{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T09:11:41Z","timestamp":1744189901068,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iotsms.2018.8554572","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:54:17Z","timestamp":1543884857000},"page":"250-255","source":"Crossref","is-referenced-by-count":9,"title":["Talos App: On-Device Machine Learning Using TensorFlow to Detect Android Malware"],"prefix":"10.1109","author":[{"given":"Harshvardhan C","family":"Takawale","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Thakur","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis","author":"lok-kwong","year":"2012","journal-title":"USENIX Security Symposium"},{"key":"ref11","article-title":"Riskranker: scalable and accurate zero-day android malware detection","author":"michael","year":"2012","journal-title":"Proceedings of the 10th International Conference on Mobile Systems Applications and Services ACM"},{"key":"ref12","article-title":"IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware","volume":"16","author":"michelle y","year":"2016","journal-title":"NDSS"},{"key":"ref13","article-title":"Applying machine learning classifiers to dynamic android malware detection at scale","author":"brandon","year":"2013","journal-title":"Wireless Communications and Mobile Computing Conference (IWCMC) 2013 9th International IEEE"},{"key":"ref14","article-title":"Machine learning for android malware detection using permission and api calls","author":"naser","year":"2013","journal-title":"Tools with Artificial Intelligence (ICTAI) 2013 IEEE 25th International Conference on IEEE"},{"journal-title":"Android Developers","article-title":"Request App Permissions | Android Developers","year":"0","key":"ref15"},{"journal-title":"Feature (machine learning)","year":"2018","key":"ref16"},{"journal-title":"Github","article-title":"androguard\/androguard","year":"2018","key":"ref17"},{"journal-title":"Arinerron","article-title":"A list of all Android permissions","year":"0","key":"ref18"},{"key":"ref19","article-title":"Android botnets: What urls are telling us","author":"andi","year":"2015","journal-title":"International Conference on Network and System Security"},{"key":"ref28","first-page":"455","article-title":"Review on methods of selecting number of hidden nodes in artificial neural network","volume":"11","author":"panchal","year":"2014","journal-title":"Int J Comput Sci Mob Comput"},{"key":"ref4","article-title":"Trends in android malware detection","author":"kaveh","year":"2013","journal-title":"Journal of Digital Forensics Security and Law"},{"journal-title":"TensorFlow&#x2122;","article-title":"Module: tf | TensorFlow","year":"0","key":"ref27"},{"journal-title":"Securelist - Kaspersky Lab's cyberthreat research and reports 07-Mar-2018","article-title":"Mobile malware evolution 2017","year":"0","key":"ref3"},{"journal-title":"Android-review googlesource com","year":"0","key":"ref6"},{"journal-title":"Protocol","article-title":"protocolbuffers\/protobuf","year":"0","key":"ref29"},{"journal-title":"Information Security News IT Security News and Cybersecurity Insights SecurityWeek","article-title":"Mobile Malware Shows Rapid Growth in Volume and Sophistication","year":"0","key":"ref5"},{"key":"ref8","article-title":"Droidmat: Android malware detection through manifest and api calls tracing","author":"dong-jie","year":"2012","journal-title":"Information Security (Asia JCIS) 2012 Seventh Asia Joint Conference On IEEE"},{"key":"ref7","article-title":"Apposcopy: Semantics-based detection of android malware through static analysis","author":"yu","year":"2014","journal-title":"Proceedings of the 2nd ACM SIGSOFT Symposium on Foundations of Software Engineering ACM"},{"year":"0","key":"ref2","article-title":"Number of Google Play Store apps 2018 | Statistic"},{"key":"ref9","first-page":"228","article-title":"Permission-based android malware detection","volume":"3","author":"zarni","year":"2013","journal-title":"International Journal of Scientific & Technology Research 2"},{"journal-title":"The Statisticain","article-title":"Smartphone sales by OS worldwide 2009&#x2013;2018 | Statistic","year":"0","key":"ref1"},{"key":"ref20","article-title":"Droidkin: Lightweight detection of android apps similarity","author":"hugo","year":"2014","journal-title":"International Conference on Security and Privacy in Communication Systems Springer Cham"},{"year":"0","key":"ref22","article-title":"Building TensorFlow on Android | TensorFlow"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017915495"},{"key":"ref24","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","author":"john","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref23","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2015","journal-title":"International Conference on Learning Representations"},{"journal-title":"API Mirror","article-title":"MNIST For ML Beginners","year":"0","key":"ref26"},{"journal-title":"Lecture 6 5-rmsprop Divide the gradient by a running average of its recent magnitude coursera Neural networks for machine learning","year":"2012","author":"tijmen","key":"ref25"}],"event":{"name":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Internet of Things: Systems, Management and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537438\/8554379\/08554572.pdf?arnumber=8554572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:34:39Z","timestamp":1546997679000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iotsms.2018.8554572","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}