{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T12:10:59Z","timestamp":1774527059760,"version":"3.50.1"},"reference-count":87,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001459","name":"Singapore Ministry of Education Academic Research Fund Tier 1","doi-asserted-by":"publisher","award":["2018-T1-002-069"],"award-info":[{"award-number":["2018-T1-002-069"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Prime Ministers Office, Singapore through its National Cybersecurity Research and Development Program","doi-asserted-by":"publisher","award":["RF2018 NCR-NCR005-0001"],"award-info":[{"award-number":["RF2018 NCR-NCR005-0001"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004720","name":"Singapore National Research Foundation through NCR","doi-asserted-by":"publisher","award":["NSOE003-0001"],"award-info":[{"award-number":["NSOE003-0001"]}],"id":[{"id":"10.13039\/100004720","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NRF Investigatorship","award":["NRFI06-2020-0022"],"award-info":[{"award-number":["NRFI06-2020-0022"]}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Prime Ministers Office, Singapore through NCR","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902395"],"award-info":[{"award-number":["61902395"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007065","name":"NVIDIA AI Tech Center","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2020.3025436","type":"journal-article","created":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T20:26:24Z","timestamp":1600892784000},"page":"1563-1578","source":"Crossref","is-referenced-by-count":116,"title":["A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9080-6865","authenticated-orcid":false,"given":"Ruitao","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9477-4100","authenticated-orcid":false,"given":"Sen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6388-2571","authenticated-orcid":false,"given":"Guozhu","family":"Meng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9726-3434","authenticated-orcid":false,"given":"Shang-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"key":"ref72","first-page":"228","article-title":"Permission-based Android malware detection","volume":"2","author":"aung","year":"2013","journal-title":"Int J Sci Technol Res"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35473-1_12"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185466"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"ref39","year":"2020","journal-title":"SOOT"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2017.7960108"},{"key":"ref38","year":"2020","journal-title":"Androguard"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23287"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727508"},{"key":"ref31","year":"2020","journal-title":"Post-training Quantization"},{"key":"ref30","year":"2020","journal-title":"PyTorch Mobile"},{"key":"ref37","year":"2020","journal-title":"A Tool for Reverse Engineering Android Apk Files"},{"key":"ref36","year":"2020","journal-title":"Dex2jar"},{"key":"ref35","year":"2020","journal-title":"Axml"},{"key":"ref34","year":"2020","journal-title":"Axmldec"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484359"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931043"},{"key":"ref28","year":"2020","journal-title":"Core ML"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"ref27","year":"2020","journal-title":"Apkmirror Market"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00040"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref29","year":"2020","journal-title":"Caffe2 Mobile"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924549"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-008-0113-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275523"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380417"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"ref22","article-title":"Seqmobile: An efficient sequence-based malware detection system using RNN on mobile devices","author":"feng","year":"2020","journal-title":"Proc ICECCS"},{"key":"ref21","article-title":"Why an Android app is classified as malware? Towards malware classification interpretation","author":"wu","year":"2020","journal-title":"arXiv 2004 11516"},{"key":"ref24","year":"2020","journal-title":"TensorFlow Lite"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2019.00014"},{"key":"ref26","year":"2020","journal-title":"Overview of MobiTive"},{"key":"ref25","year":"2020","journal-title":"Symantec SecurityFocus"},{"key":"ref50","year":"2020","journal-title":"Inspec"},{"key":"ref51","year":"2020","journal-title":"Trepn Profiler for Android"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2556464.2556467"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196419"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref55","first-page":"1","article-title":"Who is real bob? adversarial attacks on speaker recognition systems","author":"chen","year":"2021","journal-title":"Proc S&P"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/AI4Mobile.2019.8672691"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref10","first-page":"280","article-title":"IccTA: detecting inter-component privacy leaks in Android apps","author":"li","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref40","year":"2020","journal-title":"Keras Neural Networks API"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897860"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2985246"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989055"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.007"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338954"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10374-7_7"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"ref19","year":"2020","journal-title":"XDA-Developers Android Forums"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00028"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref5","first-page":"50","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets","author":"zhou","year":"2012","journal-title":"Proc NDSS"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380368"},{"key":"ref7","first-page":"569","article-title":"Droidscope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic Android malware analysis","author":"yan","year":"2012","journal-title":"Proc USENIX Security07"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00080"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/800"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref46","year":"2020","journal-title":"Pwnzen Infotech"},{"key":"ref45","year":"2020","journal-title":"Contagio Website"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00051"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"ref42","year":"2020","journal-title":"TensorFlow&#x2122;"},{"key":"ref41","year":"2020","journal-title":"Scikit-Learn"},{"key":"ref44","year":"2020","journal-title":"VirusTotal"},{"key":"ref43","year":"2020","journal-title":"Daivik Opcode"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09204665.pdf?arnumber=9204665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:38Z","timestamp":1652194358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9204665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":87,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.3025436","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}