的信息融合成一张标准表格,并快速传输提交。在地震监测外业踏勘工作中的应用表明,该系统实现了采集工作全面数字化操作,减少了传统纸质记录中的错误和重复工作,极大提升了采集工作的灵活性和时效性,对后续外业监测工作的顺利实施具有重要意义。 展开更多
关键词 android 外业踏勘 数据采集
在线阅读 下载PDF
基于阿里云语音合成的Android软件设计与实现
5
作者 许娜芬 黎嘉明 谢中华 《电脑知识与技术》 2025年第23期41-43,共3页
该研究基于阿里云智能语音交互的语音合成接口,通过先进的深度学习技术,将文本转换为自然流畅的语音。首先,程序通过HttpsURLConnection通信方式获取阿里云Token以调用语音合成接口,将用户输入的文本转换成自然流畅的语音;然后,通过FFm... 该研究基于阿里云智能语音交互的语音合成接口,通过先进的深度学习技术,将文本转换为自然流畅的语音。首先,程序通过HttpsURLConnection通信方式获取阿里云Token以调用语音合成接口,将用户输入的文本转换成自然流畅的语音;然后,通过FFmpeg和Lame类库对合成的音频进行编辑和格式转换;最后,在特定功能按钮中设置数据埋点,以采集用户行为事件数据并上传至服务器,用于后续业务处理。所设计的智能语音应用兼具技术先进性与商业可行性。 展开更多
关键词 语音合成 android 音频编辑 数据埋点 深度学习
在线阅读 下载PDF
基于Android的上课签到App的设计与实现
6
作者 陆向艳 贺梦帆 《电脑编程技巧与维护》 2025年第2期74-76,共3页
上课签到是教师评价学生学习表现的重要环节,针对当前教师上课人工点名效率低下的问题,分析、设计并实现了一个基于二维码的上课签到App。该系统允许教师在上课前创建签到二维码,上课时学生通过智能手机扫描二维码进行签到,教师和学生... 上课签到是教师评价学生学习表现的重要环节,针对当前教师上课人工点名效率低下的问题,分析、设计并实现了一个基于二维码的上课签到App。该系统允许教师在上课前创建签到二维码,上课时学生通过智能手机扫描二维码进行签到,教师和学生可在课后查询签到情况。该系统开发旨在提高教师课堂管理效率,为上课签到管理提供参考。 展开更多
关键词 上课签到 二维码 android系统 JAVA语言 腾讯云TDSQL-C
在线阅读 下载PDF
基于Android的学生校园系统的研究与实现
7
作者 王培刚 《电脑知识与技术》 2025年第1期51-53,共3页
随着移动通信技术进入5G时代,以及高校学生需求的日益多样化,用于智慧校园的学生校园系统变得越来越复杂。高校师生日常最为关注的是学习、教学以及学校相关的各类信息。基于此,文章整合校园中教学及生活的常见功能,设计并开发了一个基... 随着移动通信技术进入5G时代,以及高校学生需求的日益多样化,用于智慧校园的学生校园系统变得越来越复杂。高校师生日常最为关注的是学习、教学以及学校相关的各类信息。基于此,文章整合校园中教学及生活的常见功能,设计并开发了一个基于Android的学生校园系统,以便利本校学生的校园日常生活。 展开更多
关键词 android 校园系统 校园App 数字化校园
在线阅读 下载PDF
An ECG Monitoring and Alarming System Based On Android Smart Phone 被引量:2
8
作者 Xiaoqiang Guo Xiaohui Duan +2 位作者 Hongqiao Gao Anpeng Huang Bingli Jiao 《Communications and Network》 2013年第3期584-589,共6页
ECG monitoring in daily life is an important means of treating heart disease. To make it easier for the medical to monitor the ECG of their patients outside the hospital, we designed and developed an ECG monitoring an... ECG monitoring in daily life is an important means of treating heart disease. To make it easier for the medical to monitor the ECG of their patients outside the hospital, we designed and developed an ECG monitoring and alarming system based on Android smart phone. In our system, an ECG device collects the ECG signal and transmits it to an Android phone. The Android phone detects alarms which come from the ECG devices. When alarms occur, Android phone will capture the ECG images and the details about the alarms, and sends them to the cloud Alarm Server (AS). Once received, AS push the messages to doctors’ phone, so the doctors could see the ECG images and alarm details on their mobile phone. In our system, high resolution ECG pictures are transmitted to doctors’ phone in a user-friendly way, which can help doctors keep track of their patient’s condition easily. 展开更多
关键词 ECG MONITORING system android SMART PHONE ALARM
暂未订购
SeSoa: Security Enhancement System with Online Authentication for Android APK 被引量:1
9
作者 DONG Zhenjiang WANG Wei +3 位作者 LI Hui ZHANG Yateng ZHANG Hongrui ZHAO Hanyu 《ZTE Communications》 2016年第B06期44-50,共7页
Android OS provides such security mechanisms as application signature, privilege limit and sandbox to protect the security of operational system. However, these methods are unable to protect the applications of Androi... Android OS provides such security mechanisms as application signature, privilege limit and sandbox to protect the security of operational system. However, these methods are unable to protect the applications of Android against anti-reverse engineering and the codes of such applications face the risk of being obtained or modified, which are always the first step for further attacks. In this paper, a security enhancement system with online authentication (SeSoa) for Android APK is proposed, in which the code of Android application package (APK) can be automatically encrypted. The encrypted code is loaded and run in the Android system after being successfully decrypted. Compared with the exiting software protecting systems, SeSoa uses online authentication mechanism to ensure the improvementof the APK security and good balance between security and usability. 展开更多
关键词 software protection anti-reverse android AUTHENTICATION
在线阅读 下载PDF
A Network Scheduling Strategy of Android-Based Virtual Reality System 被引量:3
10
作者 SONG Xue-hui WANG Shao-rong +1 位作者 LAI Shun-nan WANG Guo-ping 《Computer Aided Drafting,Design and Manufacturing》 2015年第2期36-42,共7页
Mobile platform develops rapidly in recent years,with its performance and capacity increasing.A large number of virtual reality applications such as 3D simulation and visualization have appeared on mobile platform.How... Mobile platform develops rapidly in recent years,with its performance and capacity increasing.A large number of virtual reality applications such as 3D simulation and visualization have appeared on mobile platform.However,due to restrictions,such as the lack of computing resources and the limited network bandwidth,the virtual reality systems on mobile platform could not have comparable performance as their peers on desktop platform.Taking resource restrictions into consideration,trade-offs have been made regarding the display of virtual reality systems.We propose a unified network scheduling strategy based on asynchronous multi-thread,database cache,prioritization and elimination of overdue requests.This strategy has been tested on the prototype system of virtual reality system on Android.The results demonstrate higher network resource utilization and better user experience. 展开更多
关键词 virtual reality network dispatch android
在线阅读 下载PDF
基于强化学习的分布式Android应用自动化测试方法
11
作者 宋日荣 陈钦文 陈星 《计算机科学》 北大核心 2025年第12期40-47,共8页
Android应用程序已经深深融入人们日常生活的方方面面,确保这些应用的正确性是一个极具挑战性的任务。传统测试方法主要依赖于手工操作,自动化测试技术尽管有所发展但仍有待改进。Android应用程序不断迭代以完善性能和功能需求,导致了... Android应用程序已经深深融入人们日常生活的方方面面,确保这些应用的正确性是一个极具挑战性的任务。传统测试方法主要依赖于手工操作,自动化测试技术尽管有所发展但仍有待改进。Android应用程序不断迭代以完善性能和功能需求,导致了应用程序复杂性的增加和状态组合的爆炸性增长。测试Android应用的核心在于探索复杂的用户交互下的深层故障,但是这些故障的搜索空间是巨大的,需要花费大量的时间来进行测试。近年来,研究人员开始使用强化学习来测试Android应用,利用智能体与Android应用交互过程中获得的奖励来调整探索策略。然而,现有工作仅利用单台设备进行测试,测试效率十分有限。为了应对上述挑战,提出了一种基于强化学习的分布式Android应用自动化测试框架DistributedAndroidExplore(DAE),利用多个智能体同时对应用程序进行基于强化学习的测试,并定期迭代地聚合每个智能体累积的学习经验,以此提高测试效率。在10个真实世界的Android应用程序上对DAE进行了评估,结果表明,在大多数情况下,DAE的故障检测率、代码覆盖率均优于所对比的基准算法。同时测试效率明显优于其他方法,性能提高了16.5%~34.3%。 展开更多
关键词 分布式系统 android应用程序 强化学习 Q-LEARNING 自动化测试
在线阅读 下载PDF
面向分类器进行特征加权的Android恶意软件检测
12
作者 熊智 刘芳 王逸轩 《计算机工程与科学》 北大核心 2025年第9期1598-1608,共11页
特征加权可以提供更综合的信息增强模型的学习能力和决策准确性,但在实际运用时往往忽视了特征与分类器之间的相互关系。针对这一问题,提出一种面向分类器的特征加权法COFW,并将其应用于Android恶意软件检测。首先从Android应用程序包... 特征加权可以提供更综合的信息增强模型的学习能力和决策准确性,但在实际运用时往往忽视了特征与分类器之间的相互关系。针对这一问题,提出一种面向分类器的特征加权法COFW,并将其应用于Android恶意软件检测。首先从Android应用程序包中提取7个类别的特征,并挑选出最重要的特征子集;其次根据检测恶意软件所使用的分类器,采用COFW为该分类器计算每个特征的最优权重;最后采用加权后的特征训练该分类器。COFW采用去一法为每个特征计算初始权重,然后通过一个映射函数将其映射为最终权重,并采用差分进化算法优化映射函数和分类器的参数。实验结果表明,运用COFW进行特征加权能够提升分类器的性能,并且COFW的性能优于其他4种为Android恶意软件检测设计的特征加权法。 展开更多
关键词 特征加权 面向分类器 映射函数 android恶意软件检测
在线阅读 下载PDF
基于Android的车辆控制系统软件的设计 被引量:1
13
作者 代启丹 付振宁 +2 位作者 沈文辉 秦笑 肖恒 《工业控制计算机》 2025年第4期101-102,共2页
设计了一款基于Android平台的车辆控制系统App。该App是开发的通用电机控制模块的配套软件,主要包含验证登录、语音控制、触摸控制三个应用模块,可以通过语音和触屏动作两方面驱动电动车辆的通用电机。通过蓝牙通信技术将Android移动终... 设计了一款基于Android平台的车辆控制系统App。该App是开发的通用电机控制模块的配套软件,主要包含验证登录、语音控制、触摸控制三个应用模块,可以通过语音和触屏动作两方面驱动电动车辆的通用电机。通过蓝牙通信技术将Android移动终端与硬件控制系统互联,用户只需通过移动终端就能实现智能车辆的基础驾驶。经实验表明该App工作良好,实现了预定设计目标。 展开更多
关键词 android APP 语音控制 蓝牙通信
在线阅读 下载PDF
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
14
作者 Rahul Gupta Kapil Sharma R.K.Garg 《Computers, Materials & Continua》 SCIE EI 2024年第3期4283-4301,共19页
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and... The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature. 展开更多
关键词 android MALWARE android security hybrid analysis permission and system call pairs
在线阅读 下载PDF
Malware Detection in Android IoT Systems Using Deep Learning
15
作者 Muhammad Waqar Sabeeh Fareed +3 位作者 Ajung Kim Saif Ur Rehman Malik Muhammad Imran Muhammad Usman Yaseen 《Computers, Materials & Continua》 SCIE EI 2023年第2期4399-4415,共17页
The Android Operating System(AOS)has been evolving since its inception and it has become one of the most widely used operating system for the Internet of Things(IoT).Due to the high popularity and reliability ofAOS fo... The Android Operating System(AOS)has been evolving since its inception and it has become one of the most widely used operating system for the Internet of Things(IoT).Due to the high popularity and reliability ofAOS for IoT,it is a target of many cyber-attacks which can cause compromise of privacy,financial loss,data integrity,unauthorized access,denial of services and so on.The Android-based IoT(AIoT)devices are extremely vulnerable to various malwares due to the open nature and high acceptance of Android in the market.Recently,several detection preventive malwares are developed to conceal their malicious activities from analysis tools.Hence,conventional malware detection techniques could not be applied and innovative countermeasures against such anti-detection malwares are indispensable to secure the AIoT.In this paper,we proposed the novel deep learning-based real-time multiclass malware detection techniques for the AIoT using dynamic analysis.The results show that the proposed technique outperforms existing malware detection techniques and achieves detection accuracy up to 99.87%. 展开更多
关键词 android cyber security deep learning internet of things malware detection
在线阅读 下载PDF
DroidData: Tracking and Monitoring Data Transmission in the Android Operating System
16
作者 Hani Alshahrani Abdulrahman Alzahrani +3 位作者 Alexandra Hanton Ali Alshehri Huirong Fu Ye Zhu 《Communications and Network》 2017年第3期192-206,共15页
Most of the millions of Android users worldwide use applications from the official Android market (Google Play store) and unregulated alternative markets to get more functionality from their devices. Many of these app... Most of the millions of Android users worldwide use applications from the official Android market (Google Play store) and unregulated alternative markets to get more functionality from their devices. Many of these applications transmit sensitive data stored on the device, either maliciously or accidentally, to outside networks. In this paper, we will study the ways that Android applications transmit data to outside servers and propose a user-friendly application, DroidData, to inform and protect the user from these security risks. We will use tools such as TaintDroid, AppIntent, and Securacy to propose an application that reveals what types of data are being transmitted from apps, the location to which the data is being transmitted, whether the data is being transmitted through a secure channel (such as HTTPS) and whether the user is aware that the information is being transmitted. The application will generate a report that allows the user to block the application that leaks sensitive information. In doing so, we will examine the importance, relevance, and prevalence of these Android Data security issues. 展开更多
关键词 android SECURITY PRIVACY TRACKING Data MALWARE
暂未订购
Android IoT Lifelog System and Its Application to Motion Inference
17
作者 Munkhtsetseg Jeongwook Seo 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2989-3003,共15页
In social science,health care,digital therapeutics,etc.,smartphone data have played important roles to infer users’daily lives.However,smartphone data col-lection systems could not be used effectively and widely beca... In social science,health care,digital therapeutics,etc.,smartphone data have played important roles to infer users’daily lives.However,smartphone data col-lection systems could not be used effectively and widely because they did not exploit any Internet of Things(IoT)standards(e.g.,oneM2M)and class labeling methods for machine learning(ML)services.Therefore,in this paper,we propose a novel Android IoT lifelog system complying with oneM2M standards to collect various lifelog data in smartphones and provide two manual and automated class labeling methods for inference of users’daily lives.The proposed system consists of an Android IoT client application,an oneM2M-compliant IoT server,and an ML server whose high-level functional architecture was carefully designed to be open,accessible,and internation-ally recognized in accordance with the oneM2M standards.In particular,we explain implementation details of activity diagrams for the Android IoT client application,the primary component of the proposed system.Experimental results verified that this application could work with the oneM2M-compliant IoT server normally and provide corresponding class labels properly.As an application of the proposed system,we also propose motion inference based on three multi-class ML classifiers(i.e.,k nearest neighbors,Naive Bayes,and support vector machine)which were created by using only motion and location data(i.e.,acceleration force,gyroscope rate of rotation,and speed)and motion class labels(i.e.,driving,cycling,running,walking,and stil-ling).When compared with confusion matrices of the ML classifiers,the k nearest neighbors classifier outperformed the other two overall.Furthermore,we evaluated its output quality by analyzing the receiver operating characteristic(ROC)curves with area under the curve(AUC)values.The AUC values of the ROC curves for all motion classes were more than 0.9,and the macro-average and micro-average ROC curves achieved very high AUC values of 0.96 and 0.99,respectively. 展开更多
关键词 android Internet of Things lifelog motion inference oneM2M
在线阅读 下载PDF
融合静态程序分析与集成学习的Android代码异味共存检测
18
作者 王祯启 边奕心 +2 位作者 马偌楠 毕博宇 王金鑫 《计算机应用研究》 北大核心 2025年第4期1167-1176,共10页
相对于单一种类的代码异味,异味共存对程序更具危害性。针对Android特有代码异味,现有研究主要关注单一种类异味的检测,忽略异味共存对Android应用程序的负面影响。为识别共存的Android特有代码异味,提出融合静态程序分析与集成学习的An... 相对于单一种类的代码异味,异味共存对程序更具危害性。针对Android特有代码异味,现有研究主要关注单一种类异味的检测,忽略异味共存对Android应用程序的负面影响。为识别共存的Android特有代码异味,提出融合静态程序分析与集成学习的Android代码异味共存检测方法。作为初步研究,识别忽略类成员变量的方法异味与缺少低内存处理程序异味的共存。首先,提出基于静态程序分析的Android代码异味共存检测方法和正负样本自动生成方法并实现工具ASSD。该工具的输出为后续集成学习模型提供丰富的训练样本。然后,针对单一机器学习模型泛化能力有限的问题,提出一种软投票集成学习模型,识别共存的Android代码异味。该模型不仅可以集成传统机器学习模型,还可以集成改进的深度学习模型。实验结果表明,所提方法优于已有基于静态程序分析的检测方法,F_(1)值提升了26.1百分点。此外,基于传统机器学习的软投票集成学习模型优于基于深度学习的软投票集成学习模型,F_(1)值提升了6.1百分点。所提方法可以实现Android代码异味共存的检测。 展开更多
关键词 android代码异味共存 软投票 集成学习 静态程序分析
在线阅读 下载PDF
基于Happens-before关系的Android应用并发不稳定测试检测
19
作者 张雨 张文天 +1 位作者 张未晞 尚颖 《计算机系统应用》 2025年第2期102-110,共9页
Android应用异步消息执行顺序的不确定性是导致其不稳定的主要原因.现有不稳定测试研究大多通过随机确定异步消息的执行顺序以触发不稳定测试,其检测效果不佳且效率较低.本文提出一种基于happens-before(HB)关系的Android应用并发不稳... Android应用异步消息执行顺序的不确定性是导致其不稳定的主要原因.现有不稳定测试研究大多通过随机确定异步消息的执行顺序以触发不稳定测试,其检测效果不佳且效率较低.本文提出一种基于happens-before(HB)关系的Android应用并发不稳定测试检测方法,通过分析Android应用测试用例执行轨迹中异步消息间的HB关系,进而确定异步消息的可执行区间;并设计最大差异化调度策略,有指导性地确定异步消息执行顺序,使调度后的测试执行轨迹上异步消息执行序与原测试执行轨迹差异最大化,进而尝试改变测试执行结果,检测测试的不稳定性.为验证本文方法的有效性,针对40个Android应用程序的50个不稳定测试用例进行实验,实验结果表明,本文方法可检测全部不稳定测试用例,相比于当前主流工具检测效果提升6%,且平均检测时间缩短31.78%. 展开更多
关键词 android应用 不稳定测试检测 异步消息 HB关系 差异化调度
在线阅读 下载PDF
基于双向长短期记忆神经网络的Android恶意软件自动化检测方法
20
作者 韦霞 蔡建军 陈胜华 《电子设计工程》 2025年第13期28-33,共6页
恶意软件不仅侵犯用户隐私、窃取敏感信息,还可能对设备性能造成严重影响,导致Android恶意软件自动化检测效果不佳,为此提出了一种基于双向长短期记忆神经网络技术的Android恶意软件自动化检测方法。该方法结合双向长短期记忆神经网络... 恶意软件不仅侵犯用户隐私、窃取敏感信息,还可能对设备性能造成严重影响,导致Android恶意软件自动化检测效果不佳,为此提出了一种基于双向长短期记忆神经网络技术的Android恶意软件自动化检测方法。该方法结合双向长短期记忆神经网络与图卷积网络,分别用于提取操作码序列的上下文语义信息和分析系统调用的结构信息,通过特征融合以及分类器优化,实现对Android恶意软件的全面检测;实验结果表明,所提方法的准确率均值为99.56%,误报率均值为1.6%,F1分数最高值为99.6%,验证了所提方法在检测精确性及稳定性上具有优越性。 展开更多
关键词 android恶意软件检测 双向长短期记忆神经网络 图卷积网络 自动化检测
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部