{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:33:00Z","timestamp":1775899980556,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802805"],"award-info":[{"award-number":["2017YFB0802805"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["2018JBZ103"],"award-info":[{"award-number":["2018JBZ103"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736114"],"award-info":[{"award-number":["U1736114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672092"],"award-info":[{"award-number":["61672092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2018.2888568","type":"journal-article","created":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T19:46:38Z","timestamp":1545162398000},"page":"20381-20393","source":"Crossref","is-referenced-by-count":45,"title":["Detecting Android Locker-Ransomware on Chinese Social Networks"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8230-466X","authenticated-orcid":false,"given":"Dan","family":"Su","sequence":"first","affiliation":[]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoyang","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2965-6196","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2018","journal-title":"WindowManager"},{"key":"ref38","year":"2018","journal-title":"AID Homepage"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129704"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0127"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787905"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019793"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_18"},{"key":"ref34","first-page":"1","article-title":"UNVEIL: A large-scale, automated approach to detecting ransomware","author":"kharaz","year":"2016","journal-title":"Proc USENIX SEC"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.57"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3055156"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2720160"},{"key":"ref2","year":"2018","journal-title":"Wannacry"},{"key":"ref1","year":"2018","journal-title":"Introduction of Ransomware"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.297"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2014.6931449"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511573"},{"key":"ref24","first-page":"597","article-title":"DroidClassifier: Efficient adaptive mining of application-layer header for classifying Android malware","author":"li","year":"2016","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0343-z"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3267768"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3007748.3007763"},{"key":"ref50","year":"2018","journal-title":"Apktool"},{"key":"ref51","year":"2018","journal-title":"Developer Guide"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2016.237"},{"key":"ref10","year":"2018","journal-title":"Market share in China"},{"key":"ref11","year":"2018","journal-title":"Percentage of Android Versions in China"},{"key":"ref40","year":"2018","journal-title":"DevicePolicyManager"},{"key":"ref12","year":"2018","journal-title":"Introduction of QQ"},{"key":"ref13","year":"2018","journal-title":"Tencent Homepage"},{"key":"ref14","year":"2018","journal-title":"Active Accounts of QQ"},{"key":"ref15","year":"2018","journal-title":"Android fundamentals"},{"key":"ref16","year":"2018","journal-title":"Introduction of Asset Manager"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2914-y"},{"key":"ref4","year":"2018","journal-title":"Sypeng"},{"key":"ref3","year":"2018","journal-title":"Gartner Report"},{"key":"ref6","year":"2018","journal-title":"Lockerpin"},{"key":"ref5","year":"2018","journal-title":"Koler"},{"key":"ref8","year":"2018","journal-title":"McAfee mobile threat report Q1"},{"key":"ref7","year":"2017","journal-title":"Mobile Malware Evolution2015"},{"key":"ref49","year":"2018","journal-title":"Anzhi Market"},{"key":"ref9","year":"2018","journal-title":"Smartphone Penetration Rate as Share of the Population in China"},{"key":"ref46","author":"quinlan","year":"1992","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref48","year":"2018","journal-title":"Scikit Learn library"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref42","year":"2018","journal-title":"Telephony"},{"key":"ref41","year":"2018","journal-title":"Broadcast"},{"key":"ref44","year":"2018","journal-title":"Android Debug Bridge (Adb)"},{"key":"ref43","year":"2018","journal-title":"ActivityManager"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08580446.pdf?arnumber=8580446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:21:57Z","timestamp":1643260917000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8580446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2888568","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}