Login / Signup
Do gradient-based explanations tell anything about adversarial robustness to android malware?
Marco Melis
Michele Scalas
Ambra Demontis
Davide Maiorca
Battista Biggio
Giorgio Giacinto
Fabio Roli
Published in:
Int. J. Mach. Learn. Cybern. (2022)
Keyphrases
</>
malware detection
mobile devices
data mining
anomaly detection
high robustness
detect malicious
databases
search engine
website
open source
computational efficiency
intrusion detection system
mobile applications
smart phones
control flow