Login / Signup

Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples.

Ijas AhVinod P.Akka ZemmariHarikrishnan DGodvin PouloseDon JoseFrancesco MercaldoFabio MartinelliAntonella Santone
Published in: KES (2021)
Keyphrases
  • malware detection
  • evaluation method
  • multi agent
  • mobile devices
  • object detection
  • evaluation methods
  • machine learning
  • object recognition
  • intrusion detection
  • training examples
  • gold standard