{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T22:52:57Z","timestamp":1773183177704,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST-110-2634-F-002-037"],"award-info":[{"award-number":["MOST-110-2634-F-002-037"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST-110-2218-E-002-018-MBK"],"award-info":[{"award-number":["MOST-110-2218-E-002-018-MBK"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004725","name":"Ministry of Economic Affairs, Taiwan, through \u201cArtificial Intelligence Oriented for Cyber Security Technology Collaboration Project (2\/4)\u201d of the Institute for Information Industry","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3110408","type":"journal-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T20:33:18Z","timestamp":1630960398000},"page":"123208-123219","source":"Crossref","is-referenced-by-count":13,"title":["Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4207-5695","authenticated-orcid":false,"given":"Yun-Chung","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5638-8030","authenticated-orcid":false,"given":"Hong-Yen","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6477-7770","authenticated-orcid":false,"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7822-3672","authenticated-orcid":false,"given":"Bo","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5659-1194","authenticated-orcid":false,"given":"Tsung-Nan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"431","article-title":"Understanding variable importances in forests of randomized trees","volume":"26","author":"louppe","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref10","first-page":"1","article-title":"String deobfuscation scheme based on dynamic code extraction for mobile malwares","volume":"4","author":"yoo","year":"2016","journal-title":"IT Convergence Practice"},{"key":"ref11","article-title":"Automated deobfuscation of Android native binary code","author":"kan","year":"2019","journal-title":"arXiv 1907 06828"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978422"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029825"},{"key":"ref16","first-page":"255","article-title":"SAFEDroid: Using structural features for detecting Android malwares","author":"sen","year":"2017","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951751"},{"key":"ref18","first-page":"7","article-title":"Analysis of machine learning classifier in Android malware detection through opcode","author":"anuar","year":"2020","journal-title":"Proc IEEE Conf Appl Inf Netw Secur (AINS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"ref28","article-title":"LightGBM: A highly efficient gradient boosting decision tree","volume":"30","author":"ke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref4","article-title":"Feature-level malware obfuscation in deep learning","author":"dillon","year":"2020","journal-title":"arXiv 2002 05517"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3162625"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref29","first-page":"468","article-title":"AndroZoo: Collecting Millions of Android Apps for the Research Community","author":"allix","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2016.29"},{"key":"ref8","year":"2020","journal-title":"Android Developers Android Studio User Guide Shrink Obfuscate and Optimize Your App"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.97"},{"key":"ref2","year":"2020","journal-title":"Mobile Malware Evolution 2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274726"},{"key":"ref1","year":"2021","journal-title":"Device Market Trends Smartphone Market Share"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063748"},{"key":"ref22","year":"2020","journal-title":"ApkTool A tool for reverse engineering Android apk files"},{"key":"ref21","first-page":"611","article-title":"Stackdroid: Evaluation of a multi-level approach for detecting the malware on Android using stacked generalization","author":"rahman","year":"2018","journal-title":"Proc Int Conf Recent Trends Image Process Pattern Recognit"},{"key":"ref24","year":"2020","journal-title":"Jarsigner Signs and Verifies Java Archive (JAR) Files"},{"key":"ref23","year":"2020","journal-title":"ProGuard Open Source Optimizer for Java and Kotlin"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.77"},{"key":"ref25","year":"2020","journal-title":"Relative Distinguished Name"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09529344.pdf?arnumber=9529344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:28Z","timestamp":1639770928000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9529344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3110408","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}