{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T23:42:08Z","timestamp":1768866128577,"version":"3.49.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s10515-025-00569-7","type":"journal-article","created":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T05:34:50Z","timestamp":1761716090000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MalModel: hiding malicious payload in mobile deep learning models with black-box backdoor attack"],"prefix":"10.1007","volume":"33","author":[{"given":"Jiayi","family":"Hua","sequence":"first","affiliation":[]},{"given":"Kailong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Meizhen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,29]]},"reference":[{"key":"569_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: Droidapiminer: Mining api-level features for robust malware detection in android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) Security and Privacy in Communication Networks, pp. 86\u2013103. Springer, Cham (2013)"},{"key":"569_CR2","doi-asserted-by":"publisher","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23247","DOI":"10.14722\/ndss.2014.23247"},{"key":"569_CR3","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"569_CR4","unstructured":"b3dk7: StegExpose (2018). https:\/\/github.com\/b3dk7\/StegExpose"},{"key":"569_CR5","unstructured":"BLVC: caffe (2020). https:\/\/github.com\/BVLC\/caffe"},{"key":"569_CR6","doi-asserted-by":"publisher","unstructured":"Bostani, H., Moonsamy, V.: EvadeDroid: a practical evasion attack on machine learning for black-box android malware detection (2021). https:\/\/doi.org\/10.48550\/ARXIV.2110.03301. arXiv:2110.03301","DOI":"10.48550\/ARXIV.2110.03301"},{"key":"569_CR7","unstructured":"Chen, B., Carvalho, W., Baracaldo, N., Ludwig, H., Edwards, B., Lee, T., Molloy, I., Srivastava, B.: Detecting backdoor attacks on deep neural networks by activation clustering (2018). arXiv:1811.03728"},{"key":"569_CR8","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/TIFS.2019.2932228","volume":"15","author":"X Chen","year":"2020","unstructured":"Chen, X., Li, C., Wang, D., Wen, S., Zhang, J., Nepal, S., Xiang, Y., Ren, K.: Android hiv: a study of repackaging malware for evading machine-learning detection. IEEE Trans. Inform. Forensics Secur. 15, 987\u20131001 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2932228","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"569_CR9","doi-asserted-by":"publisher","unstructured":"Chaganti, R., Ravi, V., Alazab, M., Pham, T.D.: Stegomalware: a systematic survey of MalwareHiding and detection in images, machine LearningModels and research challenges (2021). https:\/\/doi.org\/10.48550\/ARXIV.2110.02504. arXiv:2110.02504","DOI":"10.48550\/ARXIV.2110.02504"},{"key":"569_CR10","unstructured":"dana-at-cp: backdoor-apk (2018). https:\/\/github.com\/dana-at-cp\/backdoor-apk"},{"key":"569_CR11","doi-asserted-by":"publisher","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Conference on computer vision and pattern recognition, pp. 248\u2013255 (2009). https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"569_CR12","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, IEEE, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"569_CR13","doi-asserted-by":"publisher","unstructured":"Dumitrescu, S., Wu, X., Memon, N.: On steganalysis of random lsb embedding in continuous-tone images. In: Proceedings of the international conference on image processing, vol. 3, pp. 641\u20136443 (2002). https:\/\/doi.org\/10.1109\/ICIP.2002.1039052","DOI":"10.1109\/ICIP.2002.1039052"},{"key":"569_CR14","doi-asserted-by":"crossref","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of lsb steganography via sample pair analysis. IH \u201902, pp. 355\u2013372 (2002)","DOI":"10.1007\/3-540-36415-3_23"},{"key":"569_CR15","doi-asserted-by":"publisher","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2) (2014). https:\/\/doi.org\/10.1145\/2619091","DOI":"10.1145\/2619091"},{"key":"569_CR16","doi-asserted-by":"publisher","unstructured":"Feng, Y., Bastani, O., Martins, R., Dillig, I., Anand, S.: Automated synthesis of semantic malware signatures using maximum satisfiability. In: Annual symposium on network and distributed system security (2017). https:\/\/doi.org\/10.14722\/ndss.2017.23379","DOI":"10.14722\/ndss.2017.23379"},{"key":"569_CR17","doi-asserted-by":"publisher","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable detection of lsb steganography in color and grayscale images. MM& Sec \u201901, pp. 27\u201330 (2001). https:\/\/doi.org\/10.1145\/1232454.1232466","DOI":"10.1145\/1232454.1232466"},{"key":"569_CR18","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: Badnets: identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733 (2017)"},{"key":"569_CR19","unstructured":"Google: TensorFlow (2022). https:\/\/www.tensorflow.org\/"},{"key":"569_CR20","unstructured":"Google: TensorFlow Lite (2022). https:\/\/www.tensorflow.org\/lite"},{"key":"569_CR21","doi-asserted-by":"publisher","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th international conference on mobile systems, applications, and services. MobiSys \u201912, pp. 281\u2013294. Association for Computing Machinery, New York, NY, USA (2012). https:\/\/doi.org\/10.1145\/2307636.2307663","DOI":"10.1145\/2307636.2307663"},{"key":"569_CR22","unstructured":"Howard, J.: imagenette (2021). https:\/\/github.com\/fastai\/imagenette\/"},{"key":"569_CR23","doi-asserted-by":"publisher","unstructured":"Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: Hindroid: An intelligent android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201917, pp. 1507\u20131515. Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3097983.3098026","DOI":"10.1145\/3097983.3098026"},{"key":"569_CR24","unstructured":"Jung, J., Jeon, C., Wolotsky, M., Yun, I., Kim, T.: AVPASS: leaking and bypassing antivirus detection model automatically. In: Black Hat USA Briefings (Black Hat USA), Las Vegas, NV (2017)"},{"key":"569_CR25","unstructured":"Jung, J., Jeon, C., Wolotsky, M., Yun, I., Kim, T.: AVPASS: leaking and bypassing antivirus detection model automatically. In: Black Hat USA Briefings (Black Hat USA), Las Vegas, NV (2017)"},{"key":"569_CR26","unstructured":"Nambiar: introduction to mobile computing (2021). https:\/\/www.analyticssteps.com\/blogs\/introduction-mobile-computing"},{"key":"569_CR27","volume-title":"Deeplocker\u2013concealing targeted attacks with ai locksmithing","author":"JJD Kirat","year":"2018","unstructured":"Kirat, J.J.D., Stoecklin, M.P.: Deeplocker\u2013concealing targeted attacks with ai locksmithing. Technical report, IBM Research (2018)"},{"key":"569_CR28","unstructured":"keras-team: keras applications (2022). https:\/\/github.com\/keras-team\/keras\/tree\/master\/keras\/applications"},{"key":"569_CR29","unstructured":"Lakshmanan, R.: Beware! New Android Malware Hacks Thousands of Facebook Accounts (2021). https:\/\/thehackernews.com\/2021\/08\/beware-new-android-malware-hacks.html"},{"key":"569_CR30","unstructured":"Liu, Y., Deng, G., Li, Y., Wang, K., Zhang, T., Liu, Y., Wang, H., Zheng, Y., Liu, Y.: Prompt Injection attack against LLM-integrated Applications (2023)"},{"key":"569_CR31","doi-asserted-by":"publisher","unstructured":"Li, Y., Hua, J., Wang, H., Chen, C., Liu, Y.: Deeppayload: Black-box backdoor attack on deep learning models through neural payload injection. In: Proceedings of the 43rd International Conference on Software Engineering. ICSE \u201921, pp. 263\u2013274. IEEE Press (2021). https:\/\/doi.org\/10.1109\/ICSE43902.2021.00035","DOI":"10.1109\/ICSE43902.2021.00035"},{"key":"569_CR32","doi-asserted-by":"publisher","unstructured":"Liu, T., Liu, Z., Liu, Q., Wen, W., Xu, W., Li, M.: Stegonet: Turn deep neural network into a stegomalware. In: Annual computer security applications conference. ACSAC \u201920, pp. 928\u2013938. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3427228.3427268","DOI":"10.1145\/3427228.3427268"},{"key":"569_CR33","doi-asserted-by":"crossref","unstructured":"Liu, X., Li, M., Wang, H., Hu, S., Ye, D., Jin, H., Wu, L., Xiao, C.: Detecting backdoors during the inference stage based on corruption robustness consistency. In: Proceedings of the IEEE\/CVF conference on Computer Vision and Pattern Recognition (CVPR), pp. 16363\u201316372 (2023)","DOI":"10.1109\/CVPR52729.2023.01570"},{"key":"569_CR34","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of International Conference on Computer Vision (ICCV) (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"569_CR35","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ma, S., Aafer, Y., Lee, W.-C., Zhai, J., Wang, W., Zhang, X.: Trojaning attack on neural networks. In: 25th Annual Network and Distributed System Security Symposium (NDSS), pp. 18\u2013221 (2018)","DOI":"10.14722\/ndss.2018.23291"},{"key":"569_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Computer Vision \u2013 ECCV 2020, pp. 182\u2013199. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"569_CR37","doi-asserted-by":"crossref","unstructured":"Li, N., Wang, S., Feng, M., Wang, K., Wang, M., Wang, H.: Malwukong: Towards fast, accurate, and multilingual detection of malicious code poisoning in oss supply chains. In: 2023 38th IEEE\/ACM international conference on Automated Software Engineering (ASE), pp. 1993\u20132005 (2023)","DOI":"10.1109\/ASE56229.2023.00073"},{"key":"569_CR38","doi-asserted-by":"publisher","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206\u20134210 (2014). https:\/\/doi.org\/10.1109\/ICIP.2014.7025854","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"569_CR39","doi-asserted-by":"crossref","unstructured":"Li, H., Xu, G., Wang, L., Xiao, X., Luo, X., Xu, G., Wang, H.: Malcertain: enhancing deep neural network based android malware detection by tackling prediction uncertainty. In: Proceedings of the 46th International Conference on Software Engineering. ICSE \u201924 (2024)","DOI":"10.1145\/3597503.3639122"},{"key":"569_CR40","unstructured":"malmodel: MalModel (2023). https:\/\/github.com\/hjygh\/MalModel"},{"key":"569_CR41","unstructured":"Mascellino, A.: Android Banking Trojan SOVA Comes Back With New Features Including Ransomware (2022). https:\/\/www.infosecurity-magazine.com\/news\/android-banking-trojan-sova-back\/"},{"key":"569_CR42","doi-asserted-by":"publisher","unstructured":"McLaughlin, N., Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doup\u00e9, A., Joon\u00a0Ahn, G.: Deep android malware detection. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. CODASPY \u201917, pp. 301\u2013308. Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3029806.3029823","DOI":"10.1145\/3029806.3029823"},{"key":"569_CR43","doi-asserted-by":"crossref","unstructured":"Mo, X., Zhang, Y., Zhang, L.Y., Luo, W., Sun, N., Hu, S., Gao, S., Xiang, Y.: Robust backdoor detection for deep learning via topological evolution dynamics. In: 2024 IEEE symposium on Security and Privacy (SP), IEEE Computer Society, pp. 171\u2013171 (2024)","DOI":"10.1109\/SP54263.2024.00174"},{"key":"569_CR44","unstructured":"n1nj4sec: pupy (2021). https:\/\/github.com\/n1nj4sec\/pupy"},{"key":"569_CR45","doi-asserted-by":"publisher","unstructured":"Onwuzurike, L., Mariconti, E., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. 22(2) (2019). https:\/\/doi.org\/10.1145\/3313391","DOI":"10.1145\/3313391"},{"key":"569_CR46","doi-asserted-by":"publisher","unstructured":"Pei, K., Cao, Y., Yang, J., Jana, S.: Deepxplore: Automated whitebox testing of deep learning systems. In: Proceedings of the 26th Symposium on Operating Systems Principles. SOSP \u201917, pp. 1\u201318. Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3132747.3132785","DOI":"10.1145\/3132747.3132785"},{"key":"569_CR47","unstructured":"rapid7: metasploit (2022). https:\/\/metasploit.com\/"},{"key":"569_CR48","unstructured":"screetsec: TheFatRat (2021). https:\/\/github.com\/screetsec\/TheFatRat"},{"key":"569_CR49","unstructured":"sk3ptre: AndroidMalware_2020 (2021). https:\/\/github.com\/sk3ptre\/AndroidMalware_2020"},{"key":"569_CR50","doi-asserted-by":"publisher","unstructured":"Strachanski, F., Petrov, D., Schmidbauer, T., Wendzel, S.: A comprehensive pattern-based overview of stegomalware. In: Proceedings of the 19th International Conference on Availability, Reliability and Security. ARES \u201924. Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3664476.3670886","DOI":"10.1145\/3664476.3670886"},{"key":"569_CR51","unstructured":"syvaidya: openstego (2022). https:\/\/github.com\/syvaidya\/openstego"},{"issue":"8","key":"569_CR52","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","volume":"14","author":"W Tang","year":"2019","unstructured":"Tang, W., Li, B., Tan, S., Barni, M., Huang, J.: Cnn-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensics Secur. 14(8), 2074\u20132087 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2891237","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"569_CR53","unstructured":"Toulas, B.: Android malware Escobar steals your Google Authenticator MFA codes (2022). https:\/\/www.bleepingcomputer.com\/news\/security\/android-malware-escobar-steals-your-google-authenticator-mfa-codes\/"},{"key":"569_CR54","unstructured":"Venture, C.: Cybercrime To Cost The World $10.5 Trillion Annually By 2025 (2020). https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/"},{"key":"569_CR55","doi-asserted-by":"publisher","unstructured":"Volkhonskiy, D., Nazarov, I., Burnaev, E.: Steganographic generative adversarial networks. In: Twelfth International Conference on Machine Vision (ICMV 2019), SPIE, vol. 11433, p. 114333 (2020). https:\/\/doi.org\/10.1117\/12.2559429. International Society for Optics and Photonics","DOI":"10.1117\/12.2559429"},{"key":"569_CR56","unstructured":"Vuleta, B.: 44 Worrying Malware Statistics to Take Seriously in 2022 (2021). https:\/\/legaljobs.io\/blog\/malware-statistics\/"},{"key":"569_CR57","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TIFS.2019.2963764","volume":"15","author":"J Wu","year":"2020","unstructured":"Wu, J., Chen, B., Luo, W., Fang, Y.: Audio steganography based on iterative adversarial attacks against convolutional neural networks. IEEE Transactions on Information Forensics and Security 15, 2282\u20132294 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2963764","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"569_CR58","doi-asserted-by":"publisher","unstructured":"Wang, Z., Liu, C., Cui, X., Liu, J., Wu, D., Yin, J.: DeepC2: AI-powered Covert Botnet Command and Control on OSNs (2020). https:\/\/doi.org\/10.48550\/ARXIV.2009.07707","DOI":"10.48550\/ARXIV.2009.07707"},{"key":"569_CR59","doi-asserted-by":"publisher","unstructured":"Wang, Z., Liu, C., Cui, X.: Evilmodel: Hiding malware inside of neural network models. In: 2021 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137 (2021). https:\/\/doi.org\/10.1109\/ISCC53001.2021.9631425","DOI":"10.1109\/ISCC53001.2021.9631425"},{"key":"569_CR60","doi-asserted-by":"publisher","unstructured":"Wang, Z., Liu, C., Cui, X., Yin, J., Wang, X.: Evilmodel 2.0: bringing neural network models into malware attacks. Comput. Secur. 120, 102807 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102807","DOI":"10.1016\/j.cose.2022.102807"},{"key":"569_CR61","doi-asserted-by":"crossref","unstructured":"Wu, H., Li, F., Zhang, X., Wu, K.: Gan-based steganography with the concatenation of multiple feature maps. In: Digital Forensics and Watermarking, pp. 3\u201317. Springer (2020)","DOI":"10.1007\/978-3-030-43575-2_1"},{"key":"569_CR62","doi-asserted-by":"crossref","unstructured":"Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Proceedings of the third international workshop on Information Hiding. IH \u201999, pp. 61\u201376 (1999)","DOI":"10.1007\/10719724_5"},{"key":"569_CR63","doi-asserted-by":"publisher","unstructured":"Wang, L., Wang, H., Luo, X., Sui, Y.: Malwhiteout: reducing label errors in android malware detection. ASE \u201922. Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3551349.3560418","DOI":"10.1145\/3551349.3560418"},{"key":"569_CR64","doi-asserted-by":"crossref","unstructured":"Xu, M., Liu, J., Liu, Y., Lin, F.X., Liu, Y., Liu, X.: A first look at deep learning apps on smartphones. In: The world wide web conference, pp. 2125\u20132136 (2019)","DOI":"10.1145\/3308558.3313591"},{"key":"569_CR65","unstructured":"Yuval\u00a0Nativ, f. Lahad\u00a0Ludar: theZoo aka Malware DB (2015). https:\/\/thezoo.morirt.com\/"},{"key":"569_CR66","doi-asserted-by":"publisher","unstructured":"Yu, N., Tuttle, Z., Thurnau, C.J., Mireku, E.: Ai-powered gui attack and its defensive methods. In: Proceedings of the 2020 ACM Southeast Conference. ACM SE \u201920, pp. 79\u201386. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3374135.3385270","DOI":"10.1145\/3374135.3385270"},{"key":"569_CR67","doi-asserted-by":"publisher","unstructured":"Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., Enck, W.: Appcontext: Differentiating malicious and benign mobile app behaviors using context. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 303\u2013313 (2015). https:\/\/doi.org\/10.1109\/ICSE.2015.50","DOI":"10.1109\/ICSE.2015.50"},{"key":"569_CR68","unstructured":"Yan, L.K., Yin, H.: DroidScope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis. In: 21st USENIX Security Symposium (USENIX Security 12), pp. 569\u2013584. USENIX Association, Bellevue, WA (2012). https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/yan"},{"key":"569_CR69","doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual api dependency graphs. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp. 1105\u20131116 (2014)","DOI":"10.1145\/2660267.2660359"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00569-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00569-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00569-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:15:41Z","timestamp":1768821341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00569-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":69,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["569"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00569-7","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"17 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The usage of photos in Fig.\u00a0\n                      \n                      has been reviewed and approved by the owner. This article does not contain any other studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"28"}}