{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:26:06Z","timestamp":1762507566025,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508284","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:19:29Z","timestamp":1540509569000},"page":"782-789","source":"Crossref","is-referenced-by-count":19,"title":["DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks"],"prefix":"10.1109","author":[{"given":"Lingwei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Adversarial Feature Selection Against Evasion Attacks","author":"zhang","year":"2015","journal-title":"IEEE Transactions on Cybernetics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"ref11","article-title":"DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks","author":"hou","year":"2016","journal-title":"WAIM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"ref13","article-title":"Feature Weighting for Improved Classifier Robustness","author":"kolcz","year":"2009","journal-title":"CEAS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.60"},{"key":"ref15","article-title":"Feature cross-substitution in adversarial classification","author":"li","year":"2014","journal-title":"NIPS"},{"key":"ref16","article-title":"A General Retraining Framework for Scalable Adversarial Classification","author":"li","year":"2016","journal-title":"NIPS Workshop"},{"year":"2017","author":"lueg","key":"ref17"},{"journal-title":"Improving Back-Propagation by Adding an Adversarial Gradient","year":"2015","author":"nokland","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref28","article-title":"A Survey on Malware Detection Using Data Mining Techniques","volume":"50","author":"ye","year":"2017","journal-title":"ACM CSUR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1058-9"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63004-5_7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557167"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134636"},{"key":"ref8","article-title":"Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection","author":"demontis","year":"2017","journal-title":"TDSC"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0007-7"},{"key":"ref9","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"2015","journal-title":"ICLRE"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"journal-title":"Towards the science of security and privacy in machine learning","year":"2016","author":"papernot","key":"ref20"},{"year":"2013","author":"reisinger","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882946"},{"journal-title":"Feature squeezing Detecting adversarial examples in deep neural networks","year":"2017","author":"xu","key":"ref26"},{"key":"ref25","article-title":"Importance Reweighting Using Adversarial-Collaborative Training","author":"wu","year":"2016","journal-title":"NIPS Workshop"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2018,8,28]]},"location":"Barcelona","end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508284.pdf?arnumber=8508284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:56:34Z","timestamp":1643234194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508284","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}