Heuristic optimization model integrated with Reinforcement learning attack against graph based Android Malware Detction Systems

For ethical reasons, we will only be sharing the code with verified academic researchers.

We have already granted access to researchers from the following institutions (alphabetical order):

  1. Ain Shams University

  2. Augusta University

  3. Beijing JiaoTong University

  4. COMSATS University Islamabad

  5. DeepLab, Cyber AI Researcher

  6. Harbin Institute of Technology

  7. Harbin Institute of Technology, Shenzhen

  8. Huazhong University of Science and Technology

  9. Institute of Software Chinese Academy of Science

  10. Nanjing University of Science and Technology

  11. National Univerisity of Singapore

  12. Peking University

  13. Pensylvania State University

  14. Shanghai Jiao Tong University

  15. ShanghaiTech University

  16. Shantou University

  17. SouthEast Unniversity

  18. Tsinghua University

  19. University of Chinese Academy of Sciences

  20. University of Electronic Science and Technology of China

  21. University of Guelph

  22. Wake Forest University

  23. Wuhan University

  24. Xiangtan University

  25. Xidian University

  26. Xinjiang University

  27. Zhejiang Normal University

  28. Zhejiang University

Framework of HRAT

Workflow of Application Manipulation Tool