{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T07:55:33Z","timestamp":1768809333554,"version":"3.49.0"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2016YFB1000903"],"award-info":[{"award-number":["2016YFB1000903"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61532004"],"award-info":[{"award-number":["61532004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61532015"],"award-info":[{"award-number":["61532015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632015"],"award-info":[{"award-number":["61632015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602369"],"award-info":[{"award-number":["61602369"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1766215"],"award-info":[{"award-number":["U1766215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772408"],"award-info":[{"award-number":["61772408"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702414"],"award-info":[{"award-number":["61702414"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61833015"],"award-info":[{"award-number":["61833015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61721002"],"award-info":[{"award-number":["61721002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education Innovation Research Team","award":["IRT_17R86"],"award-info":[{"award-number":["IRT_17R86"]}]},{"DOI":"10.13039\/501100002851","name":"China Academy of Engineering Physics","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002851","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012455","name":"China Knowledge Centre for Engineering Sciences and Technology","doi-asserted-by":"publisher","award":["PolyU 152279\/16E"],"award-info":[{"award-number":["PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100012455","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012455","name":"China Knowledge Centre for Engineering Sciences and Technology","doi-asserted-by":"publisher","award":["152223\/17E"],"award-info":[{"award-number":["152223\/17E"]}],"id":[{"id":"10.13039\/501100012455","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012455","name":"China Knowledge Centre for Engineering Sciences and Technology","doi-asserted-by":"publisher","award":["CityU C1008-16G"],"award-info":[{"award-number":["CityU C1008-16G"]}],"id":[{"id":"10.13039\/501100012455","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/tr.2019.2926129","type":"journal-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T20:21:10Z","timestamp":1563913270000},"page":"124-138","source":"Crossref","is-referenced-by-count":15,"title":["CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-0987","authenticated-orcid":false,"given":"Ming","family":"Fan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8532-7472","authenticated-orcid":false,"given":"Chunyin","family":"Nong","sequence":"additional","affiliation":[]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7600-0934","authenticated-orcid":false,"given":"Ting","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"ref39","article-title":"Paloalto","year":"2017"},{"key":"ref38","article-title":"Cheetah Mobile","year":"2017"},{"key":"ref33","article-title":"Securelist","year":"0"},{"key":"ref32","article-title":"Fortinet","year":"2017"},{"key":"ref31","article-title":"Android developer","year":"2018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978304"},{"key":"ref37","article-title":"Lookout","year":"2017"},{"key":"ref36","article-title":"McAfee","year":"2017"},{"key":"ref35","article-title":"Trendlabs","year":"2017"},{"key":"ref34","article-title":"SecurityIntelligence","year":"2017"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23379"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"ref64","first-page":"306","article-title":"Semantic modelling of Android malware for effective malware comprehension, detection, and classification","author":"meng","year":"0","journal-title":"Proc 25th Int Symp Softw Testing Anal"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"ref66","first-page":"527","article-title":"WHYPER: Towards automating risk assessment of mobile applications","author":"pandita","year":"0","journal-title":"Proc 22nd USENIX Conf Secur"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref1","article-title":"Report of smartphone security in China","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-003-0183-z"},{"key":"ref22","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"0","journal-title":"Proc 26th Int Conf Neural Inf Process Syst"},{"key":"ref21","first-page":"1","article-title":"Using TF-IDF to determine word relevance in document queries","author":"ramos","year":"0","journal-title":"Proc 1st instructional Conf Machine Learning"},{"key":"ref24","first-page":"1222","article-title":"A closer look at skip-gram modelling","author":"guthrie","year":"0","journal-title":"Proc 5th Int Conf Lang Resources Eval"},{"key":"ref23","article-title":"Wikipedia","year":"2017"},{"key":"ref26","article-title":"Apktool: A tool for reverse engineering Android apk files","year":"0"},{"key":"ref25","first-page":"33","article-title":"I&#x2019;ve got 99 problems, but vibration ain&#x2019;t one: A survey of smartphone users&#x2019; concerns","author":"felt","year":"0","journal-title":"Proc 2nd ACM Workshop Secur Privacy Smartphones Mobile Devices"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/72.80266"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref59","first-page":"1129","article-title":"Detecting Android root exploits by learning from root providers","author":"gasparis","year":"0","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"ref56","article-title":"Bangcle Inc.","year":"2018"},{"key":"ref55","article-title":"Ijiami Inc.","year":"2018"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"ref53","article-title":"Dasho","year":"0"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1023\/B:AMAI.0000018580.96245.c6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"key":"ref40","article-title":"Checkpoint","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687880"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00085"},{"key":"ref14","article-title":"Security alert: New BeanBot SMS trojan discovered","year":"2011"},{"key":"ref15","article-title":"jsoup: Java html parser","year":"2018"},{"key":"ref16","first-page":"2371?2378","article-title":"Enhanced English universal dependencies: An improved representation for natural language understanding tasks","author":"schuster","year":"0","journal-title":"Proc 10th Int Conf Lang Resour Eval"},{"key":"ref17","article-title":"The Stanford parser: A statistical parser","year":"2018"},{"key":"ref18","article-title":"Dropping common terms: Stop words","year":"2018"},{"key":"ref19","article-title":"Wordnet: A lexical database for English","year":"2018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3162625"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.2307\/2347628"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3151137.3151138"},{"key":"ref46","article-title":"Mamadroid: Detecting Android malware by building markov chains of behavioral models","volume":"22","author":"mariconti","year":"2019","journal-title":"ACM Trans Privacy Secur"},{"key":"ref45","article-title":"Virustotal: A free service that analyzes all kinds of malware","year":"0"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993309"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref41","article-title":"Mobile security alerts","year":"2012"},{"key":"ref44","article-title":"Google Play","year":"2018"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806891"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9023405\/08770262.pdf?arnumber=8770262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:42:40Z","timestamp":1651066960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8770262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":70,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2019.2926129","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}