{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T19:57:23Z","timestamp":1769457443034,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401038"],"award-info":[{"award-number":["61401038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91338107"],"award-info":[{"award-number":["91338107"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2016YFB0800605"],"award-info":[{"award-number":["2016YFB0800605"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-017-5069-3","type":"journal-article","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T13:47:17Z","timestamp":1511272037000},"page":"2261-2285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Defect Prediction in Android Binary Executables Using Deep Neural Network"],"prefix":"10.1007","volume":"102","author":[{"given":"Feng","family":"Dong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1699-2270","authenticated-orcid":false,"given":"Junfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Shaodong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"issue":"1","key":"5069_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio, Y. (2009). Learning deep architectures for ai. Foundations & Trends in Machine Learning, 2(1), 1\u2013127.","journal-title":"Foundations & Trends in Machine Learning"},{"issue":"6","key":"5069_CR2","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1109\/TKDE.2011.163","volume":"24","author":"PS Bishnu","year":"2012","unstructured":"Bishnu, P. S., & Bhattacherjee, V. (2012). Software fault prediction using quad tree-based k-means clustering algorithm. IEEE Transactions on Knowledge and Data Engineering, 24(6), 1146\u20131150.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"5069_CR3","doi-asserted-by":"crossref","unstructured":"David, O. E., & Netanyahu, N. S. (2015). Deepsign: Deep learning for automatic malware signature generation and classification. In International Joint Conference on Neural Networks (pp. 1\u20138).","DOI":"10.1109\/IJCNN.2015.7280815"},{"issue":"3\u20134","key":"5069_CR4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1561\/2000000039","volume":"7","author":"L Deng","year":"2014","unstructured":"Deng, L., & Yu, D. (2014). Deep learning: methods and applications. Foundations and Trends\u00ae in Signal Processing, 7(3\u20134), 197\u2013387.","journal-title":"Foundations and Trends\u00ae in Signal Processing"},{"issue":"17","key":"5069_CR5","doi-asserted-by":"crossref","first-page":"3238","DOI":"10.1002\/sec.1248","volume":"8","author":"Y Du","year":"2015","unstructured":"Du, Y., Wang, X., & Wang, J. (2015). A static android malicious code detection method based on multisource fusion. Security and Communication Networks, 8(17), 3238\u20133246.","journal-title":"Security and Communication Networks"},{"key":"5069_CR6","unstructured":"Dong, S. Z., & Wang, S. (2017). Dnn-based software defect prediction experimental data and code, https:\/\/github.com\/breezedong\/DNN-based-software-defect-prediction . Accessed July 20, 2017."},{"key":"5069_CR7","doi-asserted-by":"crossref","unstructured":"Ghotra, B., Mcintosh, S., & Hassan, A. E. (2015). Revisiting the impact of classification techniques on the performance of defect prediction models. In IEEE\/ACM IEEE International Conference on Software Engineering (pp. 789\u2013800).","DOI":"10.1109\/ICSE.2015.91"},{"issue":"6","key":"5069_CR8","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2012","unstructured":"Hall, T., Beecham, S., Bowes, D., Gray, D., & Counsell, S. (2012). A systematic literature review on fault prediction performance in software engineering. IEEE Transactions on Software Engineering, 38(6), 1276\u20131304.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"5069_CR9","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton, G., Deng, L., Yu, D., Dahl, G. E., Mohamed, A. R., Jaitly, N., et al. (2012). Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Processing Magazine, 29(6), 82\u201397.","journal-title":"IEEE Signal Processing Magazine"},{"key":"5069_CR10","doi-asserted-by":"crossref","unstructured":"Jerome, Q., Allix, K., State, R., & Engel, T. (2014). Using opcode-sequences to detect malicious android applications. In IEEE international conference on communications (pp. 914\u2013919).","DOI":"10.1109\/ICC.2014.6883436"},{"issue":"7553","key":"5069_CR11","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y Lecun","year":"2015","unstructured":"Lecun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436\u2013444.","journal-title":"Nature"},{"issue":"4","key":"5069_CR12","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"S Lessmann","year":"2008","unstructured":"Lessmann, S., Baesens, B., Mues, C., & Pietsch, S. (2008). Benchmarking classification models for software defect prediction: A proposed framework and novel findings. IEEE Transactions on Software Engineering, 34(4), 485\u2013496.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"9","key":"5069_CR13","doi-asserted-by":"crossref","first-page":"3143","DOI":"10.1016\/j.patcog.2014.04.002","volume":"47","author":"Z Ma","year":"2014","unstructured":"Ma, Z., Rana, P. K., Taghia, J., Flierl, M., & Leijon, A. (2014). Bayesian estimation of Dirichlet mixture model with variational inference. Pattern Recognition, 47(9), 3143\u20133157.","journal-title":"Pattern Recognition"},{"key":"5069_CR14","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1016\/j.neucom.2015.10.012","volume":"174","author":"Z Ma","year":"2016","unstructured":"Ma, Z., Tan, Z. H., & Guo, J. (2016). Feature selection for neutral vector in eeg signal classification. Neurocomputing, 174, 937\u2013945.","journal-title":"Neurocomputing"},{"issue":"4","key":"5069_CR15","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1109\/TPAMI.2014.2353639","volume":"37","author":"Z Ma","year":"2015","unstructured":"Ma, Z., Teschendorff, A. E., Leijon, A., Qiao, Y., Zhang, H., & Guo, J. (2015). Variational bayesian matrix factorization for bounded support data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(4), 876\u2013889.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"5","key":"5069_CR16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MNET.2017.1600319","volume":"31","author":"Z Ma","year":"2017","unstructured":"Ma, Z., Xie, J., Li, H., Sun, Q., Si, Z., Zhang, J., et al. (2017). The role of data analysis in the development of intelligent energy networks. IEEE Network, 31(5), 88\u201395.","journal-title":"IEEE Network"},{"key":"5069_CR17","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1016\/j.asoc.2016.04.032","volume":"49","author":"R Malhotra","year":"2016","unstructured":"Malhotra, R. (2016). An empirical framework for defect prediction using machine learning techniques with Android software.\u00a0Applied Soft Computing,\u00a049, 1034\u20131050.","journal-title":"Applied Soft Computing"},{"key":"5069_CR18","doi-asserted-by":"crossref","unstructured":"Mclaughlin, N., Rincon, J. M. D., Kang, B. J., Yerima, S., Miller, P., Sezer, S., et al. (2017). Deep android malware detection. In ACM on conference on data and application security and privacy (pp. 301\u2013308).","DOI":"10.1145\/3029806.3029823"},{"key":"5069_CR19","unstructured":"Mou, L., Li, G., Jin, Z., Zhang, L., & Wang, T. (2014). Tbcnn: A tree-based convolutional neural network for programming language processing. Eprint Arxiv."},{"key":"5069_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, V. H., & Le, M. S. T. (2010). Predicting vulnerable software components with dependency graphs. In International workshop on security measurements and metrics (p.\u00a03).","DOI":"10.1145\/1853919.1853923"},{"key":"5069_CR21","doi-asserted-by":"crossref","unstructured":"Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., et al. (2015). Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits. In ACM Sigsac conference on computer and communications security (pp. 426\u2013437).","DOI":"10.1145\/2810103.2813604"},{"issue":"3","key":"5069_CR22","doi-asserted-by":"crossref","first-page":"179","DOI":"10.14257\/ijdta.2015.8.3.15","volume":"8","author":"MC Prasad","year":"2015","unstructured":"Prasad, M. C., Florence, L., & Arya, A. (2015). A study on software metrics based software defect prediction using data mining and machine learning techniques.\u00a0International Journal of Database Theory and Application,\u00a08(3), 179\u2013190.","journal-title":"International Journal of Database Theory Application"},{"issue":"10","key":"5069_CR23","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","volume":"40","author":"R Scandariato","year":"2014","unstructured":"Scandariato, R., Walden, J., Hovsepyan, A., & Joosen, W. (2014). Predicting vulnerable software components via text mining. IEEE Transactions on Software Engineering, 40(10), 993\u20131006.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5069_CR24","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2014","unstructured":"Schmidhuber, J. (2014). Deep learning in neural networks: An overview. Neural Networks the Official Journal of the International Neural Network Society, 61, 85.","journal-title":"Neural Networks the Official Journal of the International Neural Network Society"},{"key":"5069_CR25","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, T., & Tan, L.: Automatically learning semantic features for defect prediction. In IEEE\/ACM international conference on software engineering (pp. 297\u2013308).","DOI":"10.1145\/2884781.2884804"},{"key":"5069_CR26","unstructured":"Xu, P., Yin, Q., Huang, Y., Song, Y. Z., Ma, Z., Wang, L., & Guo, J. (2017). Cross-modal Subspace Learning for Fine-grained Sketch-based Image Retrieval.\u00a0arXiv preprint arXiv:1705.09888 ."},{"issue":"1","key":"5069_CR27","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/LSP.2013.2291240","volume":"21","author":"Y Xu","year":"2013","unstructured":"Xu, Y., Du, J., Dai, L. R., & Lee, C. H. (2013). An experimental study on speech enhancement based on deep neural networks. IEEE Signal Processing Letters, 21(1), 65\u201368.","journal-title":"IEEE Signal Processing Letters"},{"issue":"4","key":"5069_CR28","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1145\/2740070.2631434","volume":"44","author":"Z Yuan","year":"2014","unstructured":"Yuan, Z., Lu, Y., Wang, Z., & Xue, Y. (2014). Droid-sec: Deep learning in android malware detection. ACM Sigcomm Computer Communication Review, 44(4), 371\u2013372.","journal-title":"ACM Sigcomm Computer Communication Review"},{"key":"5069_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, F., Zheng, Q., Zou, Y., & Hassan, A. E. (2016). Cross-project defect prediction using a connectivity-based unsupervised classifier. In IEEE\/ACM international conference on software engineering (pp. 309\u2013320).","DOI":"10.1145\/2884781.2884839"},{"issue":"1","key":"5069_CR30","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1049\/iet-ifs.2012.0289","volume":"8","author":"Z Zhao","year":"2013","unstructured":"Zhao, Z., Wang, J., & Bai, J. (2013). Malware detection method based on the control-flow construct feature of software. Iet Information Security, 8(1), 18\u201324.","journal-title":"Iet Information Security"},{"issue":"2","key":"5069_CR31","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1002\/sec.524","volume":"6","author":"Z Zhao","year":"2013","unstructured":"Zhao, Z., Wang, J., & Wang, C. (2013). An unknown malware detection scheme based on the features of graph. Security and Communication Networks, 6(2), 239\u2013246.","journal-title":"Security and Communication Networks"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5069-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5069-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5069-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T06:37:02Z","timestamp":1751006222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5069-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5069"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5069-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,21]]}}}