{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:12:39Z","timestamp":1743153159879,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030687953"},{"type":"electronic","value":"9783030687960"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68796-0_17","type":"book-chapter","created":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T16:28:24Z","timestamp":1613838504000},"page":"228-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Explanation-Driven Characterization of\u00a0Android Ransomware"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0469-3003","authenticated-orcid":false,"given":"Michele","family":"Scalas","sequence":"first","affiliation":[]},{"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5759-3017","authenticated-orcid":false,"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,21]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., Berrada, M.: Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6, 52138\u201352160 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2870052","journal-title":"IEEE Access"},{"key":"17_CR2","unstructured":"Adebayo, J., Gilmer, J., Muelly, M., Goodfellow, I., Hardt, M., Kim, B.: Sanity checks for saliency maps. In: Advances in Neural Information Processing Systems 31, pp. 9505\u20139515. Curran Associates, Inc., October 2018"},{"key":"17_CR3","unstructured":"Alber, M., et al.: iNNvestigate neural networks! August 2018. http:\/\/arxiv.org\/abs\/1808.04260"},{"key":"17_CR4","unstructured":"Ancona, M.: DeepExplain. https:\/\/github.com\/marcoancona\/DeepExplain"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-030-28954-6_9","volume-title":"Explainable AI: Interpreting, Explaining and Visualizing Deep Learning","author":"M Ancona","year":"2019","unstructured":"Ancona, M., Ceolini, E., \u00d6ztireli, C., Gross, M.: Gradient-based attribution methods. In: Samek, W., Montavon, G., Vedaldi, A., Hansen, L.K., M\u00fcller, K.-R. (eds.) Explainable AI: Interpreting, Explaining and Visualizing Deep Learning. LNCS (LNAI), vol. 11700, pp. 169\u2013191. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28954-6_9"},{"key":"17_CR6","doi-asserted-by":"publisher","unstructured":"Barredo Arrieta, A., et al.: Explainable Artificial Intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf. Fusion 58(2019), 82\u2013115 (2020). https:\/\/doi.org\/10.1016\/j.inffus.2019.12.012","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"17_CR7","unstructured":"Demetrio, L., Biggio, B., Lagorio, G., Roli, F., Armando, A.: Explaining vulnerabilities of deep learning to adversarial malware binaries. In: Proceedings of the Third Italian Conference on Cyber Security 2019. CEUR-WS.org, Pisa, February 2019"},{"key":"17_CR8","unstructured":"Ghorbani, A., Wexler, J., Zou, J., Kim, B.: Towards automatic concept-based explanations. In: Advances in Neural Information Processing Systems. pp. 9273\u20139282. Curran Associates Inc., Vancouver, February 2019"},{"key":"17_CR9","unstructured":"Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., Madry, A.: Adversarial examples are not bugs, they are features. In: Advances in Neural Information Processing Systems 32 (NIPS 2019), pp. 125\u2013136. Curran Associates Inc., Vancouver (2019)"},{"key":"17_CR10","unstructured":"Kim, B., et al.: Interpretability beyond feature attribution: quantitative testing with concept activation vectors (TCAV). In: 35th International Conference on Machine Learning (ICML 2018), vol. 80, pp. 2668\u20132677. Stockholm, July 2018"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Lage, I., et al.: An evaluation of the human-interpretability of explanation. In: Proceedings of the AAAI Conference on Human Computation and Crowdsourcing, vol. 7, pp. 59\u201367. AAAI Press, Honolulu, January 2019","DOI":"10.1609\/hcomp.v7i1.5280"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Lipton, Z.C.: The mythos of model interpretability. Queue 16(3), 31\u201357 (2018). https:\/\/doi.org\/10.1145\/3236386.3241340","DOI":"10.1145\/3236386.3241340"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Maiorca, D., Mercaldo, F., Giacinto, G., Visaggio, C.A., Martinelli, F.: R-PackDroid: API package-based characterization and detection of mobile ransomware. In: Proceedings of the Symposium on Applied Computing - SAC \u201917, pp. 1718\u20131723. ACM Press, New York (2017). https:\/\/doi.org\/10.1145\/3019612.3019793, http:\/\/dl.acm.org\/citation.cfm?doid=3019612.3019793","DOI":"10.1145\/3019612.3019793"},{"key":"17_CR14","unstructured":"Melis, M., Demontis, A., Pintor, M., Sotgiu, A., Biggio, B.: secml: a python library for secure and explainable machine learning. arXiv preprint arXiv:1912.10013 (12 2019). http:\/\/arxiv.org\/abs\/1912.10013"},{"key":"17_CR15","unstructured":"Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J., Cavallaro, L.: TESSERACT: eliminating experimental bias in malware classification across space and time. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 729\u2013746. USENIX Association, Santa Clara, August 2019"},{"key":"17_CR16","unstructured":"Preece, A., Harborne, D., Braines, D., Tomsett, R., Chakraborty, S.: Stakeholders in explainable AI. In: AAAI Fall Symposium on Artificial Intelligence in Government and Public Sector. Arlington, Virginia, USA (2018)"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"Scalas, M., Maiorca, D., Mercaldo, F., Visaggio, C.A., Martinelli, F., Giacinto, G.: On the effectiveness of system API-related information for Android ransomware detection. Comput. Secur. 86, 168\u2013182 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.06.004, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404819301178","DOI":"10.1016\/j.cose.2019.06.004"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-319-45719-2_11","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"M Sebasti\u00e1n","year":"2016","unstructured":"Sebasti\u00e1n, M., Rivera, R., Kotzias, P., Caballero, J.: AVclass: a tool for massive malware labeling. In: Monrose, F., Dacier, M., Blanc, G., Garcia-Alfaro, J. (eds.) RAID 2016. LNCS, vol. 9854, pp. 230\u2013253. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45719-2_11"},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Shrikumar, A., Greenside, P., Shcherbina, A., Kundaje, A., Shcherbina, A., Kundaje, A.: Not just a black box: learning important features through propagating activation differences. In: 34th International Conference on Machine Learning, ICML 2017, vol. 7, pp. 4844\u20134866. JMLR.org, Sydney, NSW, Australia, May 2016. https:\/\/doi.org\/10.5555\/3305890.3306006","DOI":"10.5555\/3305890.3306006"},{"key":"17_CR20","unstructured":"Sundararajan, M., Taly, A., Yan, Q.: Axiomatic attribution for deep networks. In: Proceedings of the 34th International Conference on Machine Learning, pp. 3319\u20133328. JMLR.org, Sidney, March 2017. http:\/\/arxiv.org\/abs\/1703.01365"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Warnecke, A., Arp, D., Wressnegger, C., Rieck, K.: Evaluating explanation methods for deep learning in security. In: 5th IEEE European Symposium on Security and Privacy (Euro S&P 2020), Genova, September 2020","DOI":"10.1109\/EuroSP48549.2020.00018"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition. ICPR International Workshops and Challenges"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68796-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,18]],"date-time":"2022-12-18T09:18:40Z","timestamp":1671355120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68796-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030687953","9783030687960"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68796-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"21 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ICPR2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icpr2020.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}