{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:41:31Z","timestamp":1771958491407,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/snpd.2018.8441128","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T18:08:40Z","timestamp":1535047720000},"page":"140-145","source":"Crossref","is-referenced-by-count":20,"title":["Tuning Deep Learning Performance for Android Malware Detection"],"prefix":"10.1109","author":[{"given":"Jarrett","family":"Booz","sequence":"first","affiliation":[]},{"given":"Josh","family":"McGiff","sequence":"additional","affiliation":[]},{"given":"William G.","family":"Hatcher","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"James","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.7"},{"key":"ref12","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref13","year":"2017","journal-title":"Data Science and Machine Learning in the Internet of Things and Predictive Maintenance"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref15","author":"sui","year":"2016","journal-title":"Global smartphone os market share by region Q3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513266"},{"key":"ref18","first-page":"99","author":"yu","year":"2014","journal-title":"Towards Neural Network Based Malware Detection on Android Mobile Devices"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1561\/2000000039"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2015.11.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2830661"},{"key":"ref7","author":"gmbh","year":"2017","journal-title":"Number of smartphone users in the United States from 2010 to 2022 (in millions)*"},{"key":"ref2","author":"abadi","year":"2016","journal-title":"Tensorflow Large-scale machine learning on heterogeneous distributed systems"},{"key":"ref1","year":"0","journal-title":"Keras The Python deep learning library"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682765"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631434"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831173"},{"key":"ref23","first-page":"438","article-title":"DeepFlow: deep learning-based malware detection by mining Android application for abnormal usage of sensitive data","author":"zhu","year":"2017","journal-title":"2017 IEEE Symposium on Computers and Communications (ISCC)"}],"event":{"name":"2018 19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","location":"Busan","start":{"date-parts":[[2018,6,27]]},"end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8422066\/8441025\/08441128.pdf?arnumber=8441128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:57:12Z","timestamp":1643187432000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8441128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/snpd.2018.8441128","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}