{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:44:40Z","timestamp":1772120680740,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100014862","name":"Shenzhen Polytechnic University Research Fund","doi-asserted-by":"publisher","award":["6023310010K"],"award-info":[{"award-number":["6023310010K"]}],"id":[{"id":"10.13039\/100014862","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014862","name":"Shenzhen Polytechnic University Research Fund","doi-asserted-by":"publisher","award":["6023310009K"],"award-info":[{"award-number":["6023310009K"]}],"id":[{"id":"10.13039\/100014862","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014862","name":"Shenzhen Polytechnic University Research Fund","doi-asserted-by":"publisher","award":["6023312038K"],"award-info":[{"award-number":["6023312038K"]}],"id":[{"id":"10.13039\/100014862","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2021YFF1200100"],"award-info":[{"award-number":["2021YFF1200100"]}]},{"name":"National Key Research and Development Program of China","award":["2021YFF1200104"],"award-info":[{"award-number":["2021YFF1200104"]}]},{"name":"Special Projects fund in Key Areas of Guangdong Provincial Department of Education","award":["2023ZDZX2085"],"award-info":[{"award-number":["2023ZDZX2085"]}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2021201055"],"award-info":[{"award-number":["F2021201055"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013077","name":"Innovation Capacity Enhancement Program-Science and Technology Platform Project, Hebei","doi-asserted-by":"publisher","award":["22567623H"],"award-info":[{"award-number":["22567623H"]}],"id":[{"id":"10.13039\/501100013077","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3565526","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:32:33Z","timestamp":1745947953000},"page":"81347-81364","source":"Crossref","is-referenced-by-count":10,"title":["LLM-MalDetect: A Large Language Model-Based Method for Android Malware Detection"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4472-1387","authenticated-orcid":false,"given":"Ruirui","family":"Feng","sequence":"first","affiliation":[{"name":"College of Mathematics and Information Science, Hebei University, Baoding, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5703-9454","authenticated-orcid":false,"given":"Hui","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Shenzhen Polytechnic University, Shenzhen, China"}]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Information Science, Hebei University, Baoding, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1753-065X","authenticated-orcid":false,"given":"Md","family":"Monjurul Karim","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory for High Performance Data Mining, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8040-0308","authenticated-orcid":false,"given":"Qingshan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory for High Performance Data Mining, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Counterpoint Quarterly Smartphones","year":"2024"},{"key":"ref2","volume-title":"The Mobile Malware Threat Landscape in 2023","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102622"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2021.2007327"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.028"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3338469"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCCI49893.2020.9256450"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RDAAPS48126.2021.9452002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3292855"},{"key":"ref11","first-page":"1","article-title":"Language models are few-shot learners","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","volume":"33","author":"Brown"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/fi17020057"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3483905"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125546"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680397"},{"key":"ref17","article-title":"Exploring LLMs for malware detection: Review, framework design, and countermeasure approaches","author":"Al-Karaki","year":"2024","journal-title":"arXiv:2409.07587"},{"key":"ref18","article-title":"Mistral 7B","author":"Jiang","year":"2023","journal-title":"arXiv:2310.06825"},{"key":"ref19","first-page":"1","article-title":"LoRA: Low-rank adaptation of large language models","volume-title":"Proc. 10th Int. Conf. Learn. Represent.","author":"Hu"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2777960"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05309-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10040432"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117833"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103126"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0296722"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557533"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2017.8167881"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.07.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771228"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0418-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102513"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/informatics10030067"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01784-z"},{"key":"ref36","first-page":"23716","article-title":"Flamingo: A visual language model for few-shot learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Alayrac"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0082-4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631434"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25393-0_54"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000046"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3168285"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3670441"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623117"},{"key":"ref44","volume-title":"Apktool: A Tool for Reverse Engineering Android Apk Files","year":"2024"},{"key":"ref45","volume-title":"Android Developer Guides","year":"2024"},{"key":"ref46","article-title":"ChatGLM: A family of large language models from GLM-130B to GLM-4 all tools","author":"Glm","year":"2024","journal-title":"arXiv:2406.12793"},{"key":"ref47","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sutskever"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref49","article-title":"Layer normalization","author":"Lei Ba","year":"2016","journal-title":"arXiv:1607.06450"},{"key":"ref50","first-page":"468","article-title":"AndroZoo: Collecting millions of Android apps for the research community","volume-title":"Proc. IEEE\/ACM 13th Work. Conf. Mining Softw. Repositories (MSR)","author":"Allix"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2901679"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-demos.38"},{"key":"ref53","volume-title":"Secgpt","year":"2023"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2024.102642"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.433"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-23766-w"},{"key":"ref57","article-title":"The llama 3 herd of models","author":"Grattafiori","year":"2024","journal-title":"arXiv:2407.21783"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10979936.pdf?arnumber=10979936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T17:33:52Z","timestamp":1747244032000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10979936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3565526","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}