{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:27:36Z","timestamp":1774024056081,"version":"3.50.1"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272204"],"award-info":[{"award-number":["62272204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372105"],"award-info":[{"award-number":["62372105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Leading-edge Technology Program of Jiangsu Natural Science Foundation","award":["BK20202001"],"award-info":[{"award-number":["BK20202001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tkde.2024.3436891","type":"journal-article","created":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T17:29:10Z","timestamp":1723224550000},"page":"7483-7496","source":"Crossref","is-referenced-by-count":6,"title":["A Dynamic Analysis-Powered Explanation Framework for Malware Detection"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2751-2607","authenticated-orcid":false,"given":"Huijuan","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Xilong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0048-5979","authenticated-orcid":false,"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Zhicheng","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Jiangsu University, Zhenjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4960-174X","authenticated-orcid":false,"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas Tech University, Lubbock, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3544968"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559524"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3417978"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021924"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534639"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref7","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Lundberg"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3423096"},{"key":"ref9","article-title":"Neural malware analysis with attention mechanism","volume":"87","author":"Hiromu","year":"2019","journal-title":"Comput. Secur."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2023.23005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3168285"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00057"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152360"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879302"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3544968"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24475"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467168"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93025-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560418"},{"key":"ref25","article-title":"AndroZoo","author":"Allix","year":"2023"},{"key":"ref26","first-page":"468","article-title":"AndroZoo: Collecting millions of android apps for the research community","volume-title":"Proc. 13th Int. Conf. Mining Softw. Repositories","author":"Allix"},{"key":"ref27","article-title":"Droidbox","year":"2019"},{"key":"ref28","article-title":"CuckooDroid"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387530"},{"key":"ref30","article-title":"MobSF"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3142820"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i11.21607"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2884928"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3423096"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3067658"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5474"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2909902"},{"key":"ref38","article-title":"Androguard-reverse engineering, malware and goodware analysis of Android applications","author":"Desnos","year":"2023"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102198"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00026"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3522564"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678580"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484589"},{"key":"ref45","article-title":"Frida","year":"2022"},{"key":"ref46","article-title":"Droidmon","year":"2015"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3440033"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180172"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510074"},{"key":"ref50","article-title":"Maxim","year":"2022"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3112497"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01387"},{"key":"ref53","first-page":"1","article-title":"Random-access infinite context length for transformers","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Mohtashami"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3640460"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598054"},{"key":"ref56","first-page":"983","article-title":"Ablation-cam: Visual explanations for deep convolutional network via gradient-free localization","volume-title":"Proc. IEEE\/CVF Winter Conf. Appl. Comput. Vis.","author":"Ramaswamy"},{"key":"ref57","article-title":"Revisiting the importance of individual units in CNNs via ablation","author":"Zhou","year":"2018"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.039"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"ref60","article-title":"Local rule-based explanations of black box decision systems","author":"Guidotti","year":"2018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2019.8844920"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488012"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559505"},{"key":"ref66","article-title":"Fastbot-android open source handbook"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/10750897\/10632781.pdf?arnumber=10632781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:22:00Z","timestamp":1732666920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10632781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":63,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3436891","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}