Feb. 13, 2023, 2:18 a.m. | Yinwei Wu, Meijin Li, Junfeng Wang, Zhiyang Fang, Qi Zeng, Tao Yang, Luyu Cheng

cs.CR updates on arXiv.org arxiv.org

Due to the completely open-source nature of Android, the exploitable
vulnerability of malware attacks is increasing. Machine learning, leading to a
great evolution in Android malware detection in recent years, is typically
applied in the classification phase. Since the correlation between features is
ignored in some traditional ranking-based feature selection algorithms,
applying wrapper-based feature selection models is a topic worth investigating.
Though considering the correlation between features, wrapper-based approaches
are time-consuming for exploring all possible valid feature subsets when
processing …

algorithms android android malware attacks classification correlation detection features great machine machine learning malware malware attacks malware detection nature vulnerability wrapper

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Premium Hub - CoE: Business Process Senior Consultant, SAP Security Role and Authorisations & GRC

@ SAP | Dublin 24, IE, D24WA02

Product Security Response Engineer

@ Intel | CRI - Belen, Heredia

Application Security Architect

@ Uni Systems | Brussels, Brussels, Belgium

Sr Product Security Engineer

@ ServiceNow | Hyderabad, India

Analyst, Cybersecurity & Technology (Initial Application Deadline May 20th, Final Deadline May 31st)

@ FiscalNote | United Kingdom (UK)