{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:33:25Z","timestamp":1770752005604,"version":"3.50.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,28]],"date-time":"2016-10-28T00:00:00Z","timestamp":1477612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/L022710\/1"],"award-info":[{"award-number":["EP\/L022710\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,28]]},"DOI":"10.1145\/2996758.2996769","type":"proceedings-article","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T13:53:40Z","timestamp":1477576420000},"page":"71-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Prescience"],"prefix":"10.1145","author":[{"given":"Amit","family":"Deo","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Santanu Kumar","family":"Dash","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Volodya","family":"Vovk","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Lorenzo","family":"Cavallaro","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"key":"e_1_3_2_1_3_1","volume-title":"Jacques Klein, and Yves Le Traon. Machine learning-based malware detection for android applications: History matters! Technical report","author":"Allix Kevin","year":"2014","unstructured":"Kevin Allix , Tegawend\u00e9 Fran\u00e7ois D Assise Bissyande , Jacques Klein, and Yves Le Traon. Machine learning-based malware detection for android applications: History matters! Technical report , University of Luxembourg , SnT, 2014 . Kevin Allix, Tegawend\u00e9 Fran\u00e7ois D Assise Bissyande, Jacques Klein, and Yves Le Traon. Machine learning-based malware detection for android applications: History matters! Technical report, University of Luxembourg, SnT, 2014."},{"key":"e_1_3_2_1_4_1","first-page":"1666","volume-title":"Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC)","author":"Amos Brandon","year":"2013","unstructured":"Brandon Amos , Hamilton Turner , and Jules White . Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC) , pages 1666 -- 1671 . IEEE , 2013 . Brandon Amos, Hamilton Turner, and Jules White. Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC), pages 1666--1671. IEEE, 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939931"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.25"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.053"},{"key":"e_1_3_2_1_10_1","volume-title":"January","author":"Fern\u00e1ndez-Delgado Manuel","year":"2014","unstructured":"Manuel Fern\u00e1ndez-Delgado , Eva Cernadas , Sen\u00e9n Barro , and Dinani Amorim . Do we need hundreds of classifiers to solve real world classification problems? The Journal of Machine Learning Research (JMLR), 15(1):3133--3181 , January 2014 . Manuel Fern\u00e1ndez-Delgado, Eva Cernadas, Sen\u00e9n Barro, and Dinani Amorim. Do we need hundreds of classifiers to solve real world classification problems? The Journal of Machine Learning Research (JMLR), 15(1):3133--3181, January 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The elements of statistical learning: data mining, inference, and prediction","author":"Hastie Trevor","year":"2009","unstructured":"Trevor Hastie , Robert Tibshirani , and Jerome Friedman . The elements of statistical learning: data mining, inference, and prediction . Springer , New York , 2 edition, 2009 . Trevor Hastie, Robert Tibshirani, and Jerome Friedman. The elements of statistical learning: data mining, inference, and prediction. Springer, New York, 2 edition, 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.023"},{"key":"e_1_3_2_1_14_1","volume-title":"Royal Holloway","author":"Jordaney Roberto","year":"2016","unstructured":"Roberto Jordaney , Zhi Wang , Davide Papini , Ilia Nouretdinov , and Lorenzo Cavallaro . Misleading metrics: On evaluating machine learning for malware with confidence. Technical report , Royal Holloway , University of London , 2016 . Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. Misleading metrics: On evaluating machine learning for malware with confidence. Technical report, Royal Holloway, University of London, 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"Artificial Intelligence Applications and Innovations: AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW","author":"Lambrou Antonis","year":"2012","unstructured":"Antonis Lambrou , Harris Papadopoulos , Ilia Nouretdinov , and Alexander Gammerman . Reliable probability estimates based on support vector machines for large multiclass datasets . In Artificial Intelligence Applications and Innovations: AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW , and WADTMB, Halkidiki, Greece , September 27-30, 2012 , Proceedings, Part II, 2012. Antonis Lambrou, Harris Papadopoulos, Ilia Nouretdinov, and Alexander Gammerman. Reliable probability estimates based on support vector machines for large multiclass datasets. In Artificial Intelligence Applications and Innovations: AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Halkidiki, Greece, September 27-30, 2012, Proceedings, Part II, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"e_1_3_2_1_17_1","first-page":"703","volume-title":"International Conference on Machine Learning","volume":"2012","author":"Menon Aditya Krishna","unstructured":"Aditya Krishna Menon , Xiaoqian J Jiang , Shankar Vembu , Charles Elkan , and Lucila Ohno-Machado . Predicting accurate probabilities with a ranking loss. In Machine learning: proceedings of the International Conference . International Conference on Machine Learning , volume 2012 , page 703 . NIH Public Access, 2012. Aditya Krishna Menon, Xiaoqian J Jiang, Shankar Vembu, Charles Elkan, and Lucila Ohno-Machado. Predicting accurate probabilities with a ranking loss. In Machine learning: proceedings of the International Conference. International Conference on Machine Learning, volume 2012, page 703. NIH Public Access, 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"Adaptive and scalable android malware detection through online learning. arXiv preprint arXiv:1606.07150","author":"Narayanan Annamalai","year":"2016","unstructured":"Annamalai Narayanan , Liu Yang , Lihui Chen , and Liu Jinliang . Adaptive and scalable android malware detection through online learning. arXiv preprint arXiv:1606.07150 , 2016 . Annamalai Narayanan, Liu Yang, Lihui Chen, and Liu Jinliang. Adaptive and scalable android malware detection through online learning. arXiv preprint arXiv:1606.07150, 2016."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102430"},{"key":"e_1_3_2_1_20_1","volume-title":"Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers, 10(3):61--74","author":"John Platt","year":"1999","unstructured":"John Platt et al. Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers, 10(3):61--74 , 1999 . John Platt et al. Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers, 10(3):61--74, 1999."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011216.2011217"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818038"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.130"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"e_1_3_2_1_25_1","article-title":"Madam: Effective and efficient behavior-based android malware detection and prevention","author":"Saracino A.","year":"2016","unstructured":"A. Saracino , D. Sgandurra , G. Dini , and F. Martinelli . Madam: Effective and efficient behavior-based android malware detection and prevention . IEEE Transactions on Dependable and Secure Computing, PP(99):1 , 2016 . A. Saracino, D. Sgandurra, G. Dini, and F. Martinelli. Madam: Effective and efficient behavior-based android malware detection and prevention. IEEE Transactions on Dependable and Secure Computing, PP(99):1, 2016.","journal-title":"IEEE Transactions on Dependable and Secure Computing, PP(99):1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381910"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"e_1_3_2_1_28_1","volume-title":"Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, and Lorenzo Cavallaro. DroidSieve: Fast and accurate classification of obfuscated android malware.","author":"Suarez-Tangil Guillermo","year":"2016","unstructured":"Guillermo Suarez-Tangil , Santanu Kumar Dash , Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, and Lorenzo Cavallaro. DroidSieve: Fast and accurate classification of obfuscated android malware. May 2016 . Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, and Lorenzo Cavallaro. DroidSieve: Fast and accurate classification of obfuscated android malware. May 2016."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.710.716"},{"key":"e_1_3_2_1_31_1","volume-title":"The problem of concept drift: definitions and related work. Computer Science Department","author":"Tsymbal Alexey","year":"2004","unstructured":"Alexey Tsymbal . The problem of concept drift: definitions and related work. Computer Science Department , Trinity College Dublin , 106, 2004 . Alexey Tsymbal. The problem of concept drift: definitions and related work. Computer Science Department, Trinity College Dublin, 106, 2004."},{"key":"e_1_3_2_1_32_1","volume-title":"Algorithmic learning in a random world","author":"Vovk Vladimir","year":"2005","unstructured":"Vladimir Vovk , Alex Gammerman , and Glenn Shafer . Algorithmic learning in a random world . Springer , New York , 2005 . Vladimir Vovk, Alex Gammerman, and Glenn Shafer. Algorithmic learning in a random world. Springer, New York, 2005."},{"key":"e_1_3_2_1_33_1","first-page":"829","volume-title":"Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence","author":"Vovk Vladimir","year":"2014","unstructured":"Vladimir Vovk and Ivan Petej . Venn--Abers predictors. In Nevin L. Zhang and Jin Tian, editors , Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence , pages 829 -- 838 , Corvallis, OR , 2014 . AUAI Press. Vladimir Vovk and Ivan Petej. Venn--Abers predictors. In Nevin L. Zhang and Jin Tian, editors, Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence, pages 829--838, Corvallis, OR, 2014. AUAI Press."},{"key":"e_1_3_2_1_34_1","first-page":"892","volume-title":"Advances in Neural Information Processing Systems 28","author":"Vovk Vladimir","year":"2015","unstructured":"Vladimir Vovk , Ivan Petej , and Valentina Fedorova . Large-scale probabilistic predictors with and without guarantees of validity. In C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett, editors , Advances in Neural Information Processing Systems 28 , pages 892 -- 900 . Curran Associates , 2015 . Vladimir Vovk, Ivan Petej, and Valentina Fedorova. Large-scale probabilistic predictors with and without guarantees of validity. In C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett, editors, Advances in Neural Information Processing Systems 28, pages 892--900. Curran Associates, 2015."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775151"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_37_1","volume-title":"NDSS","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou , Zhi Wang , Wu Zhou , and Xuxian Jiang . Hey, you , get off of my market: Detecting malicious apps in official and alternative android markets . In NDSS , 2012 . Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996758.2996769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996758.2996769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:49Z","timestamp":1750273549000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996758.2996769"}},"subtitle":["Probabilistic Guidance on the Retraining Conundrum for Malware Detection"],"short-title":[],"issued":{"date-parts":[[2016,10,28]]},"references-count":37,"alternative-id":["10.1145\/2996758.2996769","10.1145\/2996758"],"URL":"https:\/\/doi.org\/10.1145\/2996758.2996769","relation":{},"subject":[],"published":{"date-parts":[[2016,10,28]]},"assertion":[{"value":"2016-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}