{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:17:15Z","timestamp":1761621435081,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297181","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"145-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A New Android Malicious Application Detection Method Using Feature Importance Score"],"prefix":"10.1145","author":[{"given":"Jing-xu","family":"Xiao","sequence":"first","affiliation":[{"name":"Information Engineering University, Zhengzhou Information Science and Technology Institute, Zhengzhou Henan, China"}]},{"given":"Zi-cong","family":"Lu","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou Information Science and Technology Institute, Zhengzhou Henan, China"}]},{"given":"Qi-han","family":"Xu","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou Information Science and Technology Institute, Zhengzhou Henan, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mobile Operating System Market Share Worldwide{OL}. http:\/\/gs.statcounter.com\/os-market-share.  Mobile Operating System Market Share Worldwide{OL}. http:\/\/gs.statcounter.com\/os-market-share."},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"891","article-title":"Android malware detection based on multi-level signature matching{J}.","volume":"33","author":"Zhongyuan WANG","year":"2016","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_3_1","unstructured":"NING Zhou SHAO Dacheng et al.Android Static Analysis Based on Signature and Data Flow Pattern Mining{J}.Computer Science 2017 44(11A)  NING Zhou SHAO Dacheng et al.Android Static Analysis Based on Signature and Data Flow Pattern Mining{J}.Computer Science 2017 44(11A)"},{"key":"e_1_3_2_1_4_1","first-page":"106","article-title":"Android malware detection method based on permission sequential pattern mining algorithm{J}.","volume":"34","author":"Huan ZHANG","year":"2017","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_5_1","first-page":"07","article-title":"Leveraging Ontologies and Machine-learning Techniques for Malware Analysis into Android Permissions Ecosystems{J}","volume":"2018","author":"Navarro L C","journal-title":"Computers & Security"},{"volume-title":"ICC'09","year":"2009","author":"Schmidt A D","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Schmidt A D Clausen J H \u00c7amtepe S A etal Detecting Symbian OS malware through static function call analysis{C}\/\/MALWARE. 2009: 15--22.  Schmidt A D Clausen J H \u00c7amtepe S A et al. Detecting Symbian OS malware through static function call analysis{C}\/\/MALWARE. 2009: 15--22.","DOI":"10.1109\/MALWARE.2009.5403024"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.07.030"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.03.018"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.001"},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"15","article-title":"Malware Behavior Detection System of Android Applications Based on Multi-Class Features{J}.","volume":"37","author":"Huan ZHANG","year":"2014","journal-title":"Chinese Journal of Computers"}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Shenzhen China","acronym":"CSAI '18"},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297181","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:09Z","timestamp":1750210749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":13,"alternative-id":["10.1145\/3297156.3297181","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297181","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}