{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:13:27Z","timestamp":1775855607352,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1109\/tcyb.2022.3164625","type":"journal-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:45:26Z","timestamp":1651088726000},"page":"617-627","source":"Crossref","is-referenced-by-count":51,"title":["Cyber Code Intelligence for Android Malware Detection"],"prefix":"10.1109","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8288-6180","authenticated-orcid":false,"given":"Junyang","family":"Qiu","sequence":"first","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7207-0716","authenticated-orcid":false,"given":"Qing-Long","family":"Han","sequence":"additional","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4711-7543","authenticated-orcid":false,"given":"Wei","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7801","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2982635"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3465171"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23379"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897856"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9539-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3417978"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3162625"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00085"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2777960"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5104-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0803-6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3446905"},{"key":"ref30","first-page":"279","article-title":"Android malware detection using function call graph with graph convolutional networks","volume-title":"Proc. 2nd Int. Conf. Secure Cyber Comput. Commun. (ICSCCC)","author":"Vinayaka"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA51271.2020.00069"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3067658"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2556464.2556467"},{"key":"ref34","first-page":"625","article-title":"Transcend: Detecting concept drift in malware classification models","volume-title":"Proc. 26th Usenix Security Symp. (USENIX SECURITY)","author":"Jordaney"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02450-5_11"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2019.00-20"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3379530"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-017-6493-y"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"ref40","first-page":"1","article-title":"Graph2vec: Learning distributed representations of graphs","volume-title":"Proc. Int. Workshop Min. Learn. Graphs","author":"Narayanan"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2016.7502343"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30619-9_14"},{"issue":"1","key":"ref43","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"issue":"86","key":"ref45","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9998320\/09764650.pdf?arnumber=9764650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:40:53Z","timestamp":1705963253000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9764650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":45,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2022.3164625","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]}}}