{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:49:48Z","timestamp":1761709788181,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100011431","name":"Hubei Provincial Key Laboratory of Intelligent Robot","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011431","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008869","name":"Wuhan Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008869","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,16]]},"DOI":"10.1109\/crc51253.2020.9253482","type":"proceedings-article","created":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T21:51:17Z","timestamp":1605217877000},"page":"181-184","source":"Crossref","is-referenced-by-count":4,"title":["Research on Android Application Detection based on static permission and Random Forest"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Siqi","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref11","first-page":"45","article-title":"Using iterated bagging to debias regressions","author":"breiman","year":"2001","journal-title":"Machine Learning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70740"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS054"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_62"},{"key":"ref16","article-title":"Maximum Margin Learning and Adaptation of MLP Classifiers","author":"li","year":"2005","journal-title":"European Conference on Interspeech-eurospeech"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","article-title":"Least squares support vector machine classifiers","volume":"9","author":"suykens","year":"1999","journal-title":"Neural Processing Letters"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref6","article-title":"Automatic malicious android application detection approach by combining static analysis and dynamic testing","author":"haohua","year":"2017","journal-title":"Cyber Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7096271"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/82.664236"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011424425034"},{"key":"ref2","first-page":"1","article-title":"Entropy analysis to classify unknown packing algorithms for malware detection","volume":"16","author":"bat-erdene","year":"2016","journal-title":"International Journal of Information Security"},{"key":"ref1","article-title":"New malware detection framework based on N-grams and Support Vector Domain Description","author":"boujnouni","year":"2016","journal-title":"International Conference on Information Security and Assurance"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2014.6814679"}],"event":{"name":"2020 5th International Conference on Control, Robotics and Cybernetics (CRC)","start":{"date-parts":[[2020,10,16]]},"location":"Wuhan, China","end":{"date-parts":[[2020,10,18]]}},"container-title":["2020 5th International Conference on Control, Robotics and Cybernetics (CRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9253444\/9253445\/09253482.pdf?arnumber=9253482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:55:46Z","timestamp":1656345346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9253482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,16]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/crc51253.2020.9253482","relation":{},"subject":[],"published":{"date-parts":[[2020,10,16]]}}}