{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:25Z","timestamp":1775913505297,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2014CB347701"],"award-info":[{"award-number":["2014CB347701"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61722214"],"award-info":[{"award-number":["61722214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472338"],"award-info":[{"award-number":["61472338"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangdong Introducing Innovative and Enterpreneurial Teams","award":["2016ZT06D211"],"award-info":[{"award-number":["2016ZT06D211"]}]},{"DOI":"10.13039\/501100009334","name":"Pearl River S&T Nova Program of Guangzhou","doi-asserted-by":"crossref","award":["201710010046"],"award-info":[{"award-number":["201710010046"]}],"id":[{"id":"10.13039\/501100009334","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/tr.2017.2778147","type":"journal-article","created":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T20:34:58Z","timestamp":1513802098000},"page":"355-369","source":"Crossref","is-referenced-by-count":93,"title":["MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4701-1327","authenticated-orcid":false,"given":"Guanhong","family":"Tao","sequence":"first","affiliation":[]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ziying","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"ProGuard","year":"0"},{"key":"ref38","article-title":"Apktool","author":"tumbleson","year":"0"},{"key":"ref33","article-title":"API Mappings","year":"0"},{"key":"ref32","article-title":"ActivityManager","year":"0"},{"key":"ref31","author":"conover","year":"1998","journal-title":"Practical Nonparametric Statistics"},{"key":"ref30","first-page":"477","article-title":"API change and fault proneness: A threat to the success of android apps","author":"v\u00e1squez","year":"2013","journal-title":"The Joint Meeting of European Softw Eng and ACM SIGSOFT Symp Found of Softw Eng"},{"key":"ref37","first-page":"547","article-title":"Etude Comparative de la Distribution Florale Dans Une Portion Des\n Alpes et du Jura","volume":"37","author":"jaccard","year":"1901","journal-title":"Bulletin del la Socit Vaudoise des Sciences Naturelles"},{"key":"ref36","first-page":"65","article-title":"A simple sequentially rejective multiple test procedure","author":"holm","year":"1979","journal-title":"Scand J Statist"},{"key":"ref35","article-title":"IMSI","year":"0"},{"key":"ref34","article-title":"TelephonyManager","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.7.1545"},{"key":"ref11","article-title":"Google Play","year":"0"},{"key":"ref12","article-title":"VirusShare.com","year":"0"},{"key":"ref13","article-title":"Contagio Mobile","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"ref16","first-page":"569","article-title":"Droidscope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic android\n Malware analysis","author":"yan","year":"2012","journal-title":"Proc 21st USENIX Security Symp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542484"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351689"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/asmb.537"},{"key":"ref3","article-title":"Symantec Report on the Underground Economy July 07-June 08","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.61"},{"key":"ref8","first-page":"50","article-title":"Hey, you, get off of my market: Detecting\n malicious apps in official and alternative android markets","author":"zhou","year":"2012","journal-title":"Proc 19th Annu Netw Distrib Syst Security Symp"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24018-3_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref1","article-title":"McAfee Labs Threats Report March 2016","year":"0"},{"key":"ref20","first-page":"175","article-title":"A Bayesian approach to privacy enforcement in smartphones","author":"tripp","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref22","first-page":"21","article-title":"A study of android application\n security","author":"enck","year":"2011","journal-title":"20th USENIX Security Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref42","author":"ross quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351722"},{"key":"ref41","first-page":"278","article-title":"Random decision forests","author":"ho","year":"1995","journal-title":"Proc 3rd Int Conf Document Anal Recognition"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref44","article-title":"Mudflow","author":"avdiienko","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref43","author":"breiman","year":"1984","journal-title":"Classification and Regression Trees"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8305671\/08231192.pdf?arnumber=8231192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:21:58Z","timestamp":1642004518000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8231192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":45,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2017.2778147","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}