{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:48:56Z","timestamp":1773316136795,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562084","type":"print"},{"value":"9789819562091","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6209-1_23","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:25:09Z","timestamp":1767320709000},"page":"424-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dual Modal Featuring Scheme for\u00a0Learning Based Android Malware Prevention"],"prefix":"10.1007","author":[{"given":"Jiaxiong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jinchuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shuaishuai","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Zehua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junhang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Qiannan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Haowen","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Wei, F., Lin, X., Ou, X., Chen, T., Zhang, X.: JN-SAF: precise and efficient NDK\/JNI-aware inter-language static analysis framework for security vetting of android applications with native code. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1137\u20131150 (2018)","DOI":"10.1145\/3243734.3243835"},{"key":"23_CR2","unstructured":"Wong, M.Y., Lie, D.: Tackling runtime-based obfuscation in android with $$\\{$$TIRO$$\\}$$. In: 27th USENIX Security Symposium (USENIX security 18), pp. 1247\u20131262 (2018)"},{"issue":"1","key":"23_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50\u201357 (2009)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"23_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TDSC.2016.2536605","volume":"15","author":"A Saracino","year":"2016","unstructured":"Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: Madam: effective and efficient behavior-based android malware detection and prevention. IEEE Trans. Dependable Secur. Comput. 15(1), 83\u201397 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"104219","DOI":"10.1016\/j.cose.2024.104219","volume":"150","author":"S Wang","year":"2025","unstructured":"Wang, S., Haiyong, W., Ning, L., Shi, W., Liu, Z.: ATSDetector: an android trojan spyware detection approach with multi-features. Comput. Secur. 150, 104219 (2025)","journal-title":"Comput. Secur."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Eltaher, A., Hashem, D., Alawneh, H., et\u00a0al.: Design and implementation of a malware detection tool using network traffic analysis in android-based devices. In: 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 276\u2013280. IEEE (2023)","DOI":"10.1109\/JEEIT58638.2023.10185826"},{"issue":"6","key":"23_CR7","doi-asserted-by":"publisher","first-page":"6177","DOI":"10.1007\/s11276-023-03414-5","volume":"30","author":"F Ullah","year":"2024","unstructured":"Ullah, F., Ullah, S., Srivastava, G., Chun-Wei Lin, J., Zhao, Y.: NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble. Wirel. Netw. 30(6), 6177\u20136198 (2024)","journal-title":"Wirel. Netw."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Jiang, J., Yin, Q., Shi, Z., Li, M.: Comprehensive behavior profiling model for malware classification. In: 2018 IEEE Symposium on Computers and Communications (ISCC), pp. 00129\u201300135. IEEE (2018)","DOI":"10.1109\/ISCC.2018.8538582"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s11042-017-5104-0","volume":"78","author":"X Xiao","year":"2019","unstructured":"Xiao, X., Zhang, S., Mercaldo, F., Hu, G., Sangaiah, A.K.: Android malware detection based on system call sequences and LSTM. Multimedia Tools Appl. 78, 3979\u20133999 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"117200","DOI":"10.1016\/j.eswa.2022.117200","volume":"206","author":"A Guerra-Manzanares","year":"2022","unstructured":"Guerra-Manzanares, A., Luckner, M., Bahsi, H.: Android malware concept drift using system calls: detection, characterization and challenges. Expert Syst. Appl. 206, 117200 (2022)","journal-title":"Expert Syst. Appl."},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326 (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Alfred Raja Melvin, A., Kathrine, J.W., Jeyabose, A., Cenitta, D.: A deep learning model leveraging time-series system call data to detect malware attacks in virtual machines. Int. J. Comput. Intell. Syst. 18(1), 58 (2025)","DOI":"10.1007\/s44196-025-00781-z"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"113581","DOI":"10.1016\/j.eswa.2020.113581","volume":"159","author":"R Surendran","year":"2020","unstructured":"Surendran, R., Thomas, T., Emmanuel, S.: Gsdroid: graph signal based compact feature representation for android malware detection. Expert Syst. Appl. 159, 113581 (2020)","journal-title":"Expert Syst. Appl."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"John, T.S., Thomas, T., Emmanuel, S.: Graph convolutional networks for android malware detection with system call graphs. In: 2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP), pp. 162\u2013170. IEEE (2020)","DOI":"10.1109\/ISEA-ISAP49340.2020.235015"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"104262","DOI":"10.1016\/j.cose.2024.104262","volume":"150","author":"S Zhang","year":"2025","unstructured":"Zhang, S., Heng, S., Liu, H., Yang, W.: Mpdroid: a multimodal pre-training android malware detection method with static and dynamic features. Comput. Secur. 150, 104262 (2025)","journal-title":"Comput. Secur."},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.1109\/TIFS.2019.2950134","volume":"15","author":"A Arora","year":"2019","unstructured":"Arora, A., Peddoju, S.K., Conti, M.: PermPair. Android malware detection using permission pairs. IEEE Trans. Inf. Forensics Secur. 15, 1968\u20131982 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Fan, M., et al.: Graph embedding based familial analysis of android malware using unsupervised learning. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 771\u2013782. IEEE (2019)","DOI":"10.1109\/ICSE.2019.00085"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Wu, Y., Li, X., Zou, D., Yang, W., Zhang, X., Jin, H.: Malscan: fast market-wide mobile malware scanning by social-network centrality analysis. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 139\u2013150. IEEE (2019)","DOI":"10.1109\/ASE.2019.00023"},{"issue":"2","key":"23_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313391","volume":"22","author":"L Onwuzurike","year":"2019","unstructured":"Onwuzurike, L., Mariconti, E., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building Markov chains of behavioral models (extended version). ACM TOPS 22(2), 1\u201334 (2019)","journal-title":"ACM TOPS"},{"issue":"4","key":"23_CR20","doi-asserted-by":"publisher","first-page":"789","DOI":"10.3390\/electronics12040789","volume":"12","author":"T Liu","year":"2023","unstructured":"Liu, T., Li, Z., Long, H., Bilal, A.: NT-GNN: network traffic graph for 5G mobile IoT android malware detection. Electronics 12(4), 789 (2023)","journal-title":"Electronics"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Cao, X., Luo, Q., Liu, J.Z.: Bit-level malicious traffic detection based on Markov images and deep learning. In: 2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI), pp. 1148\u20131153. IEEE (2022)","DOI":"10.1109\/PRAI55851.2022.9904087"},{"key":"23_CR22","unstructured":"Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H., Ng, A.Y., et al.: Multimodal deep learning. In: ICML, vol. 11, pp. 689\u2013696 (2011)"},{"issue":"1","key":"23_CR23","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1049\/ise2.12082","volume":"17","author":"W Yafei","year":"2023","unstructured":"Yafei, W., Shi, J., Wang, P., Zeng, D., Sun, C.: DeepCatra: learning flow-and graph-based behaviours for android malware detection. IET Inf. Secur. 17(1), 118\u2013130 (2023)","journal-title":"IET Inf. Secur."},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"121617","DOI":"10.1016\/j.eswa.2023.121617","volume":"237","author":"S Chen","year":"2024","unstructured":"Chen, S., Lang, B., Liu, H., Chen, Y., Song, Y.: Android malware detection method based on graph attention networks and deep fusion of multimodal features. Expert Syst. Appl. 237, 121617 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"23_CR25","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2018","unstructured":"Kim, T., Kang, B., Rho, M., Sezer, S., Im, E.G.: A multimodal deep learning method for android malware detection using various features. IEEE Trans. Inf. Forensics Secur. 14(3), 773\u2013788 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Millar, S., McLaughlin, N., Martinez\u00a0del Rincon, J., Miller, P., Zhao, Z.: Dandroid: a multi-view discriminative adversarial network for obfuscated android malware detection. In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 353\u2013364 (2020)","DOI":"10.1145\/3374664.3375746"},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"102670","DOI":"10.1016\/j.cose.2022.102670","volume":"116","author":"E Amer","year":"2022","unstructured":"Amer, E., El-Sappagh, S.: Robust deep learning early alarm prediction model based on the behavioural smell for android malware. Comput. Secur. 116, 102670 (2022)","journal-title":"Comput. Secur."},{"key":"23_CR28","first-page":"633","volume":"2022","author":"X Lin","year":"2022","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Jing, Yu.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. Proc. ACM Web Conf. 2022, 633\u2013642 (2022)","journal-title":"Proc. ACM Web Conf."},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), pp. 4171\u20134186 (2019)","DOI":"10.18653\/v1\/N19-1423"},{"issue":"1","key":"23_CR30","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"S Mahdavifar","year":"2022","unstructured":"Mahdavifar, S., Alhadidi, D., Ghorbani, A.A.: Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder. J. Netw. Syst. Manag. 30(1), 22 (2022)","journal-title":"J. Netw. Syst. Manag."},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y.: Androzoo: collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories, pp. 468\u2013471 (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"23_CR32","unstructured":"VirusShare. VirusShare: a repository of malware samples. https:\/\/virusshare.com\/. Accessed April 2025"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Siemens, K.R.: Effective and explainable detection of android malware in your pocket. In: NDSS, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Sun, T., et al.: Detectbert: towards full app-level representation learning to detect android malware. In: Proceedings of the 18th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 420\u2013426 (2024)","DOI":"10.1145\/3674805.3690745"},{"key":"23_CR35","doi-asserted-by":"publisher","unstructured":"Daoudi, N., Samhi, J., Kabore, A.K., Allix, K., Bissyand\u00e9, T.F., Klein, J.: DexRay: a simple, yet effective deep learning approach to android malware detection based on image representation of bytecode. In: Wang, G., Ciptadi, A., Ahmadzadeh, A. (eds.) MLHat 2021. CCIS, vol. 1482, pp. 81\u2013106. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87839-9_4","DOI":"10.1007\/978-3-030-87839-9_4"},{"key":"23_CR36","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)"},{"key":"23_CR37","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6209-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:42:58Z","timestamp":1773250978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6209-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562084","9789819562091"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6209-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}