{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:24:15Z","timestamp":1775787855014,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031402883","type":"print"},{"value":"9783031402890","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40289-0_15","type":"book-chapter","created":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T23:02:27Z","timestamp":1691535747000},"page":"184-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["FedDroidADP: An Adaptive Privacy-Preserving Framework for Federated-Learning-Based Android Malware Classification System"],"prefix":"10.1007","author":[{"given":"Changnan","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Chunhe","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Zhuodong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tianbo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,9]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Tu, Z., et al.: Your apps give you away: distinguishing mobile users by their app usage fingerprints. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 1\u201323 (2018)","DOI":"10.1145\/3264948"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s42486-020-00041-3","volume":"3","author":"Z Tu","year":"2021","unstructured":"Tu, Z., et al.: Demographics of mobile app usage: Long-term analysis of mobile app usage. CCF Trans. Pervasive Comput. Interact. 3, 235\u2013252 (2021)","journal-title":"CCF Trans. Pervasive Comput. Interact."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE, San Jose, CA, USA (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"15_CR4","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Wallach, H., Larochelle, H., Beygelzimer, A., Alch\u00e9-Buc, F. d\u2019, Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems. Curran Associates, Inc. (2019)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706. IEEE, San Francisco, CA, USA (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Knockoff nets: Stealing functionality of black-box models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4954\u20134963 (2019)","DOI":"10.1109\/CVPR.2019.00509"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Qi, T., Wu, F., Wu, C., Huang, Y., Xie, X.: Privacy-preserving news recommendation model learning. In: Findings of the Association for Computational Linguistics: EMNLP 2020, pp. 1423\u20131432. Association for Computational Linguistics, Online (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.128"},{"key":"15_CR8","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: others: On data banks and privacy homomorphisms. Found. Sec. Comput. 4, 169\u2013180 (1978)","journal-title":"Found. Sec. Comput."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ji, S., Wang, H., Wang, T.: Private, yet practical, multiparty deep learning. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 1442\u20131452. IEEE, Atlanta, GA, USA (2017)","DOI":"10.1109\/ICDCS.2017.215"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Mo, F., Haddadi, H., Katevas, K., Marin, E., Perino, D., Kourtellis, N.: PPFL: privacy-preserving federated learning with trusted execution environments. In: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, pp. 94\u2013108. ACM, Virtual Event Wisconsin (2021)","DOI":"10.1145\/3458864.3466628"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191. ACM, Dallas Texas USA (2017)","DOI":"10.1145\/3133956.3133982"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., Ma, C.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inform. Forensic. Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inform. Forensic. Secur."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Triastcyn, A., Faltings, B.: Federated learning with bayesian differential privacy. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 2587\u20132596. IEEE, Los Angeles, CA, USA (2019)","DOI":"10.1109\/BigData47090.2019.9005465"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"8442","DOI":"10.1109\/TII.2020.3043458","volume":"17","author":"R Taheri","year":"2021","unstructured":"Taheri, R., Shojafar, M., Alazab, M.: Fed-IIoT: a robust federated malware detection architecture in industrial IoT. IEEE Trans. Ind. Inf. 17, 8442\u20138452 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"N Singh H Kasyap S Tripathy 2020 Collaborative learning based effective malware detection system I Koprinska Eds ECML PKDD 2020 Workshops ECML PKDD 2020 Workshops of the European Conference on Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2020): SoGood 2020, PDFL 2020, MLCS 2020, NFMCP 2020, DINA 2020, EDML 2020, XKDD 2020 and INRA 2020, Ghent, Belgium, September 14\u201318, 2020, Proceedings Ghent Belgium 09 14 2020 09 18 Communications in Computer and Information Science CCIS 1323 Springer Cham 205 219https:\/\/doi.org\/10.1007\/978-3-030-65965-3_13","DOI":"10.1007\/978-3-030-65965-3_13"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Shukla, S., Sai Manoj, P.D., Kolhe, G.: On-device malware detection using performance-aware and robust collaborative learning. In: 2021 58th ACM\/IEEE Design Automation Conference (DAC), pp. 967\u2013972. IEEE, San Francisco, CA, USA (2021)","DOI":"10.1109\/DAC18074.2021.9586330"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318. ACM, Vienna Austria (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Lia, D., Togan, M.: Privacy-preserving machine learning using federated learning and secure aggregation. In: 2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u20136. IEEE, Bucharest, Romania (2020)","DOI":"10.1109\/ECAI50035.2020.9223127"},{"key":"15_CR19","unstructured":"Zhang, C., et al.: Efficient homomorphic encryption for cross-silo federated learning. In: Gavrilovska, A. and Zadok, E. (eds.) 2020 USENIX Annual Technical Conference, USENIX ATC 2020, 15\u201317 July 2020, pp. 493\u2013506. USENIX Association (2020)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Ang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10, 12:1\u201312:19 (2019)","DOI":"10.1145\/3298981"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TPDS.2019.2899097","volume":"30","author":"S Wang","year":"2019","unstructured":"Wang, S., Huang, L., Nie, Y.: Local differential private data aggregation for discrete distribution estimation. IEEE Trans. Parallel Distrib. Syst. 30, 2046\u20132059 (2019)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"15_CR22","unstructured":"Belghazi, I., Rajeswar, S., Baratin, A., Hjelm, R.D., Courville, A.C.: MINE: Mutual Information Neural Estimation. arXiv preprint arxiv:1801.04062 (2018)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: AndroZoo: collecting millions of Android apps for the research community. In: Kim, M., Robbes, R., Bird, C. (eds.) Proceedings of the 13th International Conference on Mining Software Repositories, MSR 2016, Austin, TX, USA, 14\u201322 May 2016, pp. 468\u2013471. ACM (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"15_CR24","unstructured":"Song, C., Shmatikov, V.: Overlearning reveals sensitive attributes. In: 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, 26\u201330 April 2020. OpenReview.net (2020)"},{"key":"15_CR25","unstructured":"Zhao, B., Mopuri, K.R., Bilen, H.: iDLG: Improved Deep Leakage from Gradients. arXiv preprint\u00a0arxiv:2001.02610 (2020)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Wainakh, A., Ventola, F., M\u00fc\u00dfig, T., Keim, J.: Cordero: User-Level Label Leakage from Gradients in Federated Learning. Proc. Priv. Enhancing Technol. 2022, 227\u2013244 (2022)","DOI":"10.2478\/popets-2022-0043"},{"key":"15_CR27","unstructured":"Andrew, G., Thakkar, O., McMahan, B.: Differentially private learning with adaptive clipping. In: NeurIPS 2021, 6\u201314 December 2021, virtual, pp. 17455\u201317466 (2021)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Fu, J., Chen, Z., Han, X.: Adap DP-FL: differentially private federated learning with adaptive noise. In: TrustCom2022, pp. 656\u2013663. IEEE, Wuhan, China (2022)","DOI":"10.1109\/TrustCom56396.2022.00094"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Liu, C., Yan, A., Chen, Z., Zhang, H.: IEdroid: Detecting malicious android network behavior using incremental ensemble of ensembles. In: 2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), pp. 788\u2013795. IEEE, Beijing, China (2021)","DOI":"10.1109\/ICPADS53394.2021.00104"},{"key":"15_CR30","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-031-05933-9_50","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Y Pang","year":"2022","unstructured":"Pang, Y., Zhang, H., Deng, J.D., Peng, L.: Rule-Based collaborative learning with heterogeneous local learning models. In: Gama, J., Li, T., Yu, Y., Chen, E., Zheng, Y., Teng, F. (eds.) Advances in Knowledge Discovery and Data Mining, pp. 639\u2013651. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05933-9_50"},{"key":"15_CR31","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.neucom.2020.09.082","volume":"453","author":"A Yan","year":"2021","unstructured":"Yan, A., Chen, Z., Zhang, H., Peng, L.: Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453, 482\u2013492 (2021)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40289-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T23:16:18Z","timestamp":1691536578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40289-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031402883","9783031402890"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40289-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ksem2023.conferences.academy\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"395","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"114","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}