{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T05:10:27Z","timestamp":1746508227613},"reference-count":30,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T00:00:00Z","timestamp":1664323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T00:00:00Z","timestamp":1664323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"DOI":"10.1007\/s10796-022-10331-z","type":"journal-article","created":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T10:04:07Z","timestamp":1664359447000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Adversarially Superior Malware Detection Models: An Adversary Aware Proactive Approach using Adversarial Attacks and Defenses"],"prefix":"10.1007","author":[{"given":"Hemant","family":"Rathore","sequence":"first","affiliation":[]},{"given":"Adithya","family":"Samavedhi","sequence":"additional","affiliation":[]},{"given":"Sanjay K.","family":"Sahay","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Sewak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,28]]},"reference":[{"key":"10331_CR1","unstructured":"AV-ATLAS. (2022). Total amount of malware and pua under android Available: https:\/\/portal.av-atlas.org\/malware\/statistics\/. Last Accessed Feb 2022."},{"issue":"2","key":"10331_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439729","volume":"54","author":"Y Deldjoo","year":"2021","unstructured":"Deldjoo, Y., Noia, T. D., & Merra, F. A. (2021). A survey on adversarial recommender systems: from attack\/defense strategies to generative adversarial networks. ACM Computing Surveys (CSUR), 54(2), 1\u201338.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"4","key":"10331_CR3","doi-asserted-by":"publisher","first-page":"e0231626","DOI":"10.1371\/journal.pone.0231626","volume":"15","author":"Y Fang","year":"2020","unstructured":"Fang, Y., Zeng, Y., Li, B., Liu, L., & Zhang, L. (2020). Deepdetectnet vs rlattacknet: An adversarial method to improve deep learning-based static malware detection model. Plos One, 15(4), e0231626.","journal-title":"Plos One"},{"key":"10331_CR4","unstructured":"Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. International Conference on Learning Representations (ICLR)."},{"key":"10331_CR5","unstructured":"Google Play. (2022). Available https:\/\/play.google.com\/store?hl=en. Last Accessed February 2022."},{"key":"10331_CR6","doi-asserted-by":"crossref","unstructured":"Grosse, K., Papernot, N., Manoharan, P., Backes, M., & McDaniel, P. (2017). Adversarial examples for malware detection. In European symposium on research in computer security, pp. 62\u201379. Springer.","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"10331_CR7","doi-asserted-by":"publisher","unstructured":"Hinton, G., Vinyals, O., & Dean, J. et al. (2015). Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531, 2(7). https:\/\/doi.org\/10.48550\/arXiv.1503.02531","DOI":"10.48550\/arXiv.1503.02531"},{"key":"10331_CR8","unstructured":"Hispasec Sistemas. (2022). Virustotal Available: https:\/\/www.virustotal.com\/gui\/home Last Accessed February 2022."},{"key":"10331_CR9","unstructured":"Hu, W., & Tan, Y. (2017). Generating adversarial malware examples for black-box attacks based on gan. arXiv:1702.05983."},{"key":"10331_CR10","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I., & Tygar, J. D. (2011). Adversarial machine learning. In 4Th ACM workshop on security and artificial intelligence, pp. 43\u201358.","DOI":"10.1145\/2046684.2046692"},{"key":"10331_CR11","doi-asserted-by":"crossref","unstructured":"Ji, Y., Bowman, B., & Huang, H. H. (2019). Securing malware cognitive systems against adversarial attacks. In 2019 IEEE International conference on cognitive computing (ICCC), pp. 1\u20139. IEEE.","DOI":"10.1109\/ICCC.2019.00014"},{"key":"10331_CR12","doi-asserted-by":"crossref","unstructured":"Kolosnjaji, B., Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., & Roli, F. (2018). Adversarial malware binaries: Evading deep learning for malware detection in executables. In 2018 26Th european signal processing conference (EUSIPCO), pp. 533\u2013537. IEEE.","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"10331_CR13","unstructured":"Kurakin, A., Goodfellow, I., & Bengio, S. (2016). Adversarial machine learning at scale. International Conference on Learning Representations (ICLR)."},{"key":"10331_CR14","doi-asserted-by":"publisher","first-page":"107584","DOI":"10.1016\/j.patcog.2020.107584","volume":"110","author":"D Li","year":"2021","unstructured":"Li, D., Zhang, J., & Huang, K. (2021). Universal adversarial perturbations against object detection. Pattern Recognition, 110, 107584.","journal-title":"Pattern Recognition"},{"issue":"7","key":"10331_CR15","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., & Ye, H. (2018). Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics, 14 (7), 3216\u20133225.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10331_CR16","unstructured":"McAfee. (2022). Detect me if you can: How cybercriminals are trying harder to appear legitimate and how to spot them Available: https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/docs\/reports\/rp-mobile-threat-report-feb-2022.pdf. Last Accessed Feb 2022."},{"key":"10331_CR17","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. (2016). Distillation as a defense to adversarial perturbations against deep neural networks. In 2016 IEEE Symposium on security and privacy (SP), pp. 582\u2013597. IEEE.","DOI":"10.1109\/SP.2016.41"},{"issue":"6","key":"10331_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., & Xiang, Y. (2020). A survey of android malware detection with deep neural models. ACM Computing Surveys (CSUR), 53(6), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10331_CR19","doi-asserted-by":"crossref","unstructured":"Rathore, H., Sahay, S. K., Dhillon, J., & Sewak, M. (2021). Designing adversarial attack and defence for robust android malware detection models. In 2021 51St annual IEEE\/IFIP international conference on dependable systems and networks-supplemental volume (DSN-s), pp. 29\u201332. IEEE.","DOI":"10.1109\/DSN-S52858.2021.00025"},{"issue":"4","key":"10331_CR20","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1007\/s10796-020-10083-8","volume":"23","author":"H Rathore","year":"2021","unstructured":"Rathore, H., Sahay, S. K., Nikam, P., & Sewak, M. (2021). Robust android malware detection system against adversarial attacks using q-learning. Information Systems Frontiers, 23(4), 867\u2013882.","journal-title":"Information Systems Frontiers"},{"key":"10331_CR21","doi-asserted-by":"crossref","unstructured":"Rathore, H., Sahay, S. K., Rajvanshi, R., & Sewak, M. (2020). Identification of significant permissions for efficient android malware detection. In International conference on broadband communications, networks and systems (BROADNETS), pp. 33\u201352. Springer.","DOI":"10.1007\/978-3-030-68737-3_3"},{"key":"10331_CR22","unstructured":"Statcounter. (2021). Mobile operating system market share worldwide available: https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Last Accessed Feb 2022."},{"key":"10331_CR23","unstructured":"Statista. (2022). Number of apps available in leading app stores Available: https:\/\/www.statista.com\/statistics\/276623\/number-of-apps-available-in-leading-app-stores\/. Last Accessed Feb 2022."},{"key":"10331_CR24","unstructured":"Statista. (2022). Number of smartphone subscriptions worldwide from 2016 to 2027 Available: https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/. Last Accessed Feb 2022."},{"key":"10331_CR25","doi-asserted-by":"crossref","unstructured":"Suciu, O., Coull, S. E., & Johns, J. (2019). Exploring adversarial examples in malware detection. In 2019 IEEE Security and privacy workshops (SPW), pp. 8\u201314. IEEE.","DOI":"10.1109\/SPW.2019.00015"},{"issue":"4","key":"10331_CR26","doi-asserted-by":"publisher","first-page":"3233","DOI":"10.1007\/s10586-020-03083-5","volume":"23","author":"R Taheri","year":"2020","unstructured":"Taheri, R., Javidan, R., Shojafar, M., Vinod, P., & Conti, M. (2020). Can machine learning model with static features be fooled: an adversarial machine learning approach. Cluster Computing, 23(4), 3233\u20133253.","journal-title":"Cluster Computing"},{"issue":"2","key":"10331_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3386252","volume":"54","author":"Z Wang","year":"2021","unstructured":"Wang, Z., She, Q., & Ward, T. E. (2021). Generative adversarial networks in computer vision: a survey and taxonomy. ACM Computing Surveys (CSUR), 54(2), 1\u201338.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10331_CR28","doi-asserted-by":"crossref","unstructured":"Wei, F., Li, Y., Roy, S., Ou, X., & Zhou, W. (2017). Deep ground truth analysis of current android malware. In International conference on detection of intrusions and malware, and vulnerability assessment, pp. 252\u2013276. Springer.","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"10331_CR29","unstructured":"Wi\u015bniewski, R., & Tumbleson, C. (2022). Apktool. Available: https:\/\/ibotpeaches.github.io\/Apktool\/. Last Accessed February 2022."},{"issue":"3","key":"10331_CR30","first-page":"41","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., & Iyengar, S. S. (2017). A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR), 50(3), 41.","journal-title":"ACM Computing Surveys (CSUR)"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10331-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10331-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10331-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T10:27:18Z","timestamp":1664360838000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10331-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,28]]},"references-count":30,"alternative-id":["10331"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10331-z","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,28]]},"assertion":[{"value":"12 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}