Results 51 to 60 of about 222,584 (313)

Z2F: Heterogeneous graph-based Android malware detection.

open access: yesPLoS ONE
Android malware is becoming more common, and its invasion of smart devices has brought immeasurable losses to people's lives. Most existing Android malware detection methods extract Android features from the original application files without considering
Ziwei Ma, Nurbor Luktarhan
doaj   +1 more source

Android Malware Detection Based on API Pairing

open access: yesXibei Gongye Daxue Xuebao, 2020
Aiming at the problem that the permission-based detection is too coarse-grained, a malware detection method based on sensitive application program interface(API) pairing is proposed.

doaj   +1 more source

Android-Based Media in Course of Mathematics Learning Strategy at Universitas Muhammadiyah Sumatera Utara

open access: yesKreano: Jurnal Matematika Kreatif-Inovatif, 2023
This research is motivated by teaching materials used by lecturers in the learning process that have not instilled student interest in learning, so students have difficulty understanding the material provided during distance learning (online). This study
Putri Maisyarah Ammy, Indra Maryanti
doaj   +1 more source

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Analysis of the development Android’s runtime

open access: yesJournal of Computer Sciences Institute, 2019
The article presents the development of the Android runtime. Own application for Android is presented, which implements performance benchmarks used to test different versions of the Android runtime.
Kostiantyn Honcharenko, Jakub Smołka
doaj   +1 more source

Organic Neuromorphic Transistors with Crosslinked Poly(vinyl alcohol)‐Based Memory Layers Controlled by Thermal Annealing Process

open access: yesAdvanced Materials Technologies, EarlyView.
The crosslinked poly(vinyl alcohol) (X‐PVA) in the presence of acidic polymer catalyst (PAMPSA) is formed in solid‐state films by thermal annealing at 150 ℃ for 10 min, delivering the best hysteresis characteristics for efficient organic synaptic transistors (OSTRs) with a recognition accuracy of 96%.
Seungmok Lee   +3 more
wiley   +1 more source

Post‐Processing Strengthened 3D Artificial Fingertip with Multi‐Intensity Pain Perception

open access: yesAdvanced Materials Technologies, EarlyView.
The 3D multi‐intensity pain‐perceptive artificial fingertip (HBAF) is designed, whose mechanical and conductive properties are highly improved via novel post‐processing. With the soft adhesive gel layer, which is grown on the base of HBAF, it is seamlessly assembled with the robotic hand and further evaluates the safe factor of gripping.
Huijing Li   +6 more
wiley   +1 more source

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2018
Machine learning-based solutions have been successfully employed for the automatic detection of malware on Android. However, machine learning models lack robustness to adversarial examples, which are crafted by adding carefully chosen perturbations to ...
Xiao Chen   +7 more
semanticscholar   +1 more source

Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains

open access: yesAdvanced Robotics Research, EarlyView.
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao   +3 more
wiley   +1 more source

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

open access: yesEntropy, 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy