{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:00:14Z","timestamp":1772042414129,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375730","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"203-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Understanding Privacy Awareness in Android App Descriptions Using Deep Learning"],"prefix":"10.1145","author":[{"given":"Johannes","family":"Feichtner","sequence":"first","affiliation":[{"name":"Graz University of Technology &amp; Secure Information Technology Center - Austria, Graz, Austria"}]},{"given":"Stefan","family":"Gruber","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Trust, Security and Privacy in Computing and Communications -- TrustCom'18","author":"Arora Anshul","unstructured":"Anshul Arora and Sateesh Kumar Peddoju. 2018. NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions. In Trust, Security and Privacy in Computing and Communications -- TrustCom'18. IEEE , 808--813."},{"key":"e_1_3_2_1_2_1","volume-title":"R\u00e9 jean Ducharme, and Pascal Vincent","author":"Bengio Yoshua","year":"2000","unstructured":"Yoshua Bengio, R\u00e9 jean Ducharme, and Pascal Vincent. 2000. A Neural Probabilistic Language Model. In Neural Information Processing Systems -- NIPS'00. MIT Press, 932--938."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300027"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494522"},{"key":"e_1_3_2_1_5_1","volume-title":"AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. In 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019","volume":"1","author":"Gao Hongcan","year":"2019","unstructured":"Hongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong, Xiaolei Hou, Sihan Xu, and Jing Xu. 2019. AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. In 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15--19, 2019, Volume 1. IEEE, 107--116."},{"key":"e_1_3_2_1_6_1","volume-title":"Deep Learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning .MIT Press. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_8_1","volume-title":"Conference on Big Data -- BIGDATA'18 . IEEE, 2633--2642","author":"Hsien-De Huang TonTon","year":"2018","unstructured":"TonTon Hsien-De Huang and Hung-Yu Kao. 2018. R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections. In Conference on Big Data -- BIGDATA'18 . IEEE, 2633--2642."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification See citeNDBLP:conf\/emnlp\/2014 1746--1751.","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_10_1","volume-title":"AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications, See citeNDBLP:conf\/ccs\/2015, 530--541.","author":"Kong Deguang","year":"2015","unstructured":"Deguang Kong, Lei Cen, and Hongxia Jin. 2015. AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications, See citeNDBLP:conf\/ccs\/2015, 530--541."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"e_1_3_2_1_12_1","volume-title":"The Mythos of Model Interpretability . CoRR","author":"Lipton Zachary Chase","year":"2016","unstructured":"Zachary Chase Lipton. 2016. The Mythos of Model Interpretability . CoRR , Vol. abs\/1606.03490 (2016)."},{"key":"e_1_3_2_1_13_1","volume-title":"Lundberg and Su-In Lee","author":"Scott","year":"2017","unstructured":"Scott M. Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Neural Information Processing Systems -- NIPS'17. 4765--4774."},{"key":"e_1_3_2_1_14_1","volume-title":"Deep Android Malware Detection. In Conference on Data and Application Security and Privacy -- CODASPY'17","author":"McLaughlin Niall","year":"2017","unstructured":"Niall McLaughlin, Jes\u00fa s Mart'i nez del Rinc\u00f3 n, BooJoong Kang, Suleiman Y. Yerima, Paul C. Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doup\u00e9 , and Gail-Joon Ahn. 2017. Deep Android Malware Detection. In Conference on Data and Application Security and Privacy -- CODASPY'17. ACM , 301--308."},{"key":"e_1_3_2_1_15_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Gregory S. Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Neural Information Processing Systems -- NIPS'13. 3111--3119."},{"key":"e_1_3_2_1_16_1","volume-title":"WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security'13","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security'13 . USENIX Association, 527--542."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343260"},{"key":"e_1_3_2_1_18_1","volume-title":"Manning","author":"Pennington Jeffrey","year":"2014","unstructured":"Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. Glove: Global Vectors for Word Representation , See citeNDBLP:conf\/emnlp\/2014, 1532--1543."},{"key":"e_1_3_2_1_19_1","volume-title":"Krutz","author":"Peruma Anthony","year":"2018","unstructured":"Anthony Peruma, Jeffrey Palmerino, and Daniel E. Krutz. 2018. Investigating user perception and comprehension of Android permission models, See citeNDBLP:conf\/icse\/2018mobilesoft, 56--66."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Gian Luca Scoccia Stefano Ruberto Ivano Malavolta Marco Autili and Paola Inverardi. 2018. An investigation into Android run-time permissions from the end users' perspective See citeNDBLP:conf\/icse\/2018mobilesoft 45--55.","DOI":"10.1145\/3197231.3197236"},{"key":"e_1_3_2_1_23_1","volume-title":"Taylor and Ivan Martinovic","author":"Vincent","year":"2016","unstructured":"Vincent F. Taylor and Ivan Martinovic. 2016. SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis. In Security and Privacy in Smartphones & Mobile Devices -- SPSM@CCS. ACM, 43--52."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Nicolas Viennot Edward Garcia and Jason Nieh. 2014. A measurement study of google play. In Measurement and Modeling of Computer Systems -- SIGMETRICS'14. ACM 221--233.","DOI":"10.1145\/2637364.2592003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805833"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3086677"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2014.132"},{"key":"e_1_3_2_1_28_1","volume-title":"Symposium On Usable Privacy and Security -- SOUPS'15","author":"Watanabe Takuya","year":"2015","unstructured":"Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori. 2015. Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. In Symposium On Usable Privacy and Security -- SOUPS'15. USENIX Association, 241--255."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274726"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073813"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Mu Zhang Yue Duan Qian Feng and Heng Yin. 2015a. Towards Automatic Generation of Security-Centric Descriptions for Android Apps See citeNDBLP:conf\/ccs\/2015 518--529.","DOI":"10.1145\/2810103.2813669"},{"key":"e_1_3_2_1_32_1","volume-title":"Junbo Jake Zhao, and Yann LeCun","author":"Zhang Xiang","year":"2015","unstructured":"Xiang Zhang, Junbo Jake Zhao, and Yann LeCun. 2015b. Character-level Convolutional Networks for Text Classification. In Neural Information Processing Systems -- NIPS'15. 649--657."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA","acronym":"CODASPY '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":32,"alternative-id":["10.1145\/3374664.3375730","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375730","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}