{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:31Z","timestamp":1772119891319,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key Science and Technology Project of China Southern Power Grid Co.,Ltd","award":["GZKJXM20210011"],"award-info":[{"award-number":["GZKJXM20210011"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971105"],"award-info":[{"award-number":["61971105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11235-022-00983-2","type":"journal-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T11:53:21Z","timestamp":1677153201000},"page":"435-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Android malware detection based on sensitive patterns"],"prefix":"10.1007","volume":"82","author":[{"given":"Kang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guanghui","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1612-7618","authenticated-orcid":false,"given":"Xue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Linyu","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Yurui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,20]]},"reference":[{"key":"983_CR1","doi-asserted-by":"crossref","unstructured":"Sk, H. K. (2022). A literature review on android mobile malware detection using machine learning techniques. In 2022 6th international conference on computing methodologies and communication (ICCMC) (pp. 986\u2013991). IEEE.","DOI":"10.1109\/ICCMC53470.2022.9753746"},{"key":"983_CR2","doi-asserted-by":"publisher","first-page":"100372","DOI":"10.1016\/j.cosrev.2021.100372","volume":"40","author":"S Garg","year":"2021","unstructured":"Garg, S., & Baliyan, N. (2021). Comparative analysis of Android and iOS from security viewpoint. Computer Science Review, 40, 100372.","journal-title":"Computer Science Review"},{"key":"983_CR3","doi-asserted-by":"crossref","unstructured":"Sharma, S., Khanna, K., & Ahlawat, P. (2022). Survey for detection and analysis of android malware (s) through artificial intelligence techniques. In Cyber security and digital forensics (pp. 321\u2013337). Springer, Singapore.","DOI":"10.1007\/978-981-16-3961-6_28"},{"issue":"2","key":"983_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3530906","volume":"6","author":"L Wang","year":"2022","unstructured":"Wang, L., Wang, H., He, R., Tao, R., Meng, G., Luo, X., & Liu, X. (2022). MalRadar: Demystifying android malware in the new era. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6(2), 1\u201327.","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"issue":"5","key":"983_CR5","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3390\/info12050185","volume":"12","author":"V Kouliaridis","year":"2021","unstructured":"Kouliaridis, V., & Kambourakis, G. (2021). A comprehensive survey on machine learning techniques for android malware detection. Information, 12(5), 185.","journal-title":"Information"},{"issue":"3","key":"983_CR6","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1587\/transinf.2021EDP7133","volume":"105","author":"W Fan","year":"2022","unstructured":"Fan, W., Liu, D., Wu, F., & Tang, B. (2022). Android malware detection based on functional classification. IEICE Transactions on Information and Systems, 105(3), 656\u2013666.","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"1","key":"983_CR7","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TASE.2014.2348555","volume":"13","author":"X Luo","year":"2014","unstructured":"Luo, X., Zhou, M., Leung, H., Xia, Y., Zhu, Q., You, Z., & Li, S. (2014). An incremental-and-static-combined scheme for matrix-factorization-based collaborative filtering. IEEE transactions on automation science and engineering, 13(1), 333\u2013343.","journal-title":"IEEE transactions on automation science and engineering"},{"key":"983_CR8","doi-asserted-by":"crossref","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P. G., & \u00c1lvarez, G. (2013). Puma: Permission usage to detect malware in android. In International joint conference CISIS\u201912-ICEUTE 12-SOCO 12 special sessions (pp. 289\u2013298). Springer, Berlin, Heidelberg.","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"983_CR9","doi-asserted-by":"crossref","unstructured":"Liang, S., & Du, X. (2014, June). Permission-combination-based scheme for android mobile malware detection. In 2014 IEEE international conference on communications (ICC) (pp. 2301\u20132306). IEEE.","DOI":"10.1109\/ICC.2014.6883666"},{"key":"983_CR10","doi-asserted-by":"crossref","unstructured":"Aafer, Y., Du, W., & Yin, H. (2013, September). Droidapiminer: Mining api-level features for robust malware detection in android. In International conference on security and privacy in communication systems (pp. 86\u2013103). Springer, Cham.","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"983_CR11","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., & Drebin, K. R. Effective and explainable detection of android malware in your pocket. In Network and distributed system security symposium (pp. 1\u201315)."},{"key":"983_CR12","doi-asserted-by":"publisher","first-page":"102514","DOI":"10.1016\/j.cose.2021.102514","volume":"112","author":"K Kong","year":"2022","unstructured":"Kong, K., Zhang, Z., Yang, Z. Y., & Zhang, Z. (2022). FCSCNN: Feature centralized Siamese CNN-based android malware identification. Computers & Security, 112, 102514.","journal-title":"Computers & Security"},{"key":"983_CR13","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2022.08.002","volume":"137","author":"K Kong","year":"2022","unstructured":"Kong, K., Zhang, Z., Guo, C., Han, J., & Long, G. (2022). PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis. Future Generation Computer Systems, 137, 349\u2013362.","journal-title":"Future Generation Computer Systems"},{"key":"983_CR14","doi-asserted-by":"publisher","first-page":"102264","DOI":"10.1016\/j.cose.2021.102264","volume":"106","author":"H Gao","year":"2021","unstructured":"Gao, H., Cheng, S., & Zhang, W. (2021). GDroid: Android malware detection and classification with graph convolutional network. Computers & Security, 106, 102264.","journal-title":"Computers & Security"},{"key":"983_CR15","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.future.2020.02.002","volume":"107","author":"M Alazab","year":"2020","unstructured":"Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., & Awajan, A. (2020). Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems, 107, 509\u2013521.","journal-title":"Future Generation Computer Systems"},{"key":"983_CR16","doi-asserted-by":"publisher","first-page":"51964","DOI":"10.1109\/ACCESS.2018.2870534","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Qin, Z., Zhang, K., Yin, H., & Zou, J. (2018). Dalvik opcode graph based android malware variants detection using global topology features. IEEE Access, 6, 51964\u201351974.","journal-title":"IEEE Access"},{"key":"983_CR17","doi-asserted-by":"crossref","unstructured":"Feizollah, A., Anuar, N. B., Salleh, R., & Amalina, F. (2014). Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. In 2014 international symposium on biometrics and security technologies (ISBAST) (pp. 193\u2013197). IEEE.","DOI":"10.1109\/ISBAST.2014.7013120"},{"key":"983_CR18","doi-asserted-by":"crossref","unstructured":"Yu, W., Ge, L., Xu, G., & Fu, X. (2014). Towards neural network based malware detection on android mobile devices. In Cybersecurity systems for human cognition augmentation (pp. 99\u2013117). Springer, Cham.","DOI":"10.1007\/978-3-319-10374-7_7"},{"key":"983_CR19","doi-asserted-by":"crossref","unstructured":"McLaughlin, N., Martinez del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., & Joon Ahn, G. (2017). Deep android malware detection. In Proceedings of the seventh ACM on conference on data and application security and privacy (pp. 301\u2013308).","DOI":"10.1145\/3029806.3029823"},{"key":"983_CR20","doi-asserted-by":"crossref","unstructured":"Fereidooni, H., Conti, M., Yao, D., & Sperduti, A. (2016). ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications. In 2016 8th IFIP international conference on new technologies, mobility and security (NTMS) (pp. 1\u20135). IEEE.","DOI":"10.1109\/NTMS.2016.7792435"},{"key":"983_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security and privacy (pp. 95\u2013109). IEEE.","DOI":"10.1109\/SP.2012.16"},{"issue":"1","key":"983_CR22","doi-asserted-by":"publisher","first-page":"012031","DOI":"10.1088\/1742-6596\/1911\/1\/012031","volume":"1911","author":"SA Roseline","year":"2021","unstructured":"Roseline, S. A., & Geetha, S. (2021). Android malware detection and classification using LOFO feature selection and tree-based models. Journal of Physics Conference Series, 1911(1), 012031.","journal-title":"Journal of Physics Conference Series"},{"key":"983_CR23","doi-asserted-by":"crossref","unstructured":"Gao, Y., Hasegawa, H., Yamaguchi, Y., & Shimada, H. (2021). Malware detection using gradient boosting decision trees with customized log loss function. In 2021 international conference on information networking (ICOIN) (pp. 273\u2013278). IEEE.","DOI":"10.1109\/ICOIN50884.2021.9333999"},{"key":"983_CR24","doi-asserted-by":"crossref","unstructured":"Pham, H. D., Le, T. D., & Vu, T. N. (2018). Static PE malware detection using gradient boosting decision trees algorithm. In International conference on future data and security engineering (pp. 228\u2013236). Springer, Cham.","DOI":"10.1007\/978-3-030-03192-3_17"},{"issue":"4","key":"983_CR25","first-page":"54","volume":"6","author":"NY Kim","year":"2016","unstructured":"Kim, N. Y., Shim, J., Cho, S. J., Park, M., & Han, S. (2016). Android application protection against static reverse engineering based on multidexing. Journal of Internet Services and Information Security (JISIS), 6(4), 54\u201364.","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"issue":"2","key":"983_CR26","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2014","unstructured":"Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M., & Rajarajan, M. (2014). Android security: A survey of issues, malware penetration, and defenses. IEEE Communications Surveys & Tutorials, 17(2), 998\u20131022.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"983_CR27","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.neucom.2017.07.030","volume":"272","author":"HJ Zhu","year":"2018","unstructured":"Zhu, H. J., You, Z. H., Zhu, Z. X., Shi, W. L., Chen, X., & Cheng, L. (2018). DroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model. Neurocomputing, 272, 638\u2013646.","journal-title":"Neurocomputing"},{"key":"983_CR28","first-page":"1125","volume":"14","author":"S Rasthofer","year":"2014","unstructured":"Rasthofer, S., Arzt, S., & Bodden, E. (2014). A machine-learning approach for classifying and categorizing android sources and sinks. NDSS, 14, 1125.","journal-title":"NDSS"},{"issue":"1","key":"983_CR29","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin, F. A., Feizollah, A., Anuar, N. B., & Gani, A. (2016). Evaluation of machine learning classifiers for mobile malware detection. Soft Computing, 20(1), 343\u2013357.","journal-title":"Soft Computing"},{"key":"983_CR30","doi-asserted-by":"crossref","unstructured":"Caroro, R. A., Sison, A. M., & Medina, R. P. (2018). An enhanced frequent pattern-growth algorithm with dual pruning using modified anti-monotone support. In 2018 IEEE 10th international conference on humanoid, nanotechnology, information technology, communication and control, environment and management (HNICEM) (pp. 1\u20135). IEEE","DOI":"10.1109\/HNICEM.2018.8666366"},{"key":"983_CR31","doi-asserted-by":"crossref","unstructured":"Tang, B. H., Kang, Q., Ni, Z. X., Da, H., Xu, J. H., Liang, T. B., & Bai, Q. S. (2021). Android malware detection based on deep learning techniques. In 2021 4th international conference on pattern recognition and artificial intelligence (PRAI) (pp. 481\u2013486). IEEE.","DOI":"10.1109\/PRAI53619.2021.9551073"},{"issue":"4","key":"983_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3465361","volume":"24","author":"A Salem","year":"2021","unstructured":"Salem, A., Banescu, S., & Pretschner, A. (2021). Maat: Automatically analyzing virustotal for accurate labeling and effective malware detection. ACM Transactions on Privacy and Security (TOPS), 24(4), 1\u201335.","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"983_CR33","unstructured":"Choo, E., Nabeel, M., De Silva, R., Yu, T., & Khalil, I. (2022). A large scale study and classification of virustotal reports on phishing and malware URLs. arXiv preprint arXiv:2205.13155."},{"key":"983_CR34","doi-asserted-by":"crossref","unstructured":"Ding, Y., Zhang, X., Hu, J., & Xu, W. (2020). Android malware detection method based on bytecode image. Journal of Ambient Intelligence and Humanized Computing, pp 1\u201310.","DOI":"10.1007\/s12652-020-02196-4"},{"key":"983_CR35","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.neucom.2020.10.054","volume":"423","author":"M Cai","year":"2021","unstructured":"Cai, M., Jiang, Y., Gao, C., Li, H., & Yuan, W. (2021). Learning features from enhanced function call graphs for Android malware detection. Neurocomputing, 423, 301\u2013307.","journal-title":"Neurocomputing"},{"key":"983_CR36","doi-asserted-by":"publisher","first-page":"101573","DOI":"10.1016\/j.cose.2019.101573","volume":"87","author":"L Nguyen-Vu","year":"2019","unstructured":"Nguyen-Vu, L., Ahn, J., & Jung, S. (2019). Android fragmentation in malware detection. Computers & Security, 87, 101573.","journal-title":"Computers & Security"},{"key":"983_CR37","doi-asserted-by":"publisher","first-page":"107026","DOI":"10.1016\/j.comnet.2019.107026","volume":"167","author":"S Alam","year":"2020","unstructured":"Alam, S., Alharbi, S. A., & Yildirim, S. (2020). Mining nested flow of dominant APIs for detecting android malware. Computer Networks, 167, 107026.","journal-title":"Computer Networks"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00983-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-022-00983-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00983-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:39:45Z","timestamp":1679531985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-022-00983-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["983"],"URL":"https:\/\/doi.org\/10.1007\/s11235-022-00983-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1592245\/v2","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-1592245\/v1","asserted-by":"object"}]},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,20]]},"assertion":[{"value":"30 November 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We understand that our manuscript and associated personal data will be shared with Research Square for the delivery of the author dashboard.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}