{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:37:58Z","timestamp":1774993078623,"version":"3.50.1"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572115"],"award-info":[{"award-number":["61572115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004829","name":"Department of Science and Technology of Sichuan Province","doi-asserted-by":"publisher","award":["2018GZ0218"],"award-info":[{"award-number":["2018GZ0218"]}],"id":[{"id":"10.13039\/501100004829","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Plan","award":["CNS 2016QY06X1205"],"award-info":[{"award-number":["CNS 2016QY06X1205"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2916886","type":"journal-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T20:37:05Z","timestamp":1558643825000},"page":"64411-64430","source":"Crossref","is-referenced-by-count":124,"title":["A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0813-7485","authenticated-orcid":false,"given":"Rajesh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4095-547X","authenticated-orcid":false,"given":"Wenyong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0944-7856","authenticated-orcid":false,"given":"Riaz Ullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Jay","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Abubakar","family":"Sharif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"1","article-title":"A malicious application detection framework using automatic feature extraction tool on android market","author":"kim","year":"2013","journal-title":"Proc 3rd Int Conf Comput Sci Inf Technol (ICCSIT)"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2016.7430561"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-319-75650-9_16","article-title":"Extinguishing ransomware&#x2014;A hybrid approach to android ransomware detection","author":"ferrante","year":"2018","journal-title":"Proc 5th Int Symp Found Practice Secur"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.037"},{"key":"ref76","first-page":"50","article-title":"Hey, you, get off of my market: Detecting malicious Apps in official and alternative android markets","author":"zhou","year":"2012","journal-title":"Proc NDSS"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.03.004"},{"key":"ref75","first-page":"55","article-title":"An android application sandbox system for suspicious software detection","author":"thomas","year":"2010","journal-title":"Proc of 5th IEEE Malicious and Unwanted Software"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2016.29"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/978-3-319-22915-7_41","article-title":"Detection and mitigation of android malware through hybrid approach","author":"patel","year":"2015","journal-title":"Proc Int Symp Secur Comput Commun"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1016\/j.procs.2015.02.149","article-title":"Integrated static and dynamic analysis for malware detection","volume":"46","author":"shijo","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0277-z"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.49"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0099"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2016.1001011"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2014.6962194"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2015.7352513"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687880"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAS.2018.8443245"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433204"},{"key":"ref61","first-page":"473","article-title":"DeepRefiner: Multi-layer android malware detection system applying deep neural networks","author":"xu","year":"2018","journal-title":"Proc IEEE Symp Privacy Secur"},{"key":"ref63","first-page":"158","article-title":"AntiMalDroid: An efficient SVM-based malware detection framework for android","volume":"243","author":"zhao","year":"2011","journal-title":"Commun Comput Inf Sci"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355839"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0226-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/34.993562"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.226"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.7763\/IJCCE.2014.V3.310"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.1.22"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i21\/90273"},{"key":"ref69","first-page":"669","article-title":"System calls analysis of malwares on android","volume":"2","author":"tchakount\u00e9","year":"2013","journal-title":"Intern Science and Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"3577","DOI":"10.3390\/s18103577","article-title":"Smart contract-based review system for an IoT data marketplace","volume":"18","author":"park","year":"2018","journal-title":"SENSORS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.008"},{"key":"ref22","author":"peizhuang","year":"1983","journal-title":"Pattern Recognition with Fuzzy Objective Function Algorithms"},{"key":"ref21","article-title":"Hashing for similarity search: A survey","author":"wang","year":"2014","journal-title":"arXiv 1408 2927"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2010.tm09415"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0895-7177(93)90202-A"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.03.008"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3116211"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2016.7846747"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"ref59","first-page":"454","article-title":"Android malicious code classification using deep belief network","volume":"12","author":"shiqi","year":"2018","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3199478.3199492"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390391"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966078"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"ref54","first-page":"438","article-title":"DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data","author":"zhu","year":"2017","journal-title":"Proc IEEE Symp Comput Commun"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2017.18"},{"key":"ref52","first-page":"54","article-title":"DroidDelver: An android malware detection system using deep belief network based on API call blocks","author":"hou","year":"2016","journal-title":"Proc Int Conf Web-Age Inf Manage"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2494522"},{"key":"ref11","first-page":"27","article-title":"Mobile malware detection using op-code frequency histograms","author":"canfora","year":"2015","journal-title":"Proc 12th Int Joint Conf e-Bus Telecommun (ICETE)"},{"key":"ref40","first-page":"228","article-title":"Permission-based android malware detection","volume":"2","author":"aung","year":"2013","journal-title":"Int J Sci Technol Res"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959165"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.035"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA.2018.8368693"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.12.005"},{"key":"ref16","first-page":"48s","article-title":"MalDozer: Automatic framework for android malware detection using deep learning","volume":"24","author":"karbab","year":"2018","journal-title":"Investigative Radiology"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CONIELECOMP.2016.7438552"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.001"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2646641"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app9020277"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.01.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2014.7009096"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"ref89","first-page":"659","article-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-play scale","author":"chen","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.482"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2015.1073510"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app8091622"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app8101718"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0467-3"},{"key":"ref8","article-title":"Yes, machine learning can be more secure! A case study on android malware detection","author":"demontis","year":"0","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref86","first-page":"99","author":"yu","year":"2014","journal-title":"Towards Neural Network Based Malware Detection on Android Mobile Devices"},{"key":"ref7","year":"2016","journal-title":"Strategy Analytics Android Captures Record 88 Percent Share of Global Smartphone Shipments in Q3 2016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2523912"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792435"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2014.23"},{"key":"ref46","author":"aafer","year":"2014","journal-title":"Droid APIMiner Mining API-Level Features for Robust Malware Detection in Android"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"ref48","first-page":"201","article-title":"Machine learning based hybrid behavior models for android malware analysis","author":"chuang","year":"2015","journal-title":"Proc Int Conf Softw Quality Rel Secur"},{"key":"ref47","first-page":"77","article-title":"Android: From reversing to decompilation","author":"desnos","year":"2011","journal-title":"Black Hat Abu Dhabi"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00122"},{"key":"ref41","first-page":"111","article-title":"Performance evaluation on permission-based detection for android malware","volume":"2","author":"huang","year":"2013","journal-title":"Smart Inn Syst Tech"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2014.7013371"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296310"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08721053.pdf?arnumber=8721053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:55:32Z","timestamp":1643266532000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8721053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":90,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2916886","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}