Research Article

Learning-Based Detection of Harmful Data in Mobile Devices

Figure 2

Flowchart of the retrieval-based method.