ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.04218
  4. Cited By
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

10 August 2018
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
    AAML
ArXivPDFHTML

Papers citing "Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection"

18 / 18 papers shown
Title
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection
Shiwen Song
Xiaofei Xie
Ruitao Feng
Qi Guo
Sen Chen
AAML
45
0
0
28 Apr 2025
Unraveling the Key of Machine Learning Solutions for Android Malware
  Detection
Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Jiahao Liu
Jun Zeng
Fabio Pierazzi
Lorenzo Cavallaro
Zhenkai Liang
AAML
26
7
0
05 Feb 2024
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with
  Black-box Backdoor Attack
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack
Jiayi Hua
Kailong Wang
Meizhen Wang
Guangdong Bai
Xiapu Luo
Haoyu Wang
AAML
34
3
0
05 Jan 2024
PAD: Towards Principled Adversarial Malware Detection Against Evasion
  Attacks
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Deqiang Li
Shicheng Cui
Yun Li
Jia Xu
Fu Xiao
Shouhuai Xu
AAML
54
18
0
22 Feb 2023
Problem-Space Evasion Attacks in the Android OS: a Survey
Problem-Space Evasion Attacks in the Android OS: a Survey
Harel Berger
Chen Hajaj
A. Dvir
21
2
0
29 May 2022
Evaluating Membership Inference Through Adversarial Robustness
Evaluating Membership Inference Through Adversarial Robustness
Zhaoxi Zhang
L. Zhang
Xufei Zheng
Bilal Hussain Abbasi
Shengshan Hu
AAML
57
14
0
14 May 2022
Do You Think You Can Hold Me? The Real Challenge of Problem-Space
  Evasion Attacks
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Harel Berger
A. Dvir
Chen Hajaj
Rony Ronen
AAML
26
3
0
09 May 2022
MaMaDroid2.0 -- The Holes of Control Flow Graphs
MaMaDroid2.0 -- The Holes of Control Flow Graphs
Harel Berger
Chen Hajaj
Enrico Mariconti
A. Dvir
33
4
0
28 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
21
5
0
15 Feb 2022
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box
  Android Malware Detection
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection
Hamid Bostani
Veelasha Moonsamy
AAML
35
51
0
07 Oct 2021
Information flow based defensive chain for data leakage detection and
  prevention: a survey
Information flow based defensive chain for data leakage detection and prevention: a survey
Ning Xi
Chao Chen
Jun Zhang
Cong Sun
Shigang Liu
Pengbin Feng
Jianfeng Ma
13
0
0
09 Jun 2021
Metamorphic Detection of Repackaged Malware
Metamorphic Detection of Repackaged Malware
S. Singh
Gail E. Kaiser
24
8
0
27 Apr 2021
Deep Learning for Android Malware Defenses: a Systematic Literature
  Review
Deep Learning for Android Malware Defenses: a Systematic Literature Review
Yue Liu
C. Tantithamthavorn
Li Li
Yepang Liu
AAML
30
77
0
09 Mar 2021
A Performance-Sensitive Malware Detection System Using Deep Learning on
  Mobile Devices
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
Ruitao Feng
Sen Chen
Xiaofei Xie
Guozhu Meng
Shang-Wei Lin
Yang Liu
33
103
0
11 May 2020
When the Guard failed the Droid: A case study of Android malware
When the Guard failed the Droid: A case study of Android malware
Harel Berger
Chen Hajaj
A. Dvir
AAML
25
7
0
31 Mar 2020
Droidetec: Android Malware Detection and Malicious Code Localization
  through Deep Learning
Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning
Zhuo Ma
Haoran Ge
Zhuzhu Wang
Yang Liu
Ximeng Liu
11
38
0
10 Feb 2020
Don't Pick the Cherry: An Evaluation Methodology for Android Malware
  Detection Methods
Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods
Aleieldin Salem
Sebastian Banescu
A. Pretschner
11
10
0
25 Mar 2019
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
1