Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

Anomaly detection

2014

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Anomaly Detection Through Enhanced Sentiment Analysis On Social Media Data, Zhaoxia Wang, Victor Joo, Chuan Tong, Xin Xin, Hoong Chor Chin Dec 2014

Anomaly Detection Through Enhanced Sentiment Analysis On Social Media Data, Zhaoxia Wang, Victor Joo, Chuan Tong, Xin Xin, Hoong Chor Chin

Research Collection School Of Computing and Information Systems

Anomaly detection in sentiment analysis refers to detecting abnormal opinions, sentiment patterns or special temporal aspects of such patterns in a collection of data. The anomalies detected may be due to sudden sentiment changes hidden in large amounts of text. If these anomalies are undetected or poorly managed, the consequences may be severe, e.g. A business whose customers reveal negative sentiments and will no longer support the establishment. Social media platforms, such as Twitter, provide a vast source of information, which includes user feedback, opinion and information on most issues. Many organizations also leverage social media platforms to publish information …


Semantics-Aware Android Malware Classification Using Weighted Contextual Api Dependency Graphs, Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao Nov 2014

Semantics-Aware Android Malware Classification Using Weighted Contextual Api Dependency Graphs, Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao

Research Collection School Of Computing and Information Systems

The drastic increase of Android malware has led to a strong interest in developing methods to automate the malware analysis process. Existing automated Android malware detection and classification methods fall into two general categories: 1) signature-based and 2) machine learning-based. Signature-based approaches can be easily evaded by bytecode-level transformation attacks. Prior learning-based works extract features from application syntax, rather than program semantics, and are also subject to evasion. In this paper, we propose a novel semantic-based approach that classifies Android malware via dependency graphs. To battle transformation attacks, we extract a weighted contextual API dependency graph as program semantics to …