作者: Acar Tamersoy , Kevin Roundy , Duen Horng Chau , None
关键词: Executable 、 Locality-sensitive hashing 、 Computer security 、 Computer science 、 Hash function 、 Malware 、 False positive rate
摘要: … Bipartite File-Bucket Graph. Due to this reason, Aesop … filebucket graph, which we also refer to as a file-relation graph. In this graph, there is an edge connecting a file node to a bucket …