{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:45:24Z","timestamp":1761198324467,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1109\/icassp48485.2024.10446595","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:56:31Z","timestamp":1710788191000},"page":"2440-2444","source":"Crossref","is-referenced-by-count":5,"title":["PVitNet:An Effective Approach for Android Malware Detection Using Pyramid Feature Processing and Vision Transformer"],"prefix":"10.1109","author":[{"given":"Denghui","family":"Yang","sequence":"first","affiliation":[{"name":"Sichuan University,School of Cyber Science and Engineering,Chengdu,China"}]},{"given":"Yifan","family":"Ding","sequence":"additional","affiliation":[{"name":"Sichuan University,School of Cyber Science and Engineering,Chengdu,China"}]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sichuan University,School of Cyber Science and Engineering,Chengdu,China"}]},{"given":"Yizhou","family":"Li","sequence":"additional","affiliation":[{"name":"Sichuan University,School of Cyber Science and Engineering,Chengdu,China"}]}],"member":"263","reference":[{"journal-title":"Peoples Daily","key":"ref1","article-title":"Opinions on Strengthening the Fight against and Governance of Illegal Criminal Activities in Telecommunications Network Fraud[N]"},{"volume-title":"2022 China Mobile Security Status Report","key":"ref2"},{"volume-title":"Mobile operating system market share worldwide","year":"2022","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100372"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03940-5"},{"article-title":"Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning","volume-title":"The 18th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC)","author":"Samaneh","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09634-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","year":"2020","author":"Dosovitskiy","key":"ref13"},{"issue":"5","key":"ref14","first-page":"14","volume-title":"LeNet-5, convolutional neural networks[J]","volume":"20","author":"LeCun","year":"2015"},{"author":"Alex","key":"ref15","article-title":"ImageNet Classification with Deep Convolutional Neural Networks (AlexNet)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/sym13071107"},{"article-title":"Malware Detection by Eating a Whole APK","volume-title":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","author":"Mohammad","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app12115394"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-8208-z"}],"event":{"name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2024,4,14]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,4,19]]}},"container-title":["ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10445798\/10445803\/10446595.pdf?arnumber=10446595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T05:21:57Z","timestamp":1722576117000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10446595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icassp48485.2024.10446595","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]}}}