{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T07:14:27Z","timestamp":1770448467139,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319471204","type":"print"},{"value":"9783319471211","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47121-1_5","type":"book-chapter","created":{"date-parts":[[2016,10,14]],"date-time":"2016-10-14T14:22:58Z","timestamp":1476454978000},"page":"54-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks"],"prefix":"10.1007","author":[{"given":"Shifu","family":"Hou","sequence":"first","affiliation":[]},{"given":"Aaron","family":"Saas","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Lifei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,15]]},"reference":[{"key":"5_CR1","unstructured":"APE: a smart automatic testing environment for android malware. https:\/\/books.google.com\/books?id=hUYDrgEACAAJ"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: SPSM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"5_CR3","unstructured":"APKTool. http:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-319-11203-9_10","volume-title":"Computer Security - ESORICS 2014","author":"C Yang","year":"2014","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in android applications. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 163\u2013182. Springer, Heidelberg (2014)"},{"key":"5_CR5","unstructured":"Dalvik Opcodes. http:\/\/pallergabor.uw.hu\/androidblog\/dalvik_opcodes.html"},{"key":"5_CR6","unstructured":"Dex. http:\/\/www.openthefile.net\/extension\/dex"},{"key":"5_CR7","unstructured":"DroidBox. https:\/\/github.com\/pjlantz\/droidbox"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Wu, D., Mao, C., Wei, T., Lee, H., DroidMat, K.: Android malware detection through manifest and API calls tracing. In: ASIA JCIS (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"5_CR9","unstructured":"G DATA. Mobile malware report for the fourth quarter of 2015. https:\/\/www.gdata-software.com"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1126\/science.7761831","volume":"268","author":"GE Hinton","year":"1995","unstructured":"Hinton, G.E., Dayan, P., Frey, B.J., Neal, R.M.: The wake-sleep algorithm for unsupervised neural networks. Science 268, 1158\u20131161 (1995)","journal-title":"Science"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Osindero, S., Teh, Y.: A fast learning algorithm for deep belief nets. Neural Comput. 18, 1527\u20131554 (2006)","journal-title":"Neural Comput."},{"key":"5_CR12","unstructured":"Peng, H., Long, F., Ding, C.: Feature selection based on mutualinformation: criteria of max-dependency, max-relevance, and min-redundancy. In: TPAMI (2005)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: SPSM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"5_CR14","unstructured":"IDC. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS25500515"},{"key":"5_CR15","unstructured":"IDC. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TST.2013.6574680","volume":"18","author":"J Xu","year":"2013","unstructured":"Xu, J., Yu, Y., Chen, Z., Cao, B., Dong, W., Guo, Y., Cao, J.: MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining. Tsinghua Sci. Technol. 18, 418\u2013427 (2013)","journal-title":"Tsinghua Sci. Technol."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23145"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Dimjasevic, M., Atzeni, S., Ugrina, I., Rakamaric, Z.: Evaluation of android malware detection based on system calls. In: IWSPA (2016)","DOI":"10.1145\/2875475.2875487"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Dimjasevic, M., Atzeni, S., Ugrina, I., Rakamaric Z.: Android malware detection based on system calls. In: UUCS (2015)","DOI":"10.1145\/2875475.2875487"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Peiravian, N., Zhu, X.: Machine learning for android malware detection using permission and API calls. In: ICDM (2013)","DOI":"10.1109\/ICTAI.2013.53"},{"key":"5_CR21","unstructured":"Ransomware. https:\/\/containment.comodo.com\/why-comodo\/ransomware.php"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Collobert, R., Weston, J.: A unified architecture for natural language processing: deep neural networks with multitask learning. In: ICML (2008)","DOI":"10.1145\/1390156.1390177"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Wu, W., Hung, S.: DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. In: RACS (2014)","DOI":"10.1145\/2663761.2664223"},{"key":"5_CR24","unstructured":"Xu, J., Sung, A., Chavez, P., Mukkamala, S.: Polymorphic malicious executable scanner by API sequence analysis. In: HIS (2004)"},{"issue":"1","key":"5_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio, Y.: Learning deep architectures for AI. Found. Trends Mach. Learn. 2(1), 1\u2013127 (2009)","journal-title":"Found. Trends Mach. Learn."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Bengio, Y., Lamblin, P., Popovici, D., Larochelle, H.: Greedy layer-wise training of deep networks. In: NIPS (2007)","DOI":"10.7551\/mitpress\/7503.003.0024"},{"issue":"2","key":"5_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TITS.2014.2345663","volume":"16","author":"Y Lv","year":"2014","unstructured":"Lv, Y., Duan, Y., Kang, W., Li, Z., Wang, F.: Traffic flow prediction with big data: a deep learning approach. Intell. Transp. Syst. 16(2), 1\u20139 (2014)","journal-title":"Intell. Transp. Syst."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: intelligent malware detection system. In: SIGKD (2007)","DOI":"10.1145\/1281192.1281308"}],"container-title":["Lecture Notes in Computer Science","Web-Age Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47121-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:07:26Z","timestamp":1709820446000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-47121-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319471204","9783319471211"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47121-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web-Age Information Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanchang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waim2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}