{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:21:50Z","timestamp":1772065310371,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T00:00:00Z","timestamp":1496448000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0944-y","type":"journal-article","created":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T13:29:48Z","timestamp":1496496588000},"page":"569-588","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Deep neural architectures for large scale android malware analysis"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0941-2549","authenticated-orcid":false,"given":"Mohammad","family":"Nauman","sequence":"first","affiliation":[]},{"given":"Tamleek Ali","family":"Tanveer","sequence":"additional","affiliation":[]},{"given":"Sohail","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Toqeer Ali","family":"Syed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,3]]},"reference":[{"key":"944_CR1","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Man\u00e9, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Vi\u00e9gas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., Zheng, X.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). http:\/\/tensorflow.org\/"},{"key":"944_CR2","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"944_CR3","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: ACM SIGPLAN Notices, vol. 49, pp. 259\u2013269, ACM (2014)","DOI":"10.1145\/2666356.2594299"},{"key":"944_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804779","volume-title":"Bayesian Reasoning and Machine Learning","author":"D Barber","year":"2012","unstructured":"Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2012)"},{"issue":"3","key":"944_CR5","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSP.2010.202","volume":"9","author":"D Barrera","year":"2011","unstructured":"Barrera, D., Van Oorschot, P.: Secure software installation on smartphones. Secur. Priv. IEEE 9(3), 42\u201348 (2011)","journal-title":"Secur. Priv. IEEE"},{"key":"944_CR6","unstructured":"Bastien, F., Lamblin, P., Pascanu, R., Bergstra, J., Goodfellow, I., Bergeron, A., Bouchard, N., Warde-Farley, D., Bengio, Y.: Theano: new features and speed improvements. arXiv preprint arXiv:1211.5590 (2012)"},{"key":"944_CR7","unstructured":"Bedini, A.: HDF5 for Python. http:\/\/www.h5py.org"},{"key":"944_CR8","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13, 281\u2013305 (2012)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"944_CR9","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.gmod.2004.01.003","volume":"66","author":"A Biswas","year":"2004","unstructured":"Biswas, A., Shapiro, V.: Approximate distance fields with non-vanishing gradients. Graph. Models 66(3), 133\u2013159 (2004)","journal-title":"Graph. Models"},{"key":"944_CR10","doi-asserted-by":"crossref","unstructured":"Bottou, L.: Large-scale machine learning with stochastic gradient descent. In: Proceedings of COMPSTAT\u20192010, pp. 177\u2013186. Springer (2010)","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"944_CR11","volume-title":"Bayesian Inference in Statistical Analysis","author":"GE Box","year":"2011","unstructured":"Box, G.E., Tiao, G.C.: Bayesian Inference in Statistical Analysis, vol. 40. Wiley, New York (2011)"},{"key":"944_CR12","unstructured":"Chen, L.C., Papandreou, G., Kokkinos, I., Murphy, K., Yuille, A.L.: Semantic image segmentation with deep convolutional nets and fully connected crfs. arXiv preprint arXiv:1412.7062 (2014)"},{"key":"944_CR13","unstructured":"Chollet, F.: Keras: deep learning library for theano and tensorflow. (2015)"},{"key":"944_CR14","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Gated feedback recurrent neural networks. arXiv preprint arXiv:1502.02367 (2015)"},{"key":"944_CR15","unstructured":"Dash, S.K., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., Cavallaro, L.: Droidscribe: classifying android malware based on runtime behavior. Mob. Secur. Technol. (MoST 2016) 7148, 1\u201312 (2016)"},{"key":"944_CR16","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.procs.2016.07.416","volume":"88","author":"P Date","year":"2016","unstructured":"Date, P., Hendler, J.A., Carothers, C.D.: Design index for deep neural networks. Proc. Comput. Sci. 88, 131\u2013138 (2016)","journal-title":"Proc. Comput. Sci."},{"key":"944_CR17","doi-asserted-by":"crossref","unstructured":"Davis, B., Chen, H.: RetroSkeleton: retrofitting android apps. In: Proceedings of the 11th International Conference on Mobile Systems, Applications and Services (MobiSys\u201913), pp. 25\u201328 (2013)","DOI":"10.1145\/2462456.2464462"},{"key":"944_CR18","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910), pp. 1\u20136 (2010)"},{"key":"944_CR19","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS\u201909), pp. 235\u2013245. ACM (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"944_CR20","first-page":"625","volume":"11","author":"D Erhan","year":"2010","unstructured":"Erhan, D., Bengio, Y., Courville, A., Manzagol, P.A., Vincent, P., Bengio, S.: Why does unsupervised pre-training help deep learning? J. Mach. Learn. Res. 11, 625\u2013660 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"944_CR21","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.procs.2015.07.285","volume":"53","author":"B Franzke","year":"2015","unstructured":"Franzke, B., Kosko, B.: Using noise to speed up markov chain monte carlo estimation. Proc. Comput. Sci. 53, 113\u2013120 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"944_CR22","unstructured":"Fuchs, A., Chaudhuri, A., Foster, J.: SCanDroid: automated security certification of Android applications. Technical reports (2009)"},{"issue":"6","key":"944_CR23","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1016\/S0893-6080(05)80125-X","volume":"6","author":"KI Funahashi","year":"1993","unstructured":"Funahashi, K.I., Nakamura, Y.: Approximation of dynamical systems by continuous time recurrent neural networks. Neural Netw. 6(6), 801\u2013806 (1993)","journal-title":"Neural Netw."},{"key":"944_CR24","unstructured":"Garcia, J., Hammad, M., Pedrood, B., Bagheri-Khaligh, A., Malek, S.: Obfuscation-resilient, efficient, and accurate detection and family identification of android malware. George Mason University, Technical reports (2015)"},{"key":"944_CR25","unstructured":"GData: Mobile malware report: Q2\/2015. https:\/\/public.gdatasoftware.com\/Presse\/Publikationen\/Malware_Reports\/G_DATA_MobileMWR_Q2_2015_EN.pdf . Accessed 15 July 2016"},{"key":"944_CR26","volume-title":"Bayesian Data Analysis","author":"A Gelman","year":"2014","unstructured":"Gelman, A., Carlin, J.B., Stern, H.S., Rubin, D.B.: Bayesian Data Analysis, vol. 2. Taylor & Francis, New York (2014)"},{"issue":"1","key":"944_CR27","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/biomet\/57.1.97","volume":"57","author":"WK Hastings","year":"1970","unstructured":"Hastings, W.K.: Monte carlo sampling methods using markov chains and their applications. Biometrika 57(1), 97\u2013109 (1970)","journal-title":"Biometrika"},{"key":"944_CR28","unstructured":"Hern\u00e1ndez-Lobato, J.M., Adams, R.P.: Probabilistic backpropagation for scalable learning of bayesian neural networks. arXiv preprint arXiv:1502.05336 (2015)"},{"issue":"1","key":"944_CR29","first-page":"926","volume":"9","author":"G Hinton","year":"2010","unstructured":"Hinton, G.: A practical guide to training restricted boltzmann machines. Momentum 9(1), 926 (2010)","journal-title":"Momentum"},{"issue":"5214","key":"944_CR30","doi-asserted-by":"crossref","first-page":"1158","DOI":"10.1126\/science.7761831","volume":"268","author":"GE Hinton","year":"1995","unstructured":"Hinton, G.E., Dayan, P., Frey, B.J., Neal, R.M.: The wake-sleep algorithm for unsupervised neural networks. Science 268(5214), 1158 (1995)","journal-title":"Science"},{"issue":"5786","key":"944_CR31","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (2006)","journal-title":"Science"},{"issue":"8","key":"944_CR32","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"1","key":"944_CR33","first-page":"1593","volume":"15","author":"MD Homan","year":"2014","unstructured":"Homan, M.D., Gelman, A.: The no-U-turn sampler: adaptively setting path lengths in Hamiltonian Monte Carlo. J. Mach. Learn. Res. 15(1), 1593\u20131623 (2014)","journal-title":"J. Mach. Learn. Res."},{"issue":"5","key":"944_CR34","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Netw. 2(5), 359\u2013366 (1989)","journal-title":"Neural Netw."},{"key":"944_CR35","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of the 13th Annual ACM Symposium on Theory of Computing, pp. 604\u2013613. ACM (1998)","DOI":"10.1145\/276698.276876"},{"key":"944_CR36","unstructured":"Jolliffe, I.: Principal Component Analysis. Wiley Online Library (2002)"},{"key":"944_CR37","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.neunet.2016.03.013","volume":"79","author":"R Karakida","year":"2016","unstructured":"Karakida, R., Okada, M., Amari, S.I.: Dynamical analysis of contrastive divergence learning. Neural Netw. 79, 78\u201387 (2016)","journal-title":"Neural Netw."},{"key":"944_CR38","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-Organizing Maps","author":"T Kohonen","year":"2001","unstructured":"Kohonen, T.: Self-Organizing Maps, vol. 30. Springer, New York (2001)"},{"issue":"10","key":"944_CR39","first-page":"1995","volume":"3361","author":"Y LeCun","year":"1995","unstructured":"LeCun, Y., Bengio, Y.: Convolutional networks for images, speech, and time series. The Handb. Brain Theory Neural Netw. 3361(10), 1995 (1995)","journal-title":"The Handb. Brain Theory Neural Netw."},{"issue":"7553","key":"944_CR40","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"944_CR41","unstructured":"Long, M., Wang, J., Jordan, M.I.: Deep transfer learning with joint adaptation networks. arXiv preprint arXiv:1605.06636 (2016)"},{"issue":"10","key":"944_CR42","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(12)70092-2","volume":"2012","author":"S Mansfield-Devine","year":"2012","unstructured":"Mansfield-Devine, S.: Android architecture: attacking the weak points. Netw. Secur. 2012(10), 5\u201312 (2012)","journal-title":"Netw. Secur."},{"key":"944_CR43","unstructured":"Mnih, V., Heess, N., Graves, A., et al.: Recurrent models of visual attention. In: Advances in Neural Information Processing Systems, pp. 2204\u20132212 (2014)"},{"key":"944_CR44","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 807\u2013814 (2010)"},{"key":"944_CR45","doi-asserted-by":"crossref","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in android. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC\u201909), pp. 340\u2013349. IEEE (2009)","DOI":"10.1109\/ACSAC.2009.39"},{"issue":"4","key":"944_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v035.i04","volume":"35","author":"A Patil","year":"2010","unstructured":"Patil, A., Huard, D., Fonnesbeck, C.J.: PyMC: Bayesian stochastic modelling in python. J. Stat. Softw. 35(4), 1 (2010)","journal-title":"J. Stat. Softw."},{"key":"944_CR47","doi-asserted-by":"crossref","unstructured":"Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 241\u2013252. ACM (2012)","DOI":"10.1145\/2382196.2382224"},{"key":"944_CR48","doi-asserted-by":"crossref","unstructured":"Powell, M.J.: A fast algorithm for nonlinearly constrained optimization calculations. In: Numerical analysis, pp. 144\u2013157. Springer (1978)","DOI":"10.1007\/BFb0067703"},{"key":"944_CR49","doi-asserted-by":"crossref","unstructured":"Salakhutdinov, R., Murray, I.: On the quantitative analysis of deep belief networks. In: Proceedings of the 25th International Conference on Machine Learning, pp. 872\u2013879. ACM (2008)","DOI":"10.1145\/1390156.1390266"},{"key":"944_CR50","doi-asserted-by":"crossref","unstructured":"Sarma, B.P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, pp. 13\u201322. ACM (2012)","DOI":"10.1145\/2295136.2295141"},{"key":"944_CR51","unstructured":"Sermanet, P., Frome, A., Real, E.: Attention for fine-grained categorization. arXiv preprint arXiv:1412.7054 (2014)"},{"issue":"3","key":"944_CR52","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSP.2009.144","volume":"8","author":"A Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Securing android-powered mobile devices using selinux. Secur. Priv. IEEE 8(3), 36\u201344 (2010)","journal-title":"Secur. Priv. IEEE"},{"issue":"3","key":"944_CR53","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JA Suykens","year":"1999","unstructured":"Suykens, J.A., Vandewalle, J.: Least squares support vector machine classifiers. Neural Process. Lett. 9(3), 293\u2013300 (1999)","journal-title":"Neural Process. Lett."},{"key":"944_CR54","unstructured":"Symantec: Internet security threat report, volume 20. https:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp Accessed 15 July 2016"},{"key":"944_CR55","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V.: Inception-v4, inception-resnet and the impact of residual connections on learning. arXiv preprint arXiv:1602.07261 (2016)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"944_CR56","unstructured":"Tripp, O., Rubin, J.: A bayesian approach to privacy enforcement in smartphones. In: USENIX Security (2014)"},{"key":"944_CR57","doi-asserted-by":"crossref","unstructured":"Vincent, P., Larochelle, H., Bengio, Y., Manzagol, P.A.: Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th International Conference on Machine Learning, pp. 1096\u20131103. ACM (2008)","DOI":"10.1145\/1390156.1390294"},{"key":"944_CR58","unstructured":"VXShare: VirusShare. . https:\/\/virusshare.com Accessed 3 Jan 2017"},{"key":"944_CR59","unstructured":"Yan, L.K., Yin, H.: DroidScope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: USENIX security symposium, pp. 569\u2013584 (2012)"},{"key":"944_CR60","doi-asserted-by":"crossref","unstructured":"Yang, Z., Hu, Z., Deng, Y., Dyer, C., Smola, A.: Neural machine translation with recurrent attention modeling. arXiv preprint arXiv:1607.05108 (2016)","DOI":"10.18653\/v1\/E17-2061"},{"key":"944_CR61","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: Security and Privacy (SP), 2012 IEEE Symposium on, pp. 95\u2013109. IEEE (2012)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0944-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0944-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0944-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T03:59:07Z","timestamp":1659067147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0944-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,3]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["944"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0944-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,3]]}}}