{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:23:42Z","timestamp":1771514622093,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. National Science Foundation","award":["CNS-1618629"],"award-info":[{"award-number":["CNS-1618629"]}]},{"name":"WVU Senate Grants for Research and Scholarship","award":["R-16-043"],"award-info":[{"award-number":["R-16-043"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134636","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"362-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["SecureDroid"],"prefix":"10.1145","author":[{"given":"Lingwei","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA"}]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"e_1_3_2_1_2_1","unstructured":"Android. 2017. Application Fundamentals. In https:\/\/developer.android.com\/guide\/components\/fundamentals.html.  Android. 2017. Application Fundamentals. In https:\/\/developer.android.com\/guide\/components\/fundamentals.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0007-7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2503326"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020495"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26190-4_28"},{"key":"e_1_3_2_1_10_1","volume-title":"SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks. In AI '17 Australasian Joint Conference on Artificial Intelligence. 76--89","author":"Chen Lingwei","year":"2017","unstructured":"Lingwei Chen and Yanfang Ye . 2017 . SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks. In AI '17 Australasian Joint Conference on Artificial Intelligence. 76--89 . Lingwei Chen and Yanfang Ye. 2017. SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks. In AI '17 Australasian Joint Conference on Artificial Intelligence. 76--89."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.61"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Ensemble methods in machine learning","volume":"1","author":"Dietterich Thomas G.","year":"2000","unstructured":"Thomas G. Dietterich . 2000 . Ensemble methods in machine learning . Multiple Classifier Systems 1 (2000), 1 -- 15 . Thomas G. Dietterich. 2000. Ensemble methods in machine learning. Multiple Classifier Systems 1 (2000), 1--15.","journal-title":"Multiple Classifier Systems"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143889"},{"key":"e_1_3_2_1_15_1","volume-title":"Explaining and Harnessing Adversarial Examples. In ICLR '15","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In ICLR '15 . Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR '15."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.09.011"},{"key":"e_1_3_2_1_17_1","volume-title":"IJCAI'16","author":"Haghtalab Nika","year":"2016","unstructured":"Nika Haghtalab , Fei Fang , Thanh H. Nguyen , Arunesh Sinha , Ariel D. Procaccia , and Milind Tambe . 2016 . Three Strategies to Success: Learning Adversary Models in Security Games . In IJCAI'16 . 308--314. Nika Haghtalab, Fei Fang, Thanh H. Nguyen, Arunesh Sinha, Ariel D. Procaccia, and Milind Tambe. 2016. Three Strategies to Success: Learning Adversary Models in Security Games. In IJCAI'16. 308--314."},{"key":"e_1_3_2_1_18_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han Jiawei","year":"2011","unstructured":"Jiawei Han , Micheline Kamber , and Jian Pei . 2011 . Data Mining: Concepts and Techniques 3 rd Edition. Morgan Kaufmann, Waltham, MA , USA. Jiawei Han, Micheline Kamber, and Jian Pei. 2011. Data Mining: Concepts and Techniques 3rd Edition. Morgan Kaufmann, Waltham, MA, USA.","edition":"3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.709601"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"e_1_3_2_1_21_1","volume-title":"DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In WAIM '16","author":"Hou Shifu","year":"2016","unstructured":"Shifu Hou , Aaron Saas , Yanfang Ye , and Lifei Chen . 2016 . DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In WAIM '16 . 54--66. Shifu Hou, Aaron Saas, Yanfang Ye, and Lifei Chen. 2016. DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In WAIM '16. 54--66."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_23_1","volume-title":"Feature Weighting for Improved Classifier Robustness. In CEAS '09 Sixth conference on email and anti-spam.","author":"Kolcz Aleksander","year":"2009","unstructured":"Aleksander Kolcz and Choon Hui Teo . 2009 . Feature Weighting for Improved Classifier Robustness. In CEAS '09 Sixth conference on email and anti-spam. Aleksander Kolcz and Choon Hui Teo. 2009. Feature Weighting for Improved Classifier Robustness. In CEAS '09 Sixth conference on email and anti-spam."},{"key":"e_1_3_2_1_24_1","volume-title":"NIPS'14","author":"Li Bo","year":"2014","unstructured":"Bo Li and Yevgeniy Vorobeychik . 2014 . Feature cross-substitution in adversarial classification . In NIPS'14 . 2087--2095. Bo Li and Yevgeniy Vorobeychik. 2014. Feature cross-substitution in adversarial classification. In NIPS'14. 2087--2095."},{"key":"e_1_3_2_1_25_1","volume-title":"NIPS 2016 Workshop on Adversarial Training.","author":"Li Bo","year":"2016","unstructured":"Bo Li , Yevgeniy Vorobeychik , and Xinyun Chen . 2016 . A General Retraining Framework for Scalable Adversarial Classification . In NIPS 2016 Workshop on Adversarial Training. Bo Li, Yevgeniy Vorobeychik, and Xinyun Chen. 2016. A General Retraining Framework for Scalable Adversarial Classification. In NIPS 2016 Workshop on Adversarial Training."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"e_1_3_2_1_29_1","unstructured":"Don Reisinger. 2013. Android iOS combine for 91 percent of market. In https:\/\/www.cnet.com\/news\/android-ios-combine-for-91-percent-of-market\/.  Don Reisinger. 2013. Android iOS combine for 91 percent of market. In https:\/\/www.cnet.com\/news\/android-ios-combine-for-91-percent-of-market\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41822-8_1"},{"key":"e_1_3_2_1_31_1","volume-title":"Worldwide Smartphone Forecast","author":"Scarsella Anthony","year":"2017","unstructured":"Anthony Scarsella and William Stofega . 2017. Worldwide Smartphone Forecast , 2017 --2021. In http:\/\/www.idc.com\/getdoc.jsp?containerId=US42366217. Anthony Scarsella and William Stofega. 2017. Worldwide Smartphone Forecast, 2017--2021. In http:\/\/www.idc.com\/getdoc.jsp?containerId=US42366217."},{"key":"e_1_3_2_1_32_1","unstructured":"Michael Spreitzenbarth. 2016. Current Android Malware. In https:\/\/forensics.spreitzenbarth.de\/android-malware\/.  Michael Spreitzenbarth. 2016. Current Android Malware. In https:\/\/forensics.spreitzenbarth.de\/android-malware\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.20"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.117"},{"key":"e_1_3_2_1_35_1","volume-title":"Threat Report","author":"Wood Paul","year":"2015","unstructured":"Paul Wood . 2015. Internet Security Threat Report 2015 . In Symantec , California . Paul Wood. 2015. Internet Security Threat Report 2015. In Symantec, California."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"e_1_3_2_1_38_1","volume-title":"Importance Reweighting Using Adversarial-Collaborative Training. In NIPS 2016 Workshop.","author":"Wu Yifan","year":"2016","unstructured":"Yifan Wu , Tianshu Ren , and Lidan Mu . 2016 . Importance Reweighting Using Adversarial-Collaborative Training. In NIPS 2016 Workshop. Yifan Wu, Tianshu Ren, and Lidan Mu. 2016. Importance Reweighting Using Adversarial-Collaborative Training. In NIPS 2016 Workshop."},{"key":"e_1_3_2_1_39_1","first-page":"418","article-title":"MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining. Tsinghua Sci","volume":"18","author":"Xu Jianlin","year":"2013","unstructured":"Jianlin Xu , Yifan Yu , Zhen Chen , Bin Cao , Wenyu Dong , Yu Guo , and Junwei Cao . 2013 . MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining. Tsinghua Sci . Technol. 18 , 4 (2013), 418 -- 427 . Jianlin Xu, Yifan Yu, Zhen Chen, Bin Cao, Wenyu Dong, Yu Guo, and Junwei Cao. 2013. MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining. Tsinghua Sci. Technol. 18, 4 (2013), 418--427.","journal-title":"Technol."},{"key":"e_1_3_2_1_40_1","volume-title":"DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. ESORICS European Symposium on Research in Computer Security 8712","author":"Yang Chao","year":"2014","unstructured":"Chao Yang , Zhaoyan Xu , Guofei Gu , Vinod Yegneswaran , and Phillip Porras . 2014 . DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. ESORICS European Symposium on Research in Computer Security 8712 (2014), 163--182. Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, and Phillip Porras. 2014. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. ESORICS European Symposium on Research in Computer Security 8712 (2014), 163--182."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0108-y"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557167"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020448"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631434"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2415032"},{"key":"e_1_3_2_1_47_1","volume-title":"AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android. In ICICA '11 International Conference on Information Computing and Applications. 158--166","author":"Zhao Min","year":"2011","unstructured":"Min Zhao , Fangbin Ge , Tao Zhang , and Zhijian Yuan . 2011 . AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android. In ICICA '11 International Conference on Information Computing and Applications. 158--166 . Min Zhao, Fangbin Ge, Tao Zhang, and Zhijian Yuan. 2011. AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android. In ICICA '11 International Conference on Information Computing and Applications. 158--166."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134636"}},"subtitle":["Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":47,"alternative-id":["10.1145\/3134600.3134636","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134636","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}