{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:55:48Z","timestamp":1743119748144,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819707973"},{"type":"electronic","value":"9789819707980"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0798-0_20","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:03:04Z","timestamp":1709193784000},"page":"344-357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Android Malware Detection Method Based on\u00a0Metapath Aggregated Graph Neural Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2532-045X","authenticated-orcid":false,"given":"Qingru","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5948-051X","authenticated-orcid":false,"given":"Yufei","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3888-8167","authenticated-orcid":false,"given":"Fangwei","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2054-9215","authenticated-orcid":false,"given":"Changguang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"issue":"2","key":"20_CR1","doi-asserted-by":"publisher","first-page":"100048","DOI":"10.1016\/j.hcc.2021.100048","volume":"2","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Chen, H., Zhang, Y., Han, M., Siddula, M., Cai, Z.: A survey on blockchain systems: attacks, defenses, and privacy preservation. High-Confidence Comput. 2(2), 100048 (2022)","journal-title":"High-Confidence Comput."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Zuo, C., Lin, Z., Zhang, Y.: Why does your data leak? Uncovering the data leakage in cloud from mobile apps. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1296\u20131310. IEEE (2019)","DOI":"10.1109\/SP.2019.00009"},{"issue":"6","key":"20_CR3","doi-asserted-by":"publisher","first-page":"e01802","DOI":"10.1016\/j.heliyon.2019.e01802","volume":"5","author":"EG Dada","year":"2019","unstructured":"Dada, E.G., Bassi, J.S., Chiroma, H., Adetunmbi, A.O., Ajibuwa, O.E.: Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6), e01802 (2019)","journal-title":"Heliyon"},{"key":"20_CR4","unstructured":"Zheng, X., Liu, Y., Pan, S., Zhang, M., Jin, D., Yu, P.: Graph neural networks for graphs with heterophily: a survey. arXiv preprint arXiv:2202.07082 (2022)"},{"issue":"1","key":"20_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Networks Learn. Syst. 32(1), 4\u201324 (2020)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Heterogeneous graph attention network. In: The World Wide Web Conference, pp. 2022\u20132032 (2019)","DOI":"10.1145\/3308558.3313562"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Fu, X., Zhang, J., Meng, Z., King, I.: MAGNN: metapath aggregated graph neural network for heterogeneous graph embedding. In: Proceedings of The Web Conference, vol. 2020, pp. 2331\u20132341 (2020)","DOI":"10.1145\/3366423.3380297"},{"issue":"3","key":"20_CR8","first-page":"228","volume":"2","author":"WZ Zarni Aung","year":"2013","unstructured":"Zarni Aung, W.Z.: Permission-based android malware detection. Int. J. Sci. Technol. Res. 2(3), 228\u2013234 (2013)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIminer: mining API-level features for robust malware detection in android. In: Security and Privacy in Communication Networks: 9th International ICST Conference, pp. 86\u2013103 (2013)","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C. E. R. T.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS), vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.procs.2022.03.086","volume":"201","author":"AS Shatnawi","year":"2022","unstructured":"Shatnawi, A.S., Yassen, Q., Yateem, A.: An android malware detection approach based on static feature analysis using machine learning algorithms. Procedia Comput. Science 201, 653\u2013658 (2022)","journal-title":"Procedia Comput. Science"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Mariconti, E., Onwuzurike, L., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building markov chains of behavioral models. arXiv preprint arXiv:1612.04433 (2016)","DOI":"10.14722\/ndss.2017.23353"},{"issue":"2","key":"20_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 1\u201329 (2014)","journal-title":"ACM Trans. Comput. Syst."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A., Chen, L., Ye, Y.: Deep4MalDroid: a deep learning framework for android malware detection based on Linux kernel system call graphs. In: 2016 IEEE\/WIC\/ACM International Conference on Web Intelligence Workshops (WIW), pp. 104\u2013111 (2016)","DOI":"10.1109\/WIW.2016.040"},{"issue":"7","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.3390\/sym13071107","volume":"13","author":"W Zhang","year":"2021","unstructured":"Zhang, W., Luktarhan, N., Ding, C., Lu, B.: Android malware detection using TCN with bytecode image. Symmetry 13(7), 1107 (2021)","journal-title":"Symmetry"},{"key":"20_CR16","unstructured":"Bai, S., Kolter, J. Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271 (2018)"},{"issue":"14","key":"20_CR17","doi-asserted-by":"publisher","first-page":"4966","DOI":"10.3390\/app10144966","volume":"10","author":"M Nisa","year":"2020","unstructured":"Nisa, M., et al.: Hybrid malware classification method using segmentation-based fractal texture analysis and deep convolution neural network features. Appl. Sci. 10(14), 4966 (2020)","journal-title":"Appl. Sci."},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"119593","DOI":"10.1016\/j.eswa.2023.119593","volume":"218","author":"H Zhu","year":"2023","unstructured":"Zhu, H., Wei, H., Wang, L., Xu, Z., Sheng, V.S.: An effective end-to-end android malware detection method. Expert Syst. Appl. 218, 119593 (2023)","journal-title":"Expert Syst. Appl."},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"102264","DOI":"10.1016\/j.cose.2021.102264","volume":"106","author":"H Gao","year":"2021","unstructured":"Gao, H., Cheng, S., Zhang, W.: GDroid: android malware detection and classification with graph convolutional network. Comput. Secur. 106, 102264 (2021)","journal-title":"Comput. Secur."},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: Hindroid: an intelligent android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1507\u20131515 (2017)","DOI":"10.1145\/3097983.3098026"},{"issue":"1","key":"20_CR21","doi-asserted-by":"publisher","first-page":"bbab515","DOI":"10.1093\/bib\/bbab515","volume":"23","author":"B Zhao","year":"2022","unstructured":"Zhao, B., Hu, L., You, Z., Wang, L., Su, X.: HINGRL: predicting drug-disease associations with graph representation learning on heterogeneous information networks. Briefings Bioinf. 23(1), bbab515 (2022)","journal-title":"Briefings Bioinf."},{"key":"20_CR22","unstructured":"Hei, Y., Yang, R., Peng, H.: HAWK: rapid android malware detection through heterogeneous graph attention networks. arXiv preprint arXiv:2108.07548 (2021)"},{"key":"20_CR23","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)"},{"key":"20_CR24","unstructured":"Sun, Z., Deng, Z., Nie, J., Tang, J.: Rotate: knowledge graph embedding by relational rotation in complex space. arXiv preprint arXiv:1902.10197 (2019)"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T. F., Klein, J., Le Traon, Y.: Androzoo: collecting millions of android APPs for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories, pp. 468\u2013471 (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-319-93037-4_16","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"D Zhang","year":"2018","unstructured":"Zhang, D., Yin, J., Zhu, X., Zhang, C.: MetaGraph2Vec: complex semantic path augmented heterogeneous network embedding. In: Phung, D., Tseng, V.S., Webb, G.I., Ho, B., Ganji, M., Rashidi, L. (eds.) PAKDD 2018. LNCS (LNAI), vol. 10938, pp. 196\u2013208. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93037-4_16"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Xu, K., Li, Y., Deng, R., Chen, K., Xu, J.: Droidevolver: self-evolving android malware detection system. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 47\u201362. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00014"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0798-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:08:15Z","timestamp":1709194095000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0798-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819707973","9789819707980"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0798-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tjutanklab.com\/ica3pp2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online submission system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"439","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}