{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:37:51Z","timestamp":1767908271691,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811063848","type":"print"},{"value":"9789811063855","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6385-5_23","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T14:03:52Z","timestamp":1505484232000},"page":"262-275","source":"Crossref","is-referenced-by-count":6,"title":["Android Malware Detection Using Local Binary Pattern and Principal Component Analysis"],"prefix":"10.1007","author":[{"given":"Qixin","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jinxin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Guangyi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Kuangsheng","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"key":"23_CR1","unstructured":"IDC: Smartphone OS Market Share (2016) Q3. http:\/\/www.idc.com\/promo\/smartphone-market-share\/os"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314 (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"23_CR3","unstructured":"Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic detection of capability leaks in stock android smartphones. In: Nineteenth Annual Network & Distributed System Security Symposium Ndss12 Isoc (2012)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Wang, R., Xing, L., Wang, X., Chen, S.: Unauthorized origin crossing on mobile platforms: threats and mitigation. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 635\u2013646 (2013)","DOI":"10.1145\/2508859.2516727"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"23_CR6","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off my market: detecting malicious apps in official and alternative android markets. In: Nineteenth Annual Network & Distributed System Security Symposium Ndss12 Isoc (2012)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Wei, F., Roy, S., Ou, X., Robby: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. In: 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1329\u20131341 (2014)","DOI":"10.1145\/2660267.2660357"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 421\u2013430 (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Manjunath, B.S.: SPAM: signal processing to analyze malware. J. IEEE Sig. Process. Mag. 33(2), 105\u2013117 (2016)","DOI":"10.1109\/MSP.2015.2507185"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Yegneswaran, V., Porras, P., Zhang, J.: A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In: 4th ACM Workshop on Security and Artificial Intelligence, pp. 21\u201330 (2011)","DOI":"10.1145\/2046684.2046689"},{"issue":"3","key":"23_CR11","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1023\/A:1011139631724","volume":"42","author":"A Olivia","year":"2001","unstructured":"Olivia, A., Torralba, A.: Modeling the shape of a scene: a holistic representation of the spatial envelope. J. Comput. Vis. 42(3), 145\u2013175 (2001)","journal-title":"J. Comput. Vis."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Rashidi, B., Fung, C., Vu, T.: RecDroid: a resource access permission control portal and recommendation service for smartphone users. In: ACM MobiCom Workshop on Security and Privacy in Mobile Environments, pp. 13\u201318 (2014)","DOI":"10.1145\/2646584.2646586"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: 18th ACM Conference on Computer and Communications Security, pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Anderson, B., et al.: Improving malware classification: bridging the static\/dynamic gap. In: 5th ACM Workshop on Security and Artificial Intelligence, pp. 3\u201314 (2012)","DOI":"10.1145\/2381896.2381900"},{"key":"23_CR15","unstructured":"Raman, K., et al.: Selecting features to classify malware. In: InfoSec Southwest, pp. 1\u20135 (2012)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: 16th ACM Conference on Computer and Communications Security (CCS), pp. 235\u2013245 (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Malware variant detection using opcode image recognition with small training sets. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20139 (2016)","DOI":"10.1109\/ICCCN.2016.7568542"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Grace, M., et al.: Riskranker: scalable and accurate zero-day android malware detection. In: 10th International Conference on Mobile Systems, Applications, and Services (MOBISYS), pp. 281\u2013294 (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"23_CR19","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICSSITE, vol. 127, pp. 86\u2013103. Springer, Cham (2013). doi: 10.1007\/978-3-319-04283-1_6"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Kong, D., et al.: Discriminant malware distance learning on structural information for automated malware classification. In: 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1357\u20131365 (2013)","DOI":"10.1145\/2487575.2488219"},{"key":"23_CR21","unstructured":"Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 393\u2013407 (2010)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326 (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"23_CR23","unstructured":"Kwong, L., Yin, Y.H.: Droidscope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: 21st USENIX Conference on Security Symposium USENIX Association, pp. 1\u201316 (2012)"},{"key":"23_CR24","unstructured":"Sophos mobile security threat report, mobile world congress. https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2014\/02\/mobileworldcongress2014.aspx"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.: Malware images: visualization and autmatic classification. In: International Symposium on Visualization for Cyber Security, pp. 1\u20137 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., Rieck, K.: Drebin: efficient and explainable detection of android malware in your pocket. In: 21th Annual Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Echtler, F., Schreck, T., Freling, F., Hoffmann, J.: MobileSandbox: looking deeper into android applications. In: 28th International ACM Symposium on Applied Computing (SAC) (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/3-540-45054-8_27","volume-title":"Computer Vision - ECCV 2000","author":"T Ojala","year":"2000","unstructured":"Ojala, T., Pietik\u00e4inen, M., M\u00e4enp\u00e4\u00e4, T.: Gray scale and rotation invariant texture classification with local binary patterns. In: Vernon, D. (ed.) ECCV 2000. LNCS, vol. 1842, pp. 404\u2013420. Springer, Heidelberg (2000). doi: 10.1007\/3-540-45054-8_27"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Malware variant detection using opcode image recognition. In: 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS), pp. 1175\u20131180 (2016)","DOI":"10.1109\/ICPADS.2016.0155"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6385-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T14:49:41Z","timestamp":1570114181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6385-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063848","9789811063855"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6385-5_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}