{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:50:00Z","timestamp":1743058200795,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030927073"},{"type":"electronic","value":"9783030927080"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-92708-0_7","type":"book-chapter","created":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T23:02:43Z","timestamp":1641250963000},"page":"116-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Lightweight Android Malware Detection Framework Based on\u00a0Knowledge Distillation"],"prefix":"10.1007","author":[{"given":"Yongbo","family":"Zhi","sequence":"first","affiliation":[]},{"given":"Ning","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Yuanqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Honglei","family":"Hui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,4]]},"reference":[{"key":"7_CR1","unstructured":"O\u2019Dea, S.: Smartphone OS shipment market share worldwide 2020\u20132025 [EB\/OL]. https:\/\/www.idc.com. Accessed 8 July 2021"},{"key":"7_CR2","unstructured":"iJiami. National mobile app security situation research report [EB\/OL]. https:\/\/www.freebuf.com\/articles\/network\/235337.html. Accessed 8 July 2021"},{"issue":"8","key":"7_CR3","doi-asserted-by":"publisher","first-page":"3035","DOI":"10.1007\/s12652-018-0803-6","volume":"10","author":"W Wang","year":"2018","unstructured":"Wang, W., Zhao, M., Wang, J.: Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Ambient. Intell. Humaniz. Comput. 10(8), 3035\u20133043 (2018). https:\/\/doi.org\/10.1007\/s12652-018-0803-6","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"1","key":"7_CR4","first-page":"31","volume":"14","author":"S Luo","year":"2019","unstructured":"Luo, S., Liu, Z., Ni, B., Wang, H., Sun, H., Yuan, Y.: Android malware analysis and detection based on attention-CNN-LSTM. J. Comput. 14(1), 31\u201344 (2019)","journal-title":"J. Comput."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-019-04589-w","volume":"24","author":"S Xin","year":"2020","unstructured":"Xin, S., Shi, W., Xilong, Q., Zheng, Y., Liu, X.: DroidDeep: using deep belief network to characterize and detect android malware. Soft Comput. 24, 1\u201314 (2020). https:\/\/doi.org\/10.1007\/s00500-019-04589-w","journal-title":"Soft Comput."},{"issue":"8","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/TIFS.2017.2687880","volume":"12","author":"M Fan","year":"2017","unstructured":"Fan, M., Liu, J., Wang, W., Li, H., Tian, Z., Liu, T.: DAPASA: detecting android piggybacked apps through sensitive subgraph analysis. IEEE Trans. Inf. Forensics Secur. 12(8), 1772\u20131785 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Mart\u00edn, A., Fuentes-Hurtado, F., Naranjo, V., Camacho, D.: Evolving deep neural networks architectures for android malware classification. In: 2017 IEEE Congress on Evolutionary Computation (CEC), pp. 1659\u20131666. IEEE (2017)","DOI":"10.1109\/CEC.2017.7969501"},{"key":"7_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-981-13-7561-3_10","volume-title":"Security and Privacy","author":"P Faruki","year":"2019","unstructured":"Faruki, P., Buddhadev, B., Shah, B., Zemmari, A., Laxmi, V., Gaur, M.S.: DroidDivesDeep: android malware classification via low level monitorable features with deep neural networks. In: Nandi, S., Jinwala, D., Singh, V., Laxmi, V., Gaur, M.S., Faruki, P. (eds.) ISEA-ISAP 2019. CCIS, vol. 939, pp. 125\u2013139. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-7561-3_10"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Yeh, C.W., Yeh, W.T., Hung, S.H., Lin, C.T.: Flattened data in convolutional neural networks: Using malware detection as case study. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, pp. 130\u2013135 (2016)","DOI":"10.1145\/2987386.2987406"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"30996","DOI":"10.1109\/ACCESS.2018.2844349","volume":"6","author":"P Feng","year":"2018","unstructured":"Feng, P., Ma, J., Sun, C., Xinpeng, X., Ma, Y.: A novel dynamic android malware detection system with ensemble learning. IEEE Access 6, 30996\u201331011 (2018)","journal-title":"IEEE Access"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1016\/j.procs.2019.09.273","volume":"159","author":"F Fasano","year":"2019","unstructured":"Fasano, F., Martinelli, F., Mercaldo, F., Santone, A.: Energy consumption metrics for mobile device dynamic malware detection. Procedia Comput. Sci. 159, 1045\u20131052 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Ferrante, A., Medvet, E., Mercaldo, F., Milosevic, J., Visaggio, C.A.: Spotting the malicious moment: characterizing malware behavior using dynamic features. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 372\u2013381. IEEE (2016)","DOI":"10.1109\/ARES.2016.70"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Saracino, A.: Bridemaid: an hybrid tool for accurate detection of android malware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 899\u2013901 (2017)","DOI":"10.1145\/3052973.3055156"},{"issue":"4","key":"7_CR14","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s11042-017-5104-0","volume":"78","author":"X Xiao","year":"2019","unstructured":"Xiao, X., Zhang, S., Mercaldo, F., Hu, G., Sangaiah, A.K.: Android malware detection based on system call sequences and LSTM. Multimed. Tools Appl. 78(4), 3979\u20133999 (2019). https:\/\/doi.org\/10.1007\/s11042-017-5104-0","journal-title":"Multimed. Tools Appl."},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-319-64701-2_14","volume-title":"Network and System Security","author":"A Gharib","year":"2017","unstructured":"Gharib, A., Ghorbani, A.: DNA-Droid: a real-time android ransomware detection framework. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 184\u2013198. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64701-2_14"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, D., Xi, T., Jing, P., Wu, D., Xia, Q., Zhang, Y.: A transparent and multimodal malware detection method for android apps. In: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 51\u201360 (2019)","DOI":"10.1145\/3345768.3355915"},{"issue":"18","key":"7_CR17","doi-asserted-by":"crossref","first-page":"e5308","DOI":"10.1002\/cpe.5308","volume":"32","author":"D Li","year":"2020","unstructured":"Li, D., Zhao, L., Cheng, Q., Ning, L., Shi, W.: Opcode sequence analysis of android malware by a convolutional neural network. Concurr. Comput.: Pract. Exp. 32(18), e5308 (2020)","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"107138","DOI":"10.1016\/j.comnet.2020.107138","volume":"171","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Wassan, S., Naeem, H., Safaei, B., Zheng, Q.: IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture. Comput. Netw. 171, 107138 (2020)","journal-title":"Comput. Netw."},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s10586-017-0944-y","volume":"21","author":"M Nauman","year":"2018","unstructured":"Nauman, M., Tanveer, T.A., Khan, S., Syed, T.A.: Deep neural architectures for large scale android malware analysis. Cluster Comput. 21(1), 569\u2013588 (2018). https:\/\/doi.org\/10.1007\/s10586-017-0944-y","journal-title":"Cluster Comput."},{"issue":"1","key":"7_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1049\/iet-ifs.2015.0211","volume":"11","author":"X Xiao","year":"2016","unstructured":"Xiao, X., Wang, Z., Li, Q., Xia, S., Jiang, Y.: Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting android malware with system call sequences. IET Inf. Secur. 11(1), 8\u201315 (2016)","journal-title":"IET Inf. Secur."},{"key":"7_CR21","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network (2015)"},{"key":"7_CR22","unstructured":"Vaswani, A., et al.: Attention is all you need (2017)"},{"issue":"11","key":"7_CR23","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673\u20132681 (1997)","journal-title":"IEEE Trans. Signal Process."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Mahdavifar, S., Kadir, A.F.A., Fatemi, R., Alhadidi, D., Ghorbani, A.A.: Dynamic android malware category classification using semi-supervised deep learning. In: 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 515\u2013522. IEEE (2020)","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/CCST.2018.8585560"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-92708-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T07:16:39Z","timestamp":1700032599000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-92708-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030927073","9783030927080"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-92708-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}