{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:16:13Z","timestamp":1776482173575,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3264437.3264476","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Applying deep learning techniques for Android malware detection"],"prefix":"10.1145","author":[{"given":"Peter","family":"Zegzhda","sequence":"first","affiliation":[{"name":"Peter the Great St. Petersburg Polytechnic University, St. Petersburg, Russia"}]},{"given":"Dmitry","family":"Zegzhda","sequence":"additional","affiliation":[{"name":"Peter the Great St. Petersburg Polytechnic University, St. Petersburg, Russia"}]},{"given":"Evgeny","family":"Pavlenko","sequence":"additional","affiliation":[{"name":"Peter the Great St. Petersburg Polytechnic University, St. Petersburg, Russia"}]},{"given":"Gleb","family":"Ignatev","sequence":"additional","affiliation":[{"name":"Peter the Great St. Petersburg Polytechnic University, St. Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mobile Operating System Market Share Worldwide http:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide.  Mobile Operating System Market Share Worldwide http:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide."},{"key":"e_1_3_2_1_2_1","unstructured":"Android vs iOS vs Windows: Which suffers most infections? Nokia reveals all https:\/\/www.zdnet.com\/article\/android-vs-ios-vs-windows-which-suffers-most-infections-nokia-reveals-all\/.  Android vs iOS vs Windows: Which suffers most infections? Nokia reveals all https:\/\/www.zdnet.com\/article\/android-vs-ios-vs-windows-which-suffers-most-infections-nokia-reveals-all\/."},{"key":"e_1_3_2_1_3_1","unstructured":"McAfee Mobile Threat Report https:\/\/www.mcafee.com\/cn\/resources\/reports\/rp-mobile-threat-report-2018.pdf.  McAfee Mobile Threat Report https:\/\/www.mcafee.com\/cn\/resources\/reports\/rp-mobile-threat-report-2018.pdf."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136825.3140583"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411617080156"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792435"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"T. Huang H. Kao R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections arXiv.org e-Print archive https:\/\/arxiv.org\/pdf\/1705.04448.pdf 2017.  T. Huang H. Kao R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections arXiv.org e-Print archive https:\/\/arxiv.org\/pdf\/1705.04448.pdf 2017.","DOI":"10.1109\/BigData.2018.8622324"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"e_1_3_2_1_10_1","unstructured":"E. Karbab M. Debbabi A. Derhab D. Mouheb Android Malware Detection using Deep Learning on API Method Sequences arXiv.org e-Print archive 2017 https:\/\/arxiv.org\/pdf\/1712.08996.pdf  E. Karbab M. Debbabi A. Derhab D. Mouheb Android Malware Detection using Deep Learning on API Method Sequences arXiv.org e-Print archive 2017 https:\/\/arxiv.org\/pdf\/1712.08996.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"R. A. Nix. Applying Deep Learning Techniques to the Analysis of Android APKs digitalcommons.lsu.edu: Louisiana State University Digital Commons 2016 https:\/\/digitalcommons.lsu.edu\/cgi\/viewcontent.cgi?article=5443&context=gradschool_theses.  R. A. Nix. Applying Deep Learning Techniques to the Analysis of Android APKs digitalcommons.lsu.edu: Louisiana State University Digital Commons 2016 https:\/\/digitalcommons.lsu.edu\/cgi\/viewcontent.cgi?article=5443&context=gradschool_theses."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_1_13_1","first-page":"101","volume-title":"Conference materials","author":"Ignatev G. Y.","year":"2017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_15_1","unstructured":"M. Backes S. Bugiel E. Derr P. McDaniel D. Octeau S. Weisgerber. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis 2016 https:\/\/pdfs.semanticscholar.org\/361d\/0121f49d526602ddd9bf369a4bc402e5e0fb.pdf.   M. Backes S. Bugiel E. Derr P. McDaniel D. Octeau S. Weisgerber. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis 2016 https:\/\/pdfs.semanticscholar.org\/361d\/0121f49d526602ddd9bf369a4bc402e5e0fb.pdf."},{"key":"e_1_3_2_1_16_1","unstructured":"MurmurHash3 https:\/\/github.com\/aappleby\/smhasher\/wiki\/MurmurHash3.  MurmurHash3 https:\/\/github.com\/aappleby\/smhasher\/wiki\/MurmurHash3."},{"key":"e_1_3_2_1_17_1","unstructured":"Android Drawer: Android Apps .apk Repository https:\/\/www.androiddrawer.com\/.  Android Drawer: Android Apps .apk Repository https:\/\/www.androiddrawer.com\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Playdrone-apk-e8 https:\/\/archive.org\/details\/playdrone-apk-e8.  Playdrone-apk-e8 https:\/\/archive.org\/details\/playdrone-apk-e8."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"E. Mariconti L. Onwuzurike P. Andriotis E. De Cristofaro G. Ross G. Stringhini MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models arXiv.org e-Print archive 2017 https:\/\/arxiv.org\/pdf\/1612.04433.pdf.  E. Mariconti L. Onwuzurike P. Andriotis E. De Cristofaro G. Ross G. Stringhini MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models arXiv.org e-Print archive 2017 https:\/\/arxiv.org\/pdf\/1612.04433.pdf.","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_1_20_1","unstructured":"E. Karbab M. Debbabi A. Derhab D. Mouheb Android Malware Detection using Deep Learning on API Method Sequences arXiv.org e-Print archive 2017 https:\/\/arxiv.org\/pdf\/1712.08996.pdf.  E. Karbab M. Debbabi A. Derhab D. Mouheb Android Malware Detection using Deep Learning on API Method Sequences arXiv.org e-Print archive 2017 https:\/\/arxiv.org\/pdf\/1712.08996.pdf."},{"key":"e_1_3_2_1_21_1","unstructured":"Android Malware Dataset http:\/\/amd.arguslab.org\/.  Android Malware Dataset http:\/\/amd.arguslab.org\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Androguard https:\/\/github.com\/androguard\/androguard.  Androguard https:\/\/github.com\/androguard\/androguard."},{"key":"e_1_3_2_1_23_1","unstructured":"A. Krizhevsky. CIFAR-10 and CIFAR-100 datasets https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html.  A. Krizhevsky. CIFAR-10 and CIFAR-100 datasets https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html."},{"key":"e_1_3_2_1_24_1","unstructured":"Keras: The Python Deep Learning library https:\/\/keras.io\/.  Keras: The Python Deep Learning library https:\/\/keras.io\/."},{"key":"e_1_3_2_1_25_1","unstructured":"Paperspace https:\/\/www.paperspace.com\/.  Paperspace https:\/\/www.paperspace.com\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Imbalanced-learn https:\/\/github.com\/scikit-learn-contrib\/imbalanced-learn\/.  Imbalanced-learn https:\/\/github.com\/scikit-learn-contrib\/imbalanced-learn\/."}],"event":{"name":"SIN '18: 11th International Conference On Security Of Information and Networks","location":"Cardiff United Kingdom","acronym":"SIN '18","sponsor":["Cardiff University Cardiff University"]},"container-title":["Proceedings of the 11th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264476","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":26,"alternative-id":["10.1145\/3264437.3264476","10.1145\/3264437"],"URL":"https:\/\/doi.org\/10.1145\/3264437.3264476","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}