{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:18:09Z","timestamp":1762377489448,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_1","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ACDroid: Detecting Collusion Applications on\u00a0Smart Devices"],"prefix":"10.1007","author":[{"given":"Ning","family":"Xi","sequence":"first","affiliation":[]},{"given":"Yihuan","family":"He","sequence":"additional","affiliation":[]},{"given":"Yuchen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pengbin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"issue":"9","key":"1_CR1","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/TSE.2015.2419611","volume":"41","author":"H Bagheri","year":"2015","unstructured":"Bagheri, H., Sadeghi, A., Garcia, J., Malek, S.: COVERT: compositional analysis of android inter-app permission leakage. IEEE Trans. Software Eng. 41(9), 866\u2013886 (2015)","journal-title":"IEEE Trans. Software Eng."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Bhandari, S., Laxmi, V., Zemmari, A., Gaur, M.S.: Intersection automata based model for android application collusion. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 901\u2013908. IEEE (2016)","DOI":"10.1109\/AINA.2016.92"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11416-017-0296-4","volume":"14","author":"J Blasco","year":"2018","unstructured":"Blasco, J., Chen, T.M.: Automated generation of colluding apps for experimental research. J. Comput. Virol. Hacking Tech. 14(2), 127\u2013138 (2018)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bosu, A., Liu, F., Yao, D., Wang, G.: Collusive data leak and more: large-scale threat analysis of inter-app communications. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 71\u201385 (2017)","DOI":"10.1145\/3052973.3053004"},{"key":"1_CR5","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R.: XmanDroid: a new android evolution to mitigate privilege escalation attacks. Technische Universit\u00e4t Darmstadt, Technical Report TR-2011-04 (2011)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Casolare, R., Martinelli, F., Mercaldo, F., Santone, A.: Malicious collusion detection in mobile environment by means of model checking. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/IJCNN48605.2020.9207638"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Chen, L., Hou, S., Ye, Y.: SecureDroid: enhancing security of machine learning-based detection against adversarial android malware attacks. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 362\u2013372 (2017)","DOI":"10.1145\/3134600.3134636"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252 (2011)","DOI":"10.1145\/1999995.2000018"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/TMC.2018.2889495","volume":"19","author":"KO Elish","year":"2018","unstructured":"Elish, K.O., Cai, H., Barton, D., Yao, D., Ryder, B.G.: Identifying mobile inter-app communication risks. IEEE Trans. Mob. Comput. 19(1), 90\u2013102 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"He, Y., Li, Q.: Detecting and defending against inter-app permission leaks in android apps. In: 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/PCCC.2016.7820624"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification (2014). https:\/\/doi.org\/10.48550\/ARXIV.1408.5882. https:\/\/arxiv.org\/abs\/1408.5882","DOI":"10.48550\/ARXIV.1408.5882"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: IccTA: detecting inter-component privacy leaks in android apps. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 280\u2013291. IEEE (2015)","DOI":"10.1109\/ICSE.2015.48"},{"key":"1_CR13","unstructured":"Liu, P., Qiu, X., Huang, X.: Recurrent neural network for text classification with multi-task learning. arXiv preprint arXiv:1605.05101 (2016)"},{"issue":"10","key":"1_CR14","doi-asserted-by":"publisher","first-page":"5183","DOI":"10.1007\/s00521-020-05309-4","volume":"33","author":"A Mahindru","year":"2021","unstructured":"Mahindru, A., Sangal, A.: MLDroid-framework for android malware detection using machine learning techniques. Neural Comput. Appl. 33(10), 5183\u20135240 (2021)","journal-title":"Neural Comput. Appl."},{"key":"1_CR15","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402. PMLR (2018)"},{"issue":"6","key":"1_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1147\/JRD.2013.2284403","volume":"57","author":"D Sb\u00eerlea","year":"2013","unstructured":"Sb\u00eerlea, D., Burke, M.G., Guarnieri, S., Pistoia, M., Sarkar, V.: Automatic detection of inter-application permission leaks in android applications. IBM J. Res. Dev. 57(6), 10\u20131 (2013)","journal-title":"IBM J. Res. Dev."},{"issue":"6","key":"1_CR17","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1109\/TIFS.2016.2523912","volume":"11","author":"K Xu","year":"2016","unstructured":"Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252\u20131264 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, D., Jin, H., Yang, Y., Wu, D., Chen, W.: DeepFlow: deep learning-based malware detection by mining android application for abnormal usage of sensitive data. In: 2017 IEEE Symposium on Computers and Communications (ISCC), pp. 438\u2013443. IEEE (2017)","DOI":"10.1109\/ISCC.2017.8024568"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T06:55:04Z","timestamp":1730530504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}