{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:43:04Z","timestamp":1770284584905,"version":"3.49.0"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100024788","name":"Mastercard","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100024788","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SMU Internal Research Grant 2023: Strategic Research, FGSR Internal Grant Fund","award":["201690 6400"],"award-info":[{"award-number":["201690 6400"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3597575","type":"journal-article","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T17:44:23Z","timestamp":1754934263000},"page":"141958-141974","source":"Crossref","is-referenced-by-count":2,"title":["A Review of Explainable AI for Android Malware Detection and Analysis"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7281-1943","authenticated-orcid":false,"given":"Maryam","family":"Tanha","sequence":"first","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, Vancouver, BC, Canada"}]},{"given":"Somayeh","family":"Kafaie","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computing Science, Saint Mary&#x2019;s University, Halifax, NS, Canada"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Market Share of Mobile Operating Systems Worldwide From 2009 To 2024 By Quarter","author":"Sherif","year":"2025"},{"key":"ref2","volume-title":"Number of Apps Available in Leading App Stores As of August 2024","author":"Ceci","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123187"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9368-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3549206.3549284"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v40i2.2850"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3561048"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref10","volume-title":"Android and Security","author":"Lockheimer","year":"2012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100358"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006143"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3544968"},{"key":"ref16","volume-title":"Designing Machine Learning Systems","author":"Huyen","year":"2022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/int.23088"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12228"},{"key":"ref19","article-title":"Machine learning interpretability in malware detection","author":"Brigugilio","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.688969"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3409843"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3236543"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021924"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553598"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-006-0025-y"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00022"},{"key":"ref29","first-page":"1487","article-title":"Explanation-guided backdoor poisoning attacks against malware classifiers","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Severi"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref31","volume-title":"Interpretable Machine Learning","author":"Molnar","year":"2024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3345768.3355915"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5220\/0012415800003648"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v13i3.6986"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16826"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103691"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/AIC57670.2023.10263974"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-32-396098-4.00017-X"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob55322.2022.9941515"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3423096"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3194452.3194465"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45371-8_6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3143439"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.118"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref47","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Lundberg"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref49","article-title":"Local rule-based explanations of black box decision systems","author":"Guidotti","year":"2018","journal-title":"arXiv:1805.10820"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref51","volume-title":"MITRE ATT&CK Android Platform","author":"ATT&CK","year":"2025"},{"key":"ref52","volume-title":"Mobile Tactics","author":"ATT&CK","year":"2025"},{"key":"ref53","volume-title":"Mobile Techniques","author":"ATT&CK","year":"2025"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"ref55","volume-title":"VirusShare","year":"2025"},{"key":"ref56","volume-title":"VirusTotal","year":"2025"},{"key":"ref57","volume-title":"Tackling Att&ck: Can Virustotal Data Help?","author":"Studdard","year":"2023"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671343"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103772"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3594553"},{"key":"ref61","article-title":"GPT-4 technical report","volume-title":"arXiv:2303.08774","author":"Achiam","year":"2023"},{"key":"ref62","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics, Hum. Lang. Technol.","author":"Devlin"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3571730"},{"key":"ref64","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive NLP tasks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lewis"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE59415.2024.10667123"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372830"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1900654116"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-022-00867-8"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00019"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2023.06.036"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3180184"},{"key":"ref74","first-page":"729","article-title":"$TESSERACT$: Eliminating experimental bias in malware classification across space and time","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Pendlebury"},{"key":"ref75","volume-title":"Device Compatibility Overview","author":"Android","year":"2025"},{"key":"ref76","author":"Dhlr","year":"2023","journal-title":"Liquid Neural Networks"},{"key":"ref77","first-page":"517","article-title":"Exploring syscall-based semantics reconstruction of Android applications","volume-title":"Proc. 22nd Int. Symp. Res. Attacks","author":"Nisi"},{"issue":"1","key":"ref78","first-page":"44","article-title":"Dynamic mobile malware detection through system call-based image representation","volume":"12","author":"Casolare","year":"2021","journal-title":"J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl."}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11122514.pdf?arnumber=11122514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:46:25Z","timestamp":1755546385000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11122514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":78,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3597575","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}