Sign in

Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information.

Heng LiZhang ChengBang WuLiheng YuanCuiying GaoWei YuanXiapu Luo
Published in: CoRR (2023)
Keyphrases
  • black box
  • malware detection
  • black boxes
  • case study
  • end users
  • software engineering
  • computer systems