{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:01:43Z","timestamp":1766268103633,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369091","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Deep learning for detecting Android malwares"],"prefix":"10.1145","author":[{"given":"Soussi","family":"Ilham","sequence":"first","affiliation":[{"name":"University of Abdelmalek, Essaadi (UAE), Tangier, Morocco"}]},{"given":"Ghadi","family":"Abderrahim","sequence":"additional","affiliation":[{"name":"University of Abdelmalek, Essaadi (UAE), Tangier, Morocco"}]},{"given":"Boudhir Anouar","family":"Abdelhakim","sequence":"additional","affiliation":[{"name":"University of Abdelmalek, Essaadi (UAE), Tangier, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0355-x"},{"key":"e_1_3_2_1_3_1","first-page":"15","volume-title":"\u00ab A Review on The Use of Deep Learning in Android Malware Detection \u00bb","author":"Li A. Naway","unstructured":"A. Naway et Y. Li , \u00ab A Review on The Use of Deep Learning in Android Malware Detection \u00bb , p. 15 . A. Naway et Y. Li, \u00ab A Review on The Use of Deep Learning in Android Malware Detection \u00bb, p. 15."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/e19060242"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.34257\/GJCSTDVOL19IS2PG13"},{"key":"e_1_3_2_1_6_1","first-page":"8","volume-title":"et E. \u00dclker, \u00ab Gender Classification with A Novel Convolutional Neural Network (CNN) Model and Comparison with other Machine Learning and Deep Learning CNN Models \u00bb","author":"Uyar K.","year":"2018","unstructured":"\u00d6. \u0130nik, K. Uyar , et E. \u00dclker, \u00ab Gender Classification with A Novel Convolutional Neural Network (CNN) Model and Comparison with other Machine Learning and Deep Learning CNN Models \u00bb , p. 8 , 2018 . \u00d6. \u0130nik, K. Uyar, et E. \u00dclker, \u00ab Gender Classification with A Novel Convolutional Neural Network (CNN) Model and Comparison with other Machine Learning and Deep Learning CNN Models \u00bb, p. 8, 2018."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2769220"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_1_9_1","volume-title":"ArXiv181105097 Cs Eess, nov.","author":"Wang S.","year":"2018","unstructured":"S. Wang , P. Zhou , W. Chen , J. Jia , et L. Xie, \u00ab Exploring RNN-Transducer for Chinese Speech Recognition \u00bb , ArXiv181105097 Cs Eess, nov. 2018 . S. Wang, P. Zhou, W. Chen, J. Jia, et L. Xie, \u00ab Exploring RNN-Transducer for Chinese Speech Recognition \u00bb, ArXiv181105097 Cs Eess, nov. 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_11_1","first-page":"31","volume-title":"et A. Raza, \u00ab Deep Belief Networks Based Feature Generation and Regression for Predicting Wind Power \u00bb","author":"Khan A.","unstructured":"A. Khan , A. Zameer , T. Jamal , et A. Raza, \u00ab Deep Belief Networks Based Feature Generation and Regression for Predicting Wind Power \u00bb , p. 31 . A. Khan, A. Zameer, T. Jamal, et A. Raza, \u00ab Deep Belief Networks Based Feature Generation and Regression for Predicting Wind Power \u00bb, p. 31."},{"key":"e_1_3_2_1_12_1","first-page":"9","volume-title":"\u00ab Using Deep Neural Network for Android Malware Detection \u00bb","author":"Li A. Naway","unstructured":"A. Naway et Y. Li , \u00ab Using Deep Neural Network for Android Malware Detection \u00bb , p. 9 . A. Naway et Y. Li, \u00ab Using Deep Neural Network for Android Malware Detection \u00bb, p. 9."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0070"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264476"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286606.3286860"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11196-0_56"}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","acronym":"SCA2019","location":"Casablanca Morocco"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:28Z","timestamp":1750202608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":16,"alternative-id":["10.1145\/3368756.3369091","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369091","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}