{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:54:16Z","timestamp":1745369656815},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/bigdata52589.2021.9671842","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:39:16Z","timestamp":1642106356000},"source":"Crossref","is-referenced-by-count":3,"title":["DECADE - Deep Learning Based Content-hiding Application Detection System for Android"],"prefix":"10.1109","author":[{"given":"Mingming","family":"Peng","sequence":"first","affiliation":[]},{"given":"Max","family":"Khanov","sequence":"additional","affiliation":[]},{"given":"Saikeerthi","family":"Reddy Madireddy","sequence":"additional","affiliation":[]},{"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Esra","family":"Akbas","sequence":"additional","affiliation":[]},{"given":"Gokila","family":"Dorai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"tamma","year":"2015","journal-title":"Learning Android Forensics"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging6090092"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_11"},{"key":"ref32","author":"reimers","year":"2019","journal-title":"Sentence-bert Sentence embeddings using siamese bert-networks[J]"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2068"},{"key":"ref30","first-page":"ii-1188?ii","article-title":"Distributed representations of sentences and documents","author":"le","year":"0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC.2018.8703316"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2491929"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref10","year":"0","journal-title":"mobile9"},{"key":"ref40","year":"0","journal-title":"Android Debug Bridge"},{"key":"ref11","year":"0","journal-title":"1mobile market"},{"key":"ref12","year":"0","journal-title":"Aurora store mobile market helper app 2021"},{"key":"ref13","year":"0","journal-title":"Huawei appgallery"},{"key":"ref14","year":"0","journal-title":"Android App"},{"key":"ref15","year":"0","journal-title":"Aptoidecom"},{"key":"ref16","year":"0","journal-title":"APKMirror"},{"key":"ref17","year":"0","journal-title":"Getjar"},{"key":"ref18","year":"0","journal-title":"Getapk market"},{"key":"ref19","year":"0","journal-title":"AppBrain"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/1751-0473-6-7"},{"key":"ref4","author":"iandola","year":"2016","journal-title":"SqueezeNet AlexNet-level accuracy with 50x fewer parameters and"},{"key":"ref27","author":"hoisington","year":"2015","journal-title":"Android Boot Camp for Developers Using Java A Guide to Creating Your First Android Apps"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355344"},{"key":"ref6","year":"0","journal-title":"Slide"},{"key":"ref29","author":"mikolov","year":"2013","journal-title":"Efficient Estimation of Word Representations in Vector Space"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301007"},{"key":"ref8","year":"0","journal-title":"F-Droid"},{"key":"ref7","year":"0","journal-title":"Mobango"},{"key":"ref2","article-title":"Annual number of app downloads from the google play store worldwide from 2016 to 2020","author":"departmen","year":"0","journal-title":"The Statisticain"},{"key":"ref9","year":"0"},{"key":"ref1","article-title":"Nearly three quarters of the world will use just their smartphones to access the internet by 2025","author":"evers","year":"0","journal-title":"CNBC"},{"key":"ref46","year":"0","journal-title":"Vault - hide pics videos app lock free backup"},{"key":"ref20","author":"olmeda","year":"2017","journal-title":"Miramar man on trial charged with murdering his missing wife"},{"key":"ref45","year":"0","journal-title":"Private photo vault - hide private photos videos"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7981-3_31"},{"key":"ref47","year":"0","journal-title":"Clock - the vault Secret photo video locker"},{"key":"ref21","author":"murphy","year":"2016","journal-title":"What you&#x2019;re missing in hidden apps (And 5 Data Forensic Tools!)"},{"key":"ref42","author":"lyon","year":"0","journal-title":"NCAT"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.011"},{"key":"ref41","author":"elenkov","year":"0","journal-title":"Android Backup Extractor"},{"key":"ref23","article-title":"Detection and recovery of anti-forensic (vault) applications on android devices","author":"duncan","year":"2018"},{"key":"ref44","year":"0","journal-title":"Pv - secret calculator hide pictures photo vault"},{"key":"ref26","year":"2021","journal-title":"Number of apps available in leading app stores as of 1st quarter 2021"},{"key":"ref43","year":"0","journal-title":"Torch vault- hide gallery&#x2019;s photos video"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.07.004"}],"event":{"name":"2021 IEEE International Conference on Big Data (Big Data)","location":"Orlando, FL, USA","start":{"date-parts":[[2021,12,15]]},"end":{"date-parts":[[2021,12,18]]}},"container-title":["2021 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9671263\/9671273\/09671842.pdf?arnumber=9671842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:35Z","timestamp":1652201735000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9671842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/bigdata52589.2021.9671842","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}