{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T09:14:12Z","timestamp":1775034852109,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:00:00Z","timestamp":1769731200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:00:00Z","timestamp":1769731200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,1,30]]},"DOI":"10.1109\/cnml68938.2026.11453057","type":"proceedings-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:49:32Z","timestamp":1774986572000},"page":"269-276","source":"Crossref","is-referenced-by-count":0,"title":["ADODroid: A Static Detection Model for Android Malware Based on GCN and BiLSTM"],"prefix":"10.1109","author":[{"given":"Shuoyuan","family":"Zhang","sequence":"first","affiliation":[{"name":"Southwest Jiaotong University,School of Computing and Artificial Intelligence,Chengdu,China"}]},{"given":"Xinyou","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southwest Jiaotong University,School of Computing and Artificial Intelligence,Chengdu,China"}]},{"given":"Zonghai","family":"Zhu","sequence":"additional","affiliation":[{"name":"Southwest Jiaotong University,School of Computing and Artificial Intelligence,Chengdu,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3390612"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03940-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3417978"},{"issue":"04","key":"ref7","first-page":"388","article-title":"Android Malware Detection Method Based on GCN and BiLSTM","volume":"51","author":"He","year":"2024","journal-title":"Computer Science"},{"issue":"08","key":"ref8","first-page":"1875","article-title":"A Review of Static Detection Methods for Android Malicious Application","volume":"60","author":"Pan","year":"2023","journal-title":"Journal of Computer Research and Development"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000523"},{"issue":"05","key":"ref10","first-page":"88","article-title":"Android malware detection based on graph attention networks","volume":"59","author":"Yue","year":"2022","journal-title":"Journal of Sichuan University (Natural Science Edition)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09968-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3188583"},{"issue":"06","key":"ref13","first-page":"2526","article-title":"Obfuscation-resilient Android Malware Detection Based on Graph Convolutional Networks","volume":"34","author":"Wu","year":"2023","journal-title":"Journal of Software"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00471-w"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3544968"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102264"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5104-0"},{"issue":"12","key":"ref21","first-page":"3704","article-title":"Static detection of malware in container based on LSTM-CNN","volume":"37","author":"Jin","year":"2020","journal-title":"Application Research of Computers"},{"issue":"05","key":"ref22","first-page":"677","article-title":"Malware Detection Method Based on LSTM-SVM Model","volume":"48","author":"Zhao","year":"2022","journal-title":"Journal of East China University of Science and Technology"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"issue":"11","key":"ref24","first-page":"207","article-title":"Behavioral Model Construction Method for Mobile Applications Based on Smali Code","volume":"44","author":"Yu","year":"2017","journal-title":"Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1002"},{"issue":"09","key":"ref26","first-page":"321","article-title":"Android Malware Detection Method Based on Abstract API Call Sequences","volume":"36","author":"Cui","year":"2019","journal-title":"Computer Applications and Software"},{"key":"ref27","article-title":"Android platform class index"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191784"},{"key":"ref31","first-page":"468","article-title":"Androzoo: Collecting millions of android apps for the research community","volume-title":"Proceedings of the 13th International Conference on Mining Software Repositories","author":"Allix"},{"key":"ref32","article-title":"VirusShare"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2020.100403"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3442588"}],"event":{"name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","location":"Chongqing, China","start":{"date-parts":[[2026,1,30]]},"end":{"date-parts":[[2026,2,1]]}},"container-title":["2026 International Conference on Communication Networks and Machine Learning (CNML)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11452215\/11452251\/11453057.pdf?arnumber=11453057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:11:44Z","timestamp":1775023904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11453057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,30]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cnml68938.2026.11453057","relation":{},"subject":[],"published":{"date-parts":[[2026,1,30]]}}}