{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:27:23Z","timestamp":1774024043021,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cns48642.2020.9162341","type":"proceedings-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T21:54:40Z","timestamp":1596837280000},"page":"1-9","source":"Crossref","is-referenced-by-count":15,"title":["Hybrid Analysis of Android Apps for Security Vetting using Deep Learning"],"prefix":"10.1109","author":[{"given":"Dewan","family":"Chaulagain","sequence":"first","affiliation":[]},{"given":"Prabesh","family":"Poudel","sequence":"additional","affiliation":[]},{"given":"Prabesh","family":"Pathak","sequence":"additional","affiliation":[]},{"given":"Sankardas","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Doina","family":"Caragea","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xinming","family":"Ou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169424"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19991218"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref14","article-title":"Efficient Estimation of Word Representations in Vector Space","author":"mikolov","year":"2013","journal-title":"ICLR Workshop"},{"key":"ref15","first-page":"45","article-title":"Software Framework for Topic Modelling with Large Corpora","author":"?eh??ek","year":"2010","journal-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks"},{"key":"ref16","author":"olah","year":"2015","journal-title":"Understanding LSTMs"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2034"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref19","first-page":"393","article-title":"TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04834-1_19"},{"key":"ref27","year":"2020","journal-title":"VirusTotal Analyze Suspicious Files and Urls"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818038"},{"key":"ref8","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref1","year":"2020","journal-title":"Mobile OS Market Share"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"ref22","first-page":"473","article-title":"DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks","author":"ke","year":"2018","journal-title":"2018 IEEE Symposium on Security and Privacy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"ref26","first-page":"468","article-title":"AndroZoo: Collecting Millions of Android Apps for the Research Community","author":"allix","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"}],"event":{"name":"2020 IEEE Conference on Communications and Network Security (CNS)","location":"Avignon, France","start":{"date-parts":[[2020,6,29]]},"end":{"date-parts":[[2020,7,1]]}},"container-title":["2020 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9153729\/9162157\/09162341.pdf?arnumber=9162341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:57:31Z","timestamp":1656345451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cns48642.2020.9162341","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}