Heuristic optimization model integrated with Reinforcement learning attack against graph based Android Malware Detction Systems

For ethical reasons, we will only be sharing the code with verified academic researchers. 

We have already granted access to researchers from the following institutions (alphabetical order):

Framework of HRAT

Workflow of Application Manipulation Tool