{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:19:46Z","timestamp":1775067586169,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,13]],"date-time":"2017-08-13T00:00:00Z","timestamp":1502582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. National Science Foundation","award":["CNS-1618629"],"award-info":[{"award-number":["CNS-1618629"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,13]]},"DOI":"10.1145\/3097983.3098026","type":"proceedings-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T18:35:54Z","timestamp":1501871754000},"page":"1507-1515","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":196,"title":["HinDroid"],"prefix":"10.1145","author":[{"given":"Shifu","family":"Hou","sequence":"first","affiliation":[{"name":"West Virginia University, Morgantown, WV, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"West Virginia University, Morgantown, WV, USA"}]},{"given":"Yangqiu","family":"Song","sequence":"additional","affiliation":[{"name":"HKUST, Hong Kong, China"}]},{"given":"Melih","family":"Abdulhayoglu","sequence":"additional","affiliation":[{"name":"Comodo Security Solutions, Inc., Clifton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Marko Dimjasevic Simone Atzeni Ivo Ugrina and Zvonimir Rakamaric 2016. Evaluation of Android Malware Detection Based on System Calls IWSPA.  Marko Dimjasevic Simone Atzeni Ivo Ugrina and Zvonimir Rakamaric 2016. Evaluation of Android Malware Detection Based on System Calls IWSPA.","DOI":"10.1145\/2875475.2875487"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021071"},{"key":"e_1_3_2_2_6_1","volume-title":"Yu","author":"Han Jiawei","year":"2010","unstructured":"Jiawei Han , Yizhou Sun , Xifeng Yan , and Philip S . Yu . 2010 . Mining Knowledge from Databases : An Information Network Analysis Approach SIGMOD. Jiawei Han, Yizhou Sun, Xifeng Yan, and Philip S. Yu. 2010. Mining Knowledge from Databases: An Information Network Analysis Approach SIGMOD."},{"key":"e_1_3_2_2_7_1","unstructured":"Xiaofei He Deng Cai and Partha Niyogi 2005. Laplacian Score for Feature Selection. In Advances in Neural Information Processing Systems 18.  Xiaofei He Deng Cai and Partha Niyogi 2005. Laplacian Score for Feature Selection. In Advances in Neural Information Processing Systems 18."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Shifu Hou Aaron Saas Yanfang Ye and Lifei Chen. 2016. DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In WAIM. 54--66.  Shifu Hou Aaron Saas Yanfang Ye and Lifei Chen. 2016. DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In WAIM. 54--66.","DOI":"10.1007\/978-3-319-47121-1_5"},{"key":"e_1_3_2_2_9_1","volume-title":"Yu","author":"Kong Xiangnan","year":"2013","unstructured":"Xiangnan Kong , Jiawei Zhang , and Philip S . Yu . 2013 . Inferring anchor links across multiple heterogeneous social networks CIKM. 179--188. Xiangnan Kong, Jiawei Zhang, and Philip S. Yu. 2013. Inferring anchor links across multiple heterogeneous social networks CIKM. 179--188."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"N. Peiravian and X. Zhu 2013. Machine Learning for Android Malware Detection Using Permission and API Calls IEEE ICTAI. 300--305.  N. Peiravian and X. Zhu 2013. Machine Learning for Android Malware Detection Using Permission and API Calls IEEE ICTAI. 300--305.","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6574680"},{"key":"e_1_3_2_2_12_1","volume-title":"Droid Miner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. In 19th European Symposium on Research in Computer Security. 163--182","author":"Yang Chao","year":"2014","unstructured":"Chao Yang , Zhaoyan Xu , Guofei Gu , Vinod Yegneswaran , and Phillip Porras 2014 . Droid Miner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. In 19th European Symposium on Research in Computer Security. 163--182 . Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, and Phillip Porras 2014. Droid Miner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. In 19th European Symposium on Research in Computer Security. 163--182."},{"key":"e_1_3_2_2_13_1","volume-title":"Yu","author":"Zhang Jiawei","year":"2013","unstructured":"Jiawei Zhang , Xiangnan Kong , and Philip S . Yu . 2013 . Predicting Social Links for New Users across Aligned Heterogeneous Social Networks ICDM. 1289--1294. Jiawei Zhang, Xiangnan Kong, and Philip S. Yu. 2013. Predicting Social Links for New Users across Aligned Heterogeneous Social Networks ICDM. 1289--1294."},{"key":"e_1_3_2_2_14_1","volume-title":"Yu","author":"Zhang Jiawei","year":"2014","unstructured":"Jiawei Zhang , Xiangnan Kong , and Philip S . Yu . 2014 . Transferring heterogeneous links across location-based social networks WSDM. 303--312. Jiawei Zhang, Xiangnan Kong, and Philip S. Yu. 2014. Transferring heterogeneous links across location-based social networks WSDM. 303--312."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Peixiang Zhao Jiawei Han and Yizhou Sun 2009. P-Rank: a comprehensive structural similarity measure over information networks CIKM. 553--562.  Peixiang Zhao Jiawei Han and Yizhou Sun 2009. P-Rank: a comprehensive structural similarity measure over information networks CIKM. 553--562.","DOI":"10.1145\/1645953.1646025"}],"event":{"name":"KDD '17: The 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Halifax NS Canada","acronym":"KDD '17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3097983.3098026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3097983.3098026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:43Z","timestamp":1750273423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3097983.3098026"}},"subtitle":["An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network"],"short-title":[],"issued":{"date-parts":[[2017,8,13]]},"references-count":14,"alternative-id":["10.1145\/3097983.3098026","10.1145\/3097983"],"URL":"https:\/\/doi.org\/10.1145\/3097983.3098026","relation":{},"subject":[],"published":{"date-parts":[[2017,8,13]]},"assertion":[{"value":"2017-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}