{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T06:10:19Z","timestamp":1756534219303,"version":"3.44.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/icccn65249.2025.11133975","type":"proceedings-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:20Z","timestamp":1756489160000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["MalVIS: A pyramid vision transformer V2 (PVTv2) based framework for android malware detection"],"prefix":"10.1109","author":[{"family":"Devnath","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India"}]},{"given":"Manoneet Mahesh","family":"Sikhwal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India"}]},{"given":"Basant","family":"Subba","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206445"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0363-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294263"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2777960"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CICT56698.2022.9997991"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3700838.3703658"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3442588"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10749-8"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/3511808.3557533","article-title":"MalNet: A Large-Scale Image Database of Malicious Software","author":"Freitas","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446595"},{"key":"ref12","article-title":"Stamina: Scalable deep learning approach for mal-ware classification","volume-title":"Retrieved from the Internet","author":"Chen","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446595"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77028-4_9"},{"key":"ref16","article-title":"Gamut: sifting through images to detect android malware","volume-title":"Bachelor thesis","author":"Gennissen","year":"2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-022-0274-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206445"}],"event":{"name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2025,8,4]]},"location":"Tokyo, Japan","end":{"date-parts":[[2025,8,7]]}},"container-title":["2025 34th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11133715\/11133717\/11133975.pdf?arnumber=11133975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:28:24Z","timestamp":1756531704000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133975\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icccn65249.2025.11133975","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}