{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:22:49Z","timestamp":1761805369391,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319697802"},{"type":"electronic","value":"9783319697819"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69781-9_5","type":"book-chapter","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T07:13:18Z","timestamp":1510038798000},"page":"43-55","source":"Crossref","is-referenced-by-count":7,"title":["An Adversarial Machine Learning Model Against Android Malware Evasion Attacks"],"prefix":"10.1007","author":[{"given":"Lingwei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Lifei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,8]]},"reference":[{"key":"5_CR1","unstructured":"Android: iOS combine for 91 percent of market. http:\/\/www.cnet.com"},{"key":"5_CR2","unstructured":"APKTool. http:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"5_CR4","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-03999-7_2","volume-title":"Applications of Supervised and Unsupervised Ensemble Methods","author":"B Biggio","year":"2009","unstructured":"Biggio, B., Fumera, G., Roli, F.: Evade hard multiple classifier systems. In: Okun, O., Valentini, G. (eds.) Applications of Supervised and Unsupervised Ensemble Methods. Studies in Computational Intelligence, pp. 15\u201338. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03999-7_2"},{"issue":"4","key":"5_CR5","first-page":"984","volume":"26","author":"B Biggio","year":"2014","unstructured":"Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE TKDE 26(4), 984\u2013996 (2014)","journal-title":"IEEE TKDE"},{"key":"5_CR6","first-page":"2617","volume":"13","author":"M Bruckner","year":"2012","unstructured":"Bruckner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. JMLR 13, 2617\u20132654 (2012)","journal-title":"JMLR"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Debarr, D., Sun, H., Wechsler, H.: Adversarial spam detection using the randomized hough transform-support vector machine. In: ICMLA 2013, pp. 299\u2013304 (2013)","DOI":"10.1109\/ICMLA.2013.61"},{"key":"5_CR8","unstructured":"Dex. http:\/\/www.openthefile.net\/extension\/dex"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: SPSM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"5_CR10","unstructured":"Haghtalab, N., Fang, F., Nguyen, T.H., Sinha, A., Procaccia, A.D., Tambe, M.: Three strategies to success: learning adversary models in security games. In: IJCAI (2016)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A., Chen, L., Ye, Y.: Deep4MalDroid: a deep learning framework for android malware detection based on linux kernel system call graphs. In: WIW (2016)","DOI":"10.1109\/WIW.2016.040"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-319-47121-1_5","volume-title":"Web-Age Information Management","author":"S Hou","year":"2016","unstructured":"Hou, S., Saas, A., Ye, Y., Chen, L.: DroidDelver: an android malware detection system using deep belief network based on API call blocks. In: Song, S., Tong, Y. (eds.) WAIM 2016. LNCS, vol. 9998, pp. 54\u201366. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47121-1_5"},{"key":"5_CR13","unstructured":"IDC. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS25500515"},{"key":"5_CR14","unstructured":"Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: CEAS 2009 (2009)"},{"key":"5_CR15","unstructured":"Li, B., Vorobeychik, Y., Chen, X.: A general retraining framework for adversarial classification. In: NIPS 2016 (2016)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: KDD, pp. 641\u2013647 (2005)","DOI":"10.1145\/1081870.1081950"},{"issue":"8","key":"5_CR17","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H Peng","year":"2005","unstructured":"Peng, H., Long, F., Ding, C.: Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27(8), 1226\u20131238 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-41822-8_1","volume-title":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","author":"F Roli","year":"2013","unstructured":"Roli, F., Biggio, B., Fumera, G.: Pattern recognition systems under attack. In: Ruiz-Shulcloper, J., Sanniti di Baja, G. (eds.) CIARP 2013. LNCS, vol. 8258, pp. 1\u20138. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41822-8_1"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"\u0160rndic, N., Laskov, P.: Practical evasion of a learning-based classifier: a case study. In: SP (2014)","DOI":"10.1109\/SP.2014.20"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Wang, F., Liu, W., Chawla, S.: On sparse feature attacks in adversarial learning. In: ICDM 2014 (2014)","DOI":"10.1109\/ICDM.2014.117"},{"key":"5_CR21","volume-title":"Internet Security Threat Report 2015","author":"P Wood","year":"2015","unstructured":"Wood, P.: Internet Security Threat Report 2015. Symantec, California (2015)"},{"key":"5_CR22","unstructured":"Woodbury, M.A.: Inverting modified matrices. Statistical Research Group, Princeton University, Princeton, NJ (1950)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Wu, D., Mao, C., Wei, T., Lee, H., Wu, K.: DroidMat: android malware detection through manifest and API calls tracing. In: Asia JCIS (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Wu, W., Hung, S.: DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. In: RACS (2014)","DOI":"10.1145\/2663761.2664223"},{"key":"5_CR25","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TST.2013.6574680","volume":"18","author":"J Xu","year":"2013","unstructured":"Xu, J., Yu, Y., Chen, Z., Cao, B., Dong, W., Guo, Y., Cao, J.: MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining. Tsinghua Sci. Technol. 18, 418\u2013427 (2013)","journal-title":"Tsinghua Sci. Technol."},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-11203-9_10","volume-title":"Computer Security - ESORICS 2014","author":"C Yang","year":"2014","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in android applications. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 163\u2013182. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_10"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, D., Li, T., Ye, D.: IMDS: intelligent malware detection system. In: KDD 2007 (2007)","DOI":"10.1145\/1281192.1281308"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, T., Zhu, S., Zhuang, W., Tas, E., Gupta, U., Abdulhayoglu, M.: Combining file content and file relations for cloud based malware detection. In: KDD 2011, pp. 222\u2013230 (2011)","DOI":"10.1145\/2020408.2020448"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Yuan, Z., Lu, Y., Wang, Z., Xue, Y.: Droid-Sec: deep learning in android malware detection. In: SIGCOMM (2014)","DOI":"10.1145\/2619239.2631434"},{"issue":"3","key":"5_CR30","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TCYB.2015.2415032","volume":"46","author":"F Zhang","year":"2015","unstructured":"Zhang, F., Chan, P.P.K., Biggio, B., Yeung, D.S., Roli, F.: Adversarial feature selection against evasion attacks. IEEE Trans. Cybern. 46(3), 766\u2013777 (2015)","journal-title":"IEEE Trans. Cybern."}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69781-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T15:09:51Z","timestamp":1570288191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69781-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319697802","9783319697819"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69781-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}