{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:02:34Z","timestamp":1740153754197,"version":"3.37.3"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272204","62372105"],"award-info":[{"award-number":["62272204","62372105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Leading-edge Technology Program of Jiangsu Natural Science Foundation","award":["BK20202001"],"award-info":[{"award-number":["BK20202001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tsc.2024.3496333","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T18:41:46Z","timestamp":1731350506000},"page":"3052-3064","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Knowledge Search Structure for Android Malware Detection"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2751-2607","authenticated-orcid":false,"given":"Huijuan","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Mengzhen","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0048-5979","authenticated-orcid":false,"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Zhicheng","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Jiangsu University, Zhenjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4960-174X","authenticated-orcid":false,"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas Tech University, Lubbock, TX, USA"}]}],"member":"263","reference":[{"year":"2024","article-title":"Android market share and other statistics for 2024","key":"ref1"},{"article-title":"IT threat evolution in Q2 2024. Mobile statistics","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIFS.2020.3025436"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3597926.3598123"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIFS.2018.2866319"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/AsiaJCIS.2012.18"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3029806.3029825"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3605775"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1609\/aaai.v34i01.5474"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIFS.2018.2879302"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ASE51524.2021.9678875"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/tdsc.2019.2909902"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.future.2020.02.002"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.infsof.2020.106291"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TSE.2020.2975176"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3371924"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/EuroSP.2019.00014"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s11263-021-01453-z"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3544968"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICMLC.2014.7009096"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1609\/aaai.v34i01.5449"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ASE.2019.00023"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ASE51524.2021.9678843"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/SP40001.2021.00070"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TDSC.2018.2814999"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIFS.2019.2928205"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ICSE43902.2021.00126"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TIFS.2019.2950134"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/WorldS450073.2020.9210414"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/3345768.3355915"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3460319.3464833"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TNSM.2021.3075315"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3442588"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TIFS.2018.2866347"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TDSC.2017.2740169"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.14722\/ndss.2020.24167"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TIFS.2020.3044867"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TIFS.2020.2976556"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.inffus.2018.12.006"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/s10207-014-0250-0"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/3423096"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1145\/3446905"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/978-3-319-66332-6_9"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/3551349.3560418"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3029806.3029823"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1145\/3359789.3359835"},{"key":"ref47","first-page":"1259","article-title":"An image-inspired and CNN-based android malware detection approach","volume-title":"Proc. 34th IEEE\/ACM Int. Conf. Automated Softw.","author":"Yang"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ASEW52652.2021.00019"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1016\/j.cose.2022.102622"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/3447548.3467168"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1016\/j.adhoc.2020.102098"},{"year":"2024","author":"Chaieb","article-title":"Detecting android malware: From neural embeddings to hands-on validation with BERTroid","key":"ref52"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1016\/j.fsidi.2022.301444"},{"author":"Desnos","article-title":"Androguard-reverse engineering, malware and goodware analysis of Android applications","key":"ref54"},{"author":"Labs","article-title":"Drozer","key":"ref55"},{"article-title":"CVE-2018-20523","key":"ref56"},{"author":"Allix","doi-asserted-by":"crossref","article-title":"AndroZoo","key":"ref60","DOI":"10.1145\/2901739.2903508"},{"key":"ref61","first-page":"468","article-title":"AndroZoo: Collecting millions of android apps for the research community","volume-title":"Proc. 13th Int. Conf. Mining Softw. Repositories","author":"Allix"},{"author":"Wu","article-title":"XMAL","key":"ref62"},{"key":"ref63","first-page":"350","article-title":"Poster: Towards sustainable android malware detection","volume-title":"ACM\/IEEE 40th Int. Conf. Softw. Eng.","author":"Cai"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1145\/3387905.3388612"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1109\/TDSC.2020.2982635"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/10818968\/10750332.pdf?arnumber=10750332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T19:54:52Z","timestamp":1736884492000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10750332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":62,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2024.3496333","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}