{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:31:20Z","timestamp":1769722280688,"version":"3.49.0"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key RD Program of China","award":["2018YFB1004700"],"award-info":[{"award-number":["2018YFB1004700"]}]},{"name":"the NSF of Tianjin","award":["18JCQNJC69900"],"award-info":[{"award-number":["18JCQNJC69900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632013"],"award-info":[{"award-number":["61632013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632020"],"award-info":[{"award-number":["61632020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61822205"],"award-info":[{"award-number":["61822205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902211"],"award-info":[{"award-number":["61902211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972313"],"award-info":[{"award-number":["61972313"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Postdoctoral Science Fund of China","award":["2019M663725"],"award-info":[{"award-number":["2019M663725"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tpds.2020.3046092","type":"journal-article","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T21:46:09Z","timestamp":1608587169000},"page":"1-1","source":"Crossref","is-referenced-by-count":14,"title":["Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection"],"prefix":"10.1109","author":[{"given":"Liangyi","family":"Gong","sequence":"first","affiliation":[]},{"given":"Hao","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zhenhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaobo","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2976936"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ab.2012.10.020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1740129"},{"key":"ref32","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2542095.2542107"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3272035"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1972.10481251"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2382577.2382579"},{"key":"ref34","year":"2010"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.105"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326094"},{"key":"ref28","year":"2008"},{"key":"ref27","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664245"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref1","first-page":"50","article-title":"Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets","author":"zhou","year":"2012","journal-title":"Proc 19th Annu Netw Distrib Syst Secur Symp"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"ref24","year":"2012"},{"key":"ref23","year":"2016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref25","first-page":"95","article-title":"Dissecting android malware: Characterization and evolution","author":"jiang","year":"2012","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref50","first-page":"757","article-title":"UNVEIL: A large-scale, automated approach to detecting ransomware","author":"kharaz","year":"2016","journal-title":"Proc 25th USENIX Conf Secur Symp"},{"key":"ref51","article-title":"Permission re-delegation: Attacks and defenses","author":"felt","year":"2011","journal-title":"Proc 20th USENIX Conf Secur"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300122"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400108"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541946"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326083"},{"key":"ref54","year":"2018"},{"key":"ref53","year":"2009"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"ref10","year":"2016"},{"key":"ref11","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2016.036"},{"key":"ref13","year":"2009"},{"key":"ref14","year":"2016"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-319-12280-9_13","article-title":"Mining API calls and permissions for android malware detection","author":"sharma","year":"2014","journal-title":"Proc Int Conf Cryptol Netw Secur"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879302"},{"key":"ref4","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23118"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2778147"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181321"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4172"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref49","first-page":"957","article-title":"From word embeddings to document distances","author":"kusner","year":"2015","journal-title":"Proc 32nd Int Conf Mach Learn"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387530"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2950134"},{"key":"ref45","article-title":"NDK","year":"2008"},{"key":"ref48","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"Proc 31st Int Conf Mach Learn"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref42","year":"2018"},{"key":"ref41","year":"2017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"key":"ref43","first-page":"1037","article-title":"Peeking into your app without actually seeing it: UI state inference and novel Android attacks","author":"chen","year":"2014","journal-title":"Proc 23rd Usenix Conf Secur Symp"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/4359390\/09301262.pdf?arnumber=9301262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:50:30Z","timestamp":1652194230000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9301262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/tpds.2020.3046092","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}