{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:56Z","timestamp":1773510896834,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1109\/tdsc.2021.3094824","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T20:09:21Z","timestamp":1625688561000},"page":"3357-3370","source":"Crossref","is-referenced-by-count":47,"title":["Backdoor Attack on Machine Learning Based Android Malware Detectors"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9118-5386","authenticated-orcid":false,"given":"Chaoran","family":"Li","sequence":"first","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4224-6450","authenticated-orcid":false,"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Software Systems and Cybersecurity, Faculty of IT, Monash University, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1388-7715","authenticated-orcid":false,"given":"Derui","family":"Wang","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0655-666X","authenticated-orcid":false,"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"given":"Muhammad Ejaz","family":"Ahmed","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6353-8359","authenticated-orcid":false,"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Internet security threat report","volume-title":"Symantec","author":"Wood","year":"2015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"ref3","article-title":"Mcafee mobile threat report q1, 2020","year":"2020","journal-title":"McAfee Labs"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070262"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879302"},{"issue":"12","key":"ref11","first-page":"2278","article-title":"Malware and malware detection techniques: A survey","volume":"2","author":"Landage","year":"2013","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref15","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3391297"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3053842"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00175354"},{"key":"ref20","article-title":"AVPASS: Leaking and bypassing antivirus detection model automatically","author":"Jung","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.007"},{"key":"ref23","article-title":"Fighting malware with machine learning","author":"Kov\u00e1\u010d"},{"key":"ref24","article-title":"A gentle introduction to concept drift in machine learning","author":"Brownlee","year":"2018"},{"key":"ref25","first-page":"729","article-title":"TESSERACT: Eliminating experimental bias in malware classification across space and time","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Pendlebury"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-2279-5"},{"key":"ref28","first-page":"1299","article-title":"When does machine learning FAI? Generalized transferability for evasion and poisoning attacks","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Suciu"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134642"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2017.8171381"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.11.032"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref40","article-title":"Monkeyrunner"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2592003"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.35"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.51"},{"key":"ref44","first-page":"6103","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. Advances Neural Inf. Process. Syst.","author":"Shafahi"},{"key":"ref45","article-title":"Clean-label backdoor attacks","author":"Turner","year":"2018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9872146\/09477038.pdf?arnumber=9477038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:16:07Z","timestamp":1705014967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9477038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3094824","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]}}}