{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:57:11Z","timestamp":1774173431387,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key Program of National Science Foundation of China","award":["62172168"],"award-info":[{"award-number":["62172168"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tdsc.2025.3561944","type":"journal-article","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T13:56:23Z","timestamp":1746626183000},"page":"5464-5479","source":"Crossref","is-referenced-by-count":3,"title":["MalScan: Android Malware Detection Based on Social-Network Centrality Analysis"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1515-3558","authenticated-orcid":false,"given":"Yueming","family":"Wu","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-8348","authenticated-orcid":false,"given":"Wenqi","family":"Suo","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6694-9126","authenticated-orcid":false,"given":"Siyue","family":"Feng","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Texas, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The mobile malware threat landscape in 2022","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583806"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844349"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSP51677.2021.9357569"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"ref10","first-page":"50","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets","volume-title":"Proc. Annu. Symp. Netw. Distrib. Syst. Secur.","author":"Zhou"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2982635"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3414-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00023"},{"key":"ref18","first-page":"468","article-title":"AndroZoo: Collecting millions of Android apps for the research community","volume-title":"Proc. 13th Work. Conf. Mining Softw. Repositories","author":"Allix"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464833"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103409"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450044"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3168285"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/35075138"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2005.03.012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0407994102"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/41.4.580"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(96)00300-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289026"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0053095"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2280884"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/srep17095"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387530"},{"key":"ref36","article-title":"Androguard","author":"Desnos","year":"2011"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(00)00311-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-349-95121-5_2565-1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref40","article-title":"Virustotal - free online virus, malware and URL scanner","year":"2019"},{"key":"ref41","article-title":"Socialnetwork","year":"2019"},{"key":"ref42","article-title":"scikit-learn","year":"2019"},{"key":"ref43","article-title":"Tensors and dynamic neural networks in Python with strong GPU acceleration (PyTorch)","year":"2021"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2020.100403"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623320"},{"key":"ref46","article-title":"Unraveling the key of machine learning solutions for Android malware detection","author":"Liu","year":"2024"},{"key":"ref47","article-title":"SanDroid - An automatic Android application analysis system","year":"2019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.002"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033026"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3146363"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s22072597"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274744"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180223"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.61"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274731"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9539-8"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23379"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3162625"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2022.125279"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3442588"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11150357\/10989652.pdf?arnumber=10989652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:53:02Z","timestamp":1757011982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10989652\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":67,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3561944","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}