{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:07:54Z","timestamp":1767182874904,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8126084","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T17:26:11Z","timestamp":1512408371000},"page":"1677-1683","source":"Crossref","is-referenced-by-count":65,"title":["Deep android malware detection and classification"],"prefix":"10.1109","author":[{"given":"R.","family":"Vinayakumar","sequence":"first","affiliation":[]},{"given":"K. P.","family":"Soman","sequence":"additional","affiliation":[]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Change-based population coding","author":"moazzezi","year":"2011","journal-title":"Diss UCL (University College London)"},{"key":"ref32","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"journal-title":"Adam A method for stochastic optimization","year":"2014","author":"kingma","key":"ref31"},{"key":"ref30","first-page":"1","article-title":"Theano: A cpu and gpu math compiler in python","author":"ergstra","year":"2010","journal-title":"Proc 9th Python in Science Conf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"ref11","first-page":"7","article-title":"The effectiveness of application permissions","author":"felt","year":"2011","journal-title":"Proceedings of the 2nd USENIX Conference on Web Application Development"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.86"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref16","first-page":"50","article-title":"Hey, you, get off of my market: detecting malicious apps in official and alternative android markets","volume":"25","author":"zhou","year":"2012","journal-title":"NDSS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.77"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"45","DOI":"10.18046\/syt.v14i37.2241","article-title":"Framework for malware analysis in android","volume":"14","author":"urcuqui-l6pez","year":"2016","journal-title":"Sistemas & Telemdtica"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2016.29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.001"},{"journal-title":"Comparative study of deep learning software frameworks","year":"2015","author":"bahrampour","key":"ref27"},{"journal-title":"Dissecting the android bouncer summer-con2012 new york 2012 jun","year":"2012","author":"oberheide","key":"ref3"},{"key":"ref6","first-page":"123","article-title":"Hunting for metamorphic","author":"ferrie","year":"2001","journal-title":"Virus pdgs"},{"journal-title":"Tensorflow Large-scale machine learning on heterogeneous distributed systems","year":"2016","author":"abadi","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"journal-title":"malware detection methods retrieved october 25 2016 from url","year":"2016","key":"ref7"},{"journal-title":"Cisco 2014 Annual Security Report","year":"2014","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_10"},{"key":"ref22","article-title":"Deep learning. book in preparation for mit press","author":"goodfellow","year":"2016","journal-title":"URLi"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0364-0213(90)90002-E"},{"key":"ref26","first-page":"115","article-title":"Learning precise timing with lstm recurrent networks","volume":"3","author":"gers","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19991218"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2017,9,13]]},"location":"Udupi","end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08126084.pdf?arnumber=8126084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T07:26:48Z","timestamp":1570433208000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8126084\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8126084","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}