Citation: | LUO Senlin, LU Shuai, ZHANG Yifei, PAN Limin. Certified Robustness of Malware Deep Learning Identification Model Based on Random Smoothing[J].Transactions of Beijing institute of Technology, 2023, 43(2): 197-202.doi:10.15918/j.tbit1001-0645.2022.044 |
[1] |
田东海, 魏行, 张博, 等. 基于机器学习的内核恶意程序检测研究与实现[J]. bob手机在线登陆学报自然版, 2020, 40(12): 1295 − 1301.
TIAN Donghai, WEI Hang, ZHANG Bo, et al. Research and implementation of kernel malicious code detection based on machine learning[J]. Transactions of Beijing Institute of Technology, 2020, 40(12): 1295 − 1301. (in Chinese)
|
[2] |
刘亚姝, 王志海, 李经纬, 等. 基于卡方检验的Android恶意应用检测方法[J]. bob手机在线登陆学报自然版, 2019, 39(3): 290 − 294.
LIU Yashu, WANG Zhihai, LI Jingwei, et al. An android malware detection method based on Chi-Squared test[J]. Transactions of Beijing institute of Technology, 2019, 39(3): 290 − 294. (in Chinese)
|
[3] |
崔甲, 施蕾, 李娟, 等. 一种高效的恶意域名检测框架[J]. bob手机在线登陆学报自然版, 2019, 39(1): 64 − 67.
CUI Jia, SHI Lei, LI Juan, et al. An effective malicious domain detection framework[J]. Transactions of Beijing institute of Technology, 2019, 39(1): 64 − 67. (in Chinese)
|
[4] |
GOODFELLOW I, SHLENS J, SZEGEDY C. Explaining and harnessing adversarial examples. International Conference on Learning Representations [J/OL]. (2015-05-20). [2021-11-15]. https://arxiv.org/abs/1412.6572.
|
[5] |
LECUYER M, ATLIDAKIS V, GEAMBASU R, et al. Certified robustness to adversarial examples with differential privacy[C]//2019 IEEE Symposium on Security and Privacy. San Francisco: IEEE Press, 2019: 656 − 672.
|
[6] |
COHEN J, ROSENFELD E , KOLTER J. Certified adversarial robustness via randomized smoothing[C]//Proceedings of the 36th International Conference on Machine Learning . Long Beach: ACM, 2019: 1310 − 1320.
|
[7] |
LEE G H, YUAN Y, CHANG S Y, et al. Tight certificates of adversarial robustness for randomly smoothed classifiers[C]//Neural Information Processing Systems . Vancouver: MIT Press, 2019: 1 − 12.
|
[8] |
LI B, CHEN C, WANG W, et al. Certified adversarial robustness with additive noise[C]//The 33rd Conference on Neural Information Processing Systems. Vancouver: MIT Press, 2019: 1 − 11.
|
[9] |
JIA J, CAO X Y, WANG B H, et al. Certified robustness of community detection against adversarial structural perturbation via randomized smoothing[C]//Proceedings of the Web Conference 2020. New York: ACM, 2020: 2718 − 2724.
|
[10] |
WANG Y H, ZHANG H, CHEN H, et al. On Lp-norm robustness of ensemble decision stumps and trees[C]//International Conference on Machine Learning. Vienna: ACM, 2020: 10104 − 10114.
|
[11] |
GOOGLE. Permissions on android[EB/OL]. (2021-05-10). [2021-05-10]. https://developer.android.com/guide/topics/permisions/overview#dangerous_permissions.
|
[12] |
ARP D, PREITZENBARTH M, HUBNER M. Drebin: Effective and explainable detection of android malware in your pocket[C]//21st Annual Network and Distributed System Security Symposium . Rosten: The Internet Society, 2014: 23 − 26.
|
[13] |
ALLIX K, F. BISSYANDÉ T, KLEIN J, et al. AndroZoo: collecting millions of Android apps for the research community[C]//Proceedings of the 13th International Conference on Mining Software Repositories. Association for Computing Machinery . New York: MSR, 2016: 468 − 471.
|
[14] |
LASHKARI A H, A. KADIR A F, TAHERI L, et al. Toward developing a systematic approach to generate benchmark android malware datasets and classification[C]//2018 International Carnahan Conference on Security Technology. Bangalore: IEEE, 2018: 1 − 7.
|