{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T16:42:11Z","timestamp":1771260131972,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375746","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"353-364","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["DANdroid"],"prefix":"10.1145","author":[{"given":"Stuart","family":"Millar","sequence":"first","affiliation":[{"name":"Queen's University of Belfast, Belfast, United Kingdom"}]},{"given":"Niall","family":"McLaughlin","sequence":"additional","affiliation":[{"name":"Queen's University of Belfast, Belfast, United Kingdom"}]},{"given":"Jesus","family":"Martinez del Rincon","sequence":"additional","affiliation":[{"name":"Queen's University of Belfast, Belfast, United Kingdom"}]},{"given":"Paul","family":"Miller","sequence":"additional","affiliation":[{"name":"Queen's University of Belfast, Belfast, United Kingdom"}]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Henrietta, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Yousra Aafer Wenliang Du and Heng Yin. 2014. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android.","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041010"},{"key":"e_1_3_2_1_3_1","volume-title":"Apktool - a tool for reverse engineering 3rd party, closed, binary Android aps . https:\/\/ibotpeaches.github.io\/Apktool\/. (2019)","unstructured":"Apktool. 2019. Apktool - a tool for reverse engineering 3rd party, closed, binary Android aps . https:\/\/ibotpeaches.github.io\/Apktool\/. (2019)."},{"key":"e_1_3_2_1_4_1","volume-title":"Journal in Computer Virology","author":"Apvrille Axelle","unstructured":"Axelle Apvrille and Tim Strazzerer. 2012. Reducing the Window of Opportunity for Android Malware Gotta catch 'em all. In Journal in Computer Virology Vol. 8. 61--71."},{"key":"e_1_3_2_1_5_1","volume-title":"DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS . The Internet Society. http:\/\/dblp.uni-trier.de\/db\/conf\/ndss\/ndss2014.html#ArpSHGR14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897860"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939931"},{"key":"e_1_3_2_1_9_1","unstructured":"A. Demontis M. Melis B. Biggio D. Maiorca D. Arp K. Rieck I. Corona G. Giacinto and F. Roli. 2018. Yes Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. IEEE Transactions on Dependable and Secure Computing (2018) 1--1."},{"key":"e_1_3_2_1_10_1","unstructured":"DexGuard. 2019. DexGuard . https:\/\/www.guardsquare.com\/en\/products\/dexguard . (2019)."},{"key":"e_1_3_2_1_11_1","unstructured":"DexProtector. 2019. DexProtector . https:\/\/dexprotector.com . (2019)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806891"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Domain-adversarial Training of Neural Networks","volume":"17","author":"Ganin Yaroslav","year":"2016","unstructured":"Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, Franccois Laviolette, Mario Marchand, and Victor Lempitsky. 2016. Domain-adversarial Training of Neural Networks. J. Mach. Learn. Res. , Vol. 17, 1 (Jan. 2016), 2096--2030. http:\/\/dl.acm.org\/citation.cfm?id=2946645.2946704","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3162625"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"key":"e_1_3_2_1_16_1","volume-title":"Generative Adversarial Nets. Advances in Neural Information Processing Systems 27","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680. http:\/\/papers.nips.cc\/paper\/5423-generative-adversarial-nets.pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"NIPS 2016 Tutorial: Generative Adversarial Networks. CoRR","volume":"1701","author":"Goodfellow Ian J.","year":"2016","unstructured":"Ian J. Goodfellow. 2016. NIPS 2016 Tutorial: Generative Adversarial Networks. CoRR , Vol. abs\/1701.00160 (2016)."},{"key":"e_1_3_2_1_18_1","volume-title":"Deep Learning: Data Encoding 1 ed.)","author":"Ian Goodfellow Yoshua Bengio","year":"2017","unstructured":"Yoshua Bengio Ian Goodfellow and Aaron Courville. 2017. Deep Learning: Data Encoding 1 ed.). MIT Press, Cambridge, MA."},{"key":"e_1_3_2_1_19_1","unstructured":"Jesus Freke. 2019. Baksmali . https:\/\/github.com\/JesusFreke\/smali . (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"e_1_3_2_1_22_1","volume-title":"2017 15th Annual Conference on Privacy, Security and Trust (PST) . 233--23309","author":"Lashkari A. H.","unstructured":"A. H. Lashkari, A. F. A.Kadir, H. Gonzalez, K. F. Mbah , and A. A. Ghorbani. 2017. Towards a Network-Based Framework for Android Malware Detection and Characterization. In 2017 15th Annual Conference on Privacy, Security and Trust (PST) . 233--23309."},{"key":"e_1_3_2_1_23_1","volume-title":"Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@ESORICS 2014","author":"Lindorfer Martina","year":"2014","unstructured":"Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, and Christian Platzer. 2014. ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors. In Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland, September 11, 2014. 3--17."},{"key":"e_1_3_2_1_24_1","volume-title":"Multi-Task Adversarial Network for Disentangled Feature Learning. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) .","author":"Liu Yang","year":"2018","unstructured":"Yang Liu, Zhaowen Wang, Hailin Jin, and Ian Wassell. 2018. Multi-Task Adversarial Network for Disentangled Feature Learning. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) ."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274731"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019793"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_1_29_1","volume-title":"Evaluating Convolutional Neural Network for Effective Mobile Malware Detection. Procedia Comput. Sci","author":"Martinelli Fabio","year":"2017","unstructured":"Fabio Martinelli, Fiammetta Marulli, and Francesco Mercaldo. 2017. Evaluating Convolutional Neural Network for Effective Mobile Malware Detection. Procedia Comput. Sci. , Vol. 112, C (Sept. 2017), 2372--2381."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966078"},{"key":"e_1_3_2_1_32_1","volume-title":"2018 16th Annual Conference on Privacy, Security and Trust (PST) . 1--10","author":"Onwuzurike L.","unstructured":"L. Onwuzurike, M. Almeida, E. Mariconti, J. Blackburn, G. Stringhini, and E. De Cristofaro. 2018. A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis. In 2018 16th Annual Conference on Privacy, Security and Trust (PST) . 1--10."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"e_1_3_2_1_34_1","unstructured":"Borja Sanz Igor Santos Carlos Laorden Xabier Ugarte-Pedrero Pablo Garc\u00eda Bringas and Gonzalo \u00c1lvarez Mara n\u00f3n. CISIS\/ICEUTE\/SOCO Special Sessions \u00c1lvaro Herrero V\u00e1clav Sn\u00e1sel Ajith Abraham Ivan Zelinka Bruno Baruque H\u00e9ctor Quinti\u00e1n-Pardo Jos\u00e9 Lu's Calvo-Rolle Javier Sedano and Emilio Corchado (Eds.)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"e_1_3_2_1_36_1","volume-title":"Practical Malware Analysis","author":"Sikorski Michael","unstructured":"Michael Sikorski and Andrew Hong. 2012. Data Encoding. In Practical Malware Analysis. No Starch Press Inc, US, 281--285, 294."},{"key":"e_1_3_2_1_37_1","volume-title":"2017 15th Annual Conference on Privacy, Security and Trust (PST). 243--24309","author":"Skovoroda A.","unstructured":"A. Skovoroda and D. Gamayunov. 2017. Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models. In 2017 15th Annual Conference on Privacy, Security and Trust (PST). 243--24309."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029825"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2646641"},{"key":"e_1_3_2_1_40_1","unstructured":"Sundar Pichai. 2017. Google I\/0 2017 Keynote Speech . https:\/\/www.youtube.com\/watch?v=Y2VF8tmLFHw . (2017)."},{"key":"e_1_3_2_1_41_1","volume-title":"Achieving Fairness through Adversarial Learning: an Application to Recidivism Prediction. CoRR","author":"Wadsworth Christina","year":"2018","unstructured":"Christina Wadsworth, Francesca Vera, and Chris Piech. 2018. Achieving Fairness through Adversarial Learning: an Application to Recidivism Prediction. CoRR , Vol. abs\/1807.00199 (2018)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771228"},{"key":"e_1_3_2_1_43_1","unstructured":"Fengguo Wei Yuping Li Sankardas Roy Xinming Ou and Wu Zhou. 2017. Deep Ground Truth Analysis of Current Android Malware. In DIMVA ."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23118"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 27th USENIX Security Symposium .","author":"Wong Michelle","year":"2018","unstructured":"Michelle Wong and David Lie. 2018. hrefhttps:\/\/security.csl.toronto.edu\/wp-content\/uploads\/2018\/06\/mwong-usenixsec2018-tiro.pdfTackling runtime-based obfuscation in Android with TIRO. In Proceedings of the 27th USENIX Security Symposium ."},{"key":"e_1_3_2_1_46_1","volume-title":"DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. In 2018 IEEE European Symposium on Security and Privacy (EuroS P) . 473--487","author":"Xu K.","unstructured":"K. Xu, Y. Li , R. H. Deng, and K. Chen. 2018. DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. In 2018 IEEE European Symposium on Security and Privacy (EuroS P) . 473--487."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2014.23"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0099"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"J. Zhu Z. Wu Z. Guan and Z. Chen. 2015. API Sequences Based Malware Detection for Android. 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) . 673--676.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.135"}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA","acronym":"CODASPY '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375746","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375746"}},"subtitle":["A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":50,"alternative-id":["10.1145\/3374664.3375746","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375746","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}