{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T12:33:42Z","timestamp":1774701222264,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s10489-022-03523-2","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T05:04:36Z","timestamp":1650431076000},"page":"683-705","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image"],"prefix":"10.1007","volume":"53","author":[{"given":"Limin","family":"Shen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2687-2280","authenticated-orcid":false,"given":"Jiayin","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhongkui","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Dongkui","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuying","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,20]]},"reference":[{"key":"3523_CR1","unstructured":"Number of available applications in the Google Play Store from December 2009 to September 2020 (2020). https:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/https:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/https:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/"},{"key":"3523_CR2","unstructured":"Ericsson Mobility Report (2020) https:\/\/www.ericsson.com"},{"key":"3523_CR3","doi-asserted-by":"publisher","unstructured":"Sharma T, Rattan D (2021) Malicious application detection in android-a systematic literature review. Comput Sci Rev 40(5):100373. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100373","DOI":"10.1016\/j.cosrev.2021.100373"},{"key":"3523_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2018.12.014","volume":"133","author":"S Wang","year":"2019","unstructured":"Wang S, Chen Z, Yan Q, Yang B, Peng L, Jia Z (2019) A mobile malware detection method using behavior features in network traffic. J Netw Comput Appl 133:15\u201325. https:\/\/doi.org\/10.1016\/j.jnca.2018.12.014","journal-title":"J Netw Comput Appl"},{"key":"3523_CR5","doi-asserted-by":"publisher","unstructured":"Li W, Zi W, Cai J, Cheng S (2018) An android malware detection approach using weight-adjusted deep learning. 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE Computer Society. https:\/\/doi.org\/10.1109\/ICCNC.2018.8390391","DOI":"10.1109\/ICCNC.2018.8390391"},{"key":"3523_CR6","doi-asserted-by":"publisher","unstructured":"Mahindru A, Sangal AL (2020) Semidroid: a behavioral malware detector based on unsupervised machine learning techniques using feature selection approaches. International Journal of Machine Learning and Cybernetics. https:\/\/doi.org\/10.1007\/s13042-020-01238-9","DOI":"10.1007\/s13042-020-01238-9"},{"issue":"1","key":"3523_CR7","doi-asserted-by":"publisher","first-page":"454","DOI":"10.3837\/tiis.2018.01.022","volume":"12","author":"L Shiqi","year":"2018","unstructured":"Shiqi L, Shengwei T, Long Y, Jiong Y, Hua S (2018) Android malicious code classification using deep belief network. Ksii Trans Internet Inf Syst 12(1):454\u2013475. https:\/\/doi.org\/10.3837\/tiis.2018.01.022","journal-title":"Ksii Trans Internet Inf Syst"},{"key":"3523_CR8","doi-asserted-by":"publisher","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K (2014) DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket, Network & Distributed System Security Symposium. https:\/\/doi.org\/10.14722\/ndss.2014.23247","DOI":"10.14722\/ndss.2014.23247"},{"key":"3523_CR9","doi-asserted-by":"publisher","unstructured":"Arshad S, Shah MA, Wahid A, Mehmood A, Song H (2018) Samadroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access:1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2018.2792941","DOI":"10.1109\/ACCESS.2018.2792941"},{"key":"3523_CR10","doi-asserted-by":"publisher","unstructured":"Li J, Sun L, Yan Q, Li Z, Srisa-An W, Ye H (2018) Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics. https:\/\/doi.org\/10.1109\/TII.2017.2789219","DOI":"10.1109\/TII.2017.2789219"},{"key":"3523_CR11","doi-asserted-by":"publisher","unstructured":"Sabhadiya S, Barad J, Gheewala J (2019) Android malware detection using deep learning. In: 2019 3Rd international conference on trends in electronics and informatics. https:\/\/doi.org\/10.1109\/ICOEI.2019.8862633","DOI":"10.1109\/ICOEI.2019.8862633"},{"key":"3523_CR12","doi-asserted-by":"publisher","unstructured":"Mcgiff J, Hatcher WG, Nguyen J, Yu W, Lu C (2019) Towards multimodal learning for android malware detection, 2019 international conference on computing, networking and communications (ICNC). IEEE. https:\/\/doi.org\/10.1109\/ICCNC.2019.8685502","DOI":"10.1109\/ICCNC.2019.8685502"},{"key":"3523_CR13","doi-asserted-by":"publisher","unstructured":"Li W, Zi W, Cai J, Cheng S (2018) An android malware detection approach using weight-adjusted deep learning. 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE Computer Society. https:\/\/doi.org\/10.1109\/ICCNC.2018.8390391","DOI":"10.1109\/ICCNC.2018.8390391"},{"key":"3523_CR14","doi-asserted-by":"publisher","unstructured":"Kakavand M, Dabbagh M, Dehghantanha A (2018) Application of machine learning algorithms for android malware detection. Computational intelligence and intelligent systems. https:\/\/doi.org\/10.1145\/3293475.3293489","DOI":"10.1145\/3293475.3293489"},{"key":"3523_CR15","doi-asserted-by":"publisher","unstructured":"Lee WY, Saxe J, Harang R (2019) SeqDroid: obfuscated android malware detection using stacked convolutional and recurrent neural networks. Deep Learning Applications for Cyber Security. https:\/\/doi.org\/10.1007\/978-3-030-13057-2_9","DOI":"10.1007\/978-3-030-13057-2_9"},{"key":"3523_CR16","doi-asserted-by":"publisher","unstructured":"Zhu D, Xi T, Jing P, Zhang Y (2019) A transparent and multimodal malware detection method for android apps. Modeling, Analysis and Simulation of Wireless and Mobile Systems. https:\/\/doi.org\/10.1145\/3345768.3355915","DOI":"10.1145\/3345768.3355915"},{"key":"3523_CR17","doi-asserted-by":"publisher","unstructured":"Ding YX, Zhao WG, Wang Z, Wang LF (2018) Automaticlly learning featurs of android apps using CNN. 2018 International Conference on Machine Learning and Cybernetics. https:\/\/doi.org\/10.1109\/ICMLC.2018.8526935","DOI":"10.1109\/ICMLC.2018.8526935"},{"key":"3523_CR18","doi-asserted-by":"crossref","unstructured":"Hussain SJ, Ahmed U, Liaquat H, Mir S, Humayun M (2019) IMIAD: intelligent malware identification for android platform. 2019 International Conference on Computer and Information Sciences (ICCIS)","DOI":"10.1109\/ICCISci.2019.8716471"},{"key":"3523_CR19","unstructured":"Ming F, Xiapu L, Jun L, Meng W, Chunyin N, Qinghua Z, Ting L (2019) Graph embedding based familial analysis of android malware using unsupervised learning. 2019 IEEE\/ACM 41st International Conference on Software Engineering"},{"key":"3523_CR20","doi-asserted-by":"publisher","unstructured":"Gao T, Wei P, Sisodia D, Saha TK, Hasan MA (2018) Android malware detection via graphlet sampling. IEEE Transactions on Mobile Computing. https:\/\/doi.org\/10.1109\/TMC.2018.2880731","DOI":"10.1109\/TMC.2018.2880731"},{"key":"3523_CR21","doi-asserted-by":"publisher","unstructured":"Sa A, Saa B, Sy A (2019) Mining nested flow of dominant apis for detecting android malware. Computer networks. https:\/\/doi.org\/10.1016\/j.comnet.2019.107026","DOI":"10.1016\/j.comnet.2019.107026"},{"key":"3523_CR22","doi-asserted-by":"publisher","unstructured":"Ma Z, Ge H, Liu Y, Zhao M, Ma J (2019) A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896003","DOI":"10.1109\/ACCESS.2019.2896003"},{"key":"3523_CR23","doi-asserted-by":"crossref","unstructured":"Ge X, Pan Y, Fan Y, Fang C (2019) AMDroid: android malware detection using function call graphs. 2019 IEEE 19th International Conference on Software Quality Reliability and Security Companion (QRS-c)","DOI":"10.1109\/QRS-C.2019.00027"},{"key":"3523_CR24","doi-asserted-by":"publisher","unstructured":"Martinelli F, Marulli M, Mercaldo M (2017) Evaluating convolutional neural network for effective mobile malware detection. Procedia Computer Science. https:\/\/doi.org\/10.1016\/j.procs.2017.08.216","DOI":"10.1016\/j.procs.2017.08.216"},{"key":"3523_CR25","doi-asserted-by":"publisher","unstructured":"Xi X, Wang Z, Li Q, Xia S, Yong J (2017) Back-propagation neural network on markov chains from system call sequences: a new approach for detecting android malware with system call sequences. Iet Information Security. https:\/\/doi.org\/10.1049\/iet-ifs.2015.0211","DOI":"10.1049\/iet-ifs.2015.0211"},{"key":"3523_CR26","doi-asserted-by":"publisher","unstructured":"Liang H, Yan S, Da X (2017) An end-to-end model for Android malware detection. 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE. https:\/\/doi.org\/10.1109\/ISI.2017.8004891","DOI":"10.1109\/ISI.2017.8004891"},{"key":"3523_CR27","doi-asserted-by":"publisher","unstructured":"Hou S, Saas A, Chen L, Ye Y (2016) Deep4MalDroid: a deep learning framework for android malware detection based on linux kernel system call graphs. 2016 IEEE\/WIC\/ACM International Conference on Web Intelligence Workshops (WIW). ACM. https:\/\/doi.org\/10.1109\/WIW.2016.040","DOI":"10.1109\/WIW.2016.040"},{"key":"3523_CR28","doi-asserted-by":"publisher","unstructured":"Singh L, Hofmann M (2017) 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE Computer Society. https:\/\/doi.org\/10.1109\/INTELCCT.2017.8324010","DOI":"10.1109\/INTELCCT.2017.8324010"},{"key":"3523_CR29","doi-asserted-by":"crossref","unstructured":"Faruki P, Gaur MS, Laxmi V, Zemmari A (2016) MimeoDroid: large scale dynamic app analysis on cloned devices using machine learning classifiers. IEEE\/IFIP International Conference on Dependable Systems & Networks Workshop. IEEE","DOI":"10.1109\/DSN-W.2016.33"},{"key":"3523_CR30","doi-asserted-by":"publisher","unstructured":"Mahindru A, Paramvir S (2017) Dynamic permissions based android malware detection using machine learning techniques. In: Proceedings of the 10th Innovations in Software Engineering Conference (ISEC \u201917). Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/3021460.3021485","DOI":"10.1145\/3021460.3021485"},{"key":"3523_CR31","doi-asserted-by":"publisher","unstructured":"Yang M, Wang S, Ling Z, Liu Y, Ni Z (2017) Detection of malicious behavior in android apps through api calls and permission uses analysis. Concurr Comput Practice Exper:e4172. https:\/\/doi.org\/10.1002\/cpe.4172","DOI":"10.1002\/cpe.4172"},{"key":"3523_CR32","unstructured":"Vinod P, Shojafar M, Kumar N, Conti M (2019) Identification of android malware using refined system calls. Concurrency and Computation: Practice and Experience (2)"},{"key":"3523_CR33","doi-asserted-by":"publisher","unstructured":"Vp A, Az B, Mc C (2019) A machine learning based approach to detect malicious android apps using discriminant system calls. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2018.11.021","DOI":"10.1016\/j.future.2018.11.021"},{"key":"3523_CR34","doi-asserted-by":"publisher","unstructured":"Ali MA, Svetinovic D, Aung Z, Lukman S (2017) Malware detection in android mobile platform using machine learning algorithms. 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS). https:\/\/doi.org\/10.1109\/ICTUS.2017.8286109","DOI":"10.1109\/ICTUS.2017.8286109"},{"key":"3523_CR35","doi-asserted-by":"publisher","unstructured":"Borges P, Sousa B, Ferreira L, Saghezchi FB, Mantas G, Ribeiro J, et al. (2017) Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals. 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE. https:\/\/doi.org\/10.23919\/INM.2017.7987434","DOI":"10.23919\/INM.2017.7987434"},{"key":"3523_CR36","doi-asserted-by":"publisher","unstructured":"Kouliaridis V, Barmpatsalou K, Kambourakis G, Wang G (2018) Mal-Warehouse: a data collection-as-a-service of mobile malware behavioral patterns. The 15th IEEE International Conference on Ubiquitous Intelligence and Computing. IEEE. https:\/\/doi.org\/10.1109\/SmartWorld.2018.00260","DOI":"10.1109\/SmartWorld.2018.00260"},{"key":"3523_CR37","doi-asserted-by":"publisher","unstructured":"Gd B, Mf A, Fp B (2020) Malware detection in mobile environments based on autoencoders and api-images. Journal of Parallel and Distributed Computing. https:\/\/doi.org\/10.1016\/j.jpdc.2019.11.001","DOI":"10.1016\/j.jpdc.2019.11.001"},{"key":"3523_CR38","doi-asserted-by":"publisher","unstructured":"Xu S, Ma X, Liu Y, Qiang S (2017) Malicious application dynamic detection in real-time API analysis. IEEE International Conference on Internet of Things. IEEE. https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.166https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.166","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.166 10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.166"},{"key":"3523_CR39","doi-asserted-by":"publisher","unstructured":"Koli JD (2018) Randroid: Android malware detection using random machine learning classifiers. 2018 Technologies for Smart-City Energy Security and Power (ICSESP). https:\/\/doi.org\/10.1109\/ICSESP.2018.8376705","DOI":"10.1109\/ICSESP.2018.8376705"},{"key":"3523_CR40","doi-asserted-by":"publisher","unstructured":"Feng P, Ma J, Cong S, Xu X, Ma Y (2018) A novel dynamic android malware detection system with ensemble learning. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2018.2844349","DOI":"10.1109\/ACCESS.2018.2844349"},{"key":"3523_CR41","doi-asserted-by":"publisher","unstructured":"Qu Z, Alam S, Yan C, Zhou X, Riley R (2017) DyDroid: measuring dynamic code loading and its security implications in android applications. IEEE\/IFIP International Conference on Dependable Systems & Networks. IEEE. https:\/\/doi.org\/10.1109\/DSN.2017.14","DOI":"10.1109\/DSN.2017.14"},{"key":"3523_CR42","doi-asserted-by":"publisher","unstructured":"Brown J, Anwar M, Dozier G (2016) Detection of mobile malware: An Artificial Immunity Approach. Security & Privacy Workshops. IEEE. https:\/\/doi.org\/10.1109\/SPW.2016.32","DOI":"10.1109\/SPW.2016.32"},{"key":"3523_CR43","doi-asserted-by":"publisher","unstructured":"Cam NT, Phuoc N (2017) NeSeDroid: Android malware detection based on network traffic and sensitive resource accessing. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-10-1678-3_3","DOI":"10.1007\/978-981-10-1678-3_3"},{"key":"3523_CR44","doi-asserted-by":"publisher","unstructured":"Puerta J, Pastor-Lopez I, Sanz B, Bringas PG Network Traffic Analysis for Android Malware Detection. University of Deusto, Avenida de las Universidades 24, 48007 Bilbao, Spain. https:\/\/doi.org\/10.1007\/978-3-030-29859-3_40","DOI":"10.1007\/978-3-030-29859-3_40"},{"key":"3523_CR45","doi-asserted-by":"publisher","unstructured":"Wei W, Ming Z, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. 2017 International Conference on Information Networking (ICOIN). IEEE. https:\/\/doi.org\/10.1109\/ICOIN.2017.7899588","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"3523_CR46","doi-asserted-by":"publisher","unstructured":"Chen Z, Yan Q, Han H, Wang S, Peng L, Wang L, et al. (2018) Machine learning based mobile malware detection using highly imbalanced network traffic. Information ences. https:\/\/doi.org\/10.1016\/j.ins.2017.04.044","DOI":"10.1016\/j.ins.2017.04.044"},{"key":"3523_CR47","doi-asserted-by":"publisher","unstructured":"Taheri L, Kadir A, Lashkari AH (2019) Extensible android malware detection and family classification using network-flows and API-calls. 2019 International Carnahan Conference on Security Technology (ICCST). https:\/\/doi.org\/10.1109\/CCST.2019.8888430","DOI":"10.1109\/CCST.2019.8888430"},{"key":"3523_CR48","doi-asserted-by":"publisher","unstructured":"Lashkari AH, Kadir A, Taheri L, Ghorbani AA (2018) Toward developing a systematic approach to generate benchmark android malware datasets and classification. 2018 International Carnahan Conference on Security Technology (ICCST). https:\/\/doi.org\/10.1109\/CCST.2018.8585560","DOI":"10.1109\/CCST.2018.8585560"},{"key":"3523_CR49","doi-asserted-by":"publisher","unstructured":"Rahmat S, Niyaz Q, Mathur A, Sun W, Javaid AY (2019) Network traffic-based hybrid malware detection for smartphone and traditional networked systems. 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) IEEE. https:\/\/doi.org\/10.1109\/UEMCON47517.2019.8992934","DOI":"10.1109\/UEMCON47517.2019.8992934"},{"key":"3523_CR50","doi-asserted-by":"publisher","unstructured":"Arora A, Peddoju SK (2018) NTPDroid: a hybrid android malware detector using network traffic and system permissions. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00115","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00115"},{"key":"3523_CR51","doi-asserted-by":"publisher","unstructured":"Watkins L, Kalathummarath AL, Robinson WH (2017) Network-Based detection of mobile malware exhibiting obfuscated or silent network behavior. IEEE Consumer Communications & Networking Conference. IEEE. https:\/\/doi.org\/10.1109\/CCNC.2018.8319162","DOI":"10.1109\/CCNC.2018.8319162"},{"key":"3523_CR52","doi-asserted-by":"publisher","unstructured":"Gonzalez H, Stakhanova N, Ghorbani A (2014) DroidKin: Lightweight detection of android apps similarity. Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-23829-6_30","DOI":"10.1007\/978-3-319-23829-6_30"},{"key":"3523_CR53","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN et al (2017) Attention is all you need. https:\/\/arxiv.org\/abs\/1706.03762v5"},{"key":"3523_CR54","unstructured":"Kingma D, Ba J (2014) Adam: a method for stochastic optimization. Computer Science"},{"key":"3523_CR55","unstructured":"VirusTotal. (n. d.). VirusTotal. https:\/\/www.virustotal.com\/"},{"key":"3523_CR56","doi-asserted-by":"publisher","unstructured":"Qiu M, Xu S, Yung M, Zhang H (2015) Android Botnets: What URLs are telling us. International Conference on Network & System Security, Springer International Publishing https:\/\/doi.org\/10.1007\/978-3-319-25645-0","DOI":"10.1007\/978-3-319-25645-0"},{"key":"3523_CR57","doi-asserted-by":"publisher","unstructured":"Ravi K, Mallidi S, Santosh JK et al Bat optimization algorithm for wrapper-based feature selection and performance improvement of android malware detection[J]. IET Netw 2021(3). https:\/\/doi.org\/10.1049\/ntw2.12022","DOI":"10.1049\/ntw2.12022"},{"key":"3523_CR58","doi-asserted-by":"publisher","unstructured":"Gao H, Cheng S, Zhang W GDroid: Android Malware Detection and Classification with Graph Convolutional Network [J]. Computers & Security 2021. https:\/\/doi.org\/10.1016\/j.cose.2021.102264","DOI":"10.1016\/j.cose.2021.102264"},{"key":"3523_CR59","doi-asserted-by":"publisher","unstructured":"Imtiaz SI, et al. (2020) DeepAMD: detection and identification of android malware using high-efficient deep artificial neural network. Futur Gener Comput Syst 115. https:\/\/doi.org\/10.1016\/j.future.2020.10.008","DOI":"10.1016\/j.future.2020.10.008"},{"issue":"1","key":"3523_CR60","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1186\/s40537-020-00349-y","volume":"7","author":"J Tanha","year":"2020","unstructured":"Tanha J, Abdi Y, Samadi N, et al. (2020) Boosting methods for multi-class imbalanced data classification: an experimental review[J]. J Big Data 7(1):70. https:\/\/doi.org\/10.1186\/s40537-020-00349-y","journal-title":"J Big Data"},{"key":"3523_CR61","unstructured":"Benavoli A, Corani G, Demsar J, et al. (2016) Time for a change: a tutorial for comparing multiple classifiers through Bayesian analysis[J]. J Mach Learn Res:18"},{"key":"3523_CR62","unstructured":"Bishop C (2006) Pattern Recognition and Machine Learning [M]"},{"key":"3523_CR63","unstructured":"Matuszewski P, Kruschke JC (2015) Recenzja: Doing bayesian data analysis: a tutorial with R, Jags and Stan. Academic Press, San Diego, Kindle edition, ss. 776"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03523-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03523-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03523-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T04:43:23Z","timestamp":1672721003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03523-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,20]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["3523"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03523-2","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,20]]},"assertion":[{"value":"14 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}