{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:38:13Z","timestamp":1762868293425,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation Singapore","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387905.3388596","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T01:53:17Z","timestamp":1602121997000},"page":"50-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Experimental comparison of features and classifiers for Android malware detection"],"prefix":"10.1145","author":[{"given":"Lwin Khin","family":"Shar","sequence":"first","affiliation":[{"name":"Singapore Management University"}]},{"given":"Biniam Fisseha","family":"Demissie","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler"}]},{"given":"Mariano","family":"Ceccato","sequence":"additional","affiliation":[{"name":"University of Verona"}]},{"given":"Wei","family":"Minn","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326293"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/developer.android.com\/studio\/test\/monkey","author":"Monkey Application Exerciser","year":"2019","unstructured":"Android. UI\/ Application Exerciser Monkey . https:\/\/developer.android.com\/studio\/test\/monkey , 2019 . Android. UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey, 2019."},{"key":"e_1_3_2_1_5_1","volume-title":"Drebin: Effective and explainable detection of android malware in your pocket","author":"Arp D.","year":"2014","unstructured":"D. Arp , M. Spreitzenbarth , H. Gascon , K. Rieck , and C. Siemens . Drebin: Effective and explainable detection of android malware in your pocket . 2014 . D. Arp, M. Spreitzenbarth, H. Gascon, K. Rieck, and C. Siemens. Drebin: Effective and explainable detection of android malware in your pocket. 2014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"issue":"8","key":"e_1_3_2_1_7_1","first-page":"1","article-title":"The random subspace method for constructing decision forests","volume":"20","author":"Barandiaran I.","year":"1998","unstructured":"I. Barandiaran . The random subspace method for constructing decision forests . IEEE Trans. Pattern Anal. Mach. Intell , 20 ( 8 ): 1 -- 22 , 1998 . I. Barandiaran. The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell, 20(8):1--22, 1998.","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2014.7009096"},{"key":"e_1_3_2_1_10_1","first-page":"659","volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15)","author":"Chen K.","year":"2015","unstructured":"K. Chen , P. Wang , Y. Lee , X. Wang , N. Zhang , H. Huang , W. Zou , and P. Liu . Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale . In 24th {USENIX} Security Symposium ({USENIX} Security 15) , pages 659 -- 674 , 2015 . K. Chen, P. Wang, Y. Lee, X. Wang, N. Zhang, H. Huang, W. Zou, and P. Liu. Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale. In 24th {USENIX} Security Symposium ({USENIX} Security 15), pages 659--674, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897860"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801389","volume-title":"An introduction to support vector machines and other kernel-based learning methods","author":"Cristianini N.","year":"2000","unstructured":"N. Cristianini , J. Shawe-Taylor , An introduction to support vector machines and other kernel-based learning methods . Cambridge university press , 2000 . N. Cristianini, J. Shawe-Taylor, et al. An introduction to support vector machines and other kernel-based learning methods. Cambridge university press, 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.1561\/9781601988157","volume-title":"Deep learning: methods and applications. Foundations and Trends\u00ae in Signal Processing, 7(3--4):197--387","author":"Deng L.","year":"2014","unstructured":"L. Deng , D. Yu , Deep learning: methods and applications. Foundations and Trends\u00ae in Signal Processing, 7(3--4):197--387 , 2014 . L. Deng, D. Yu, et al. Deep learning: methods and applications. Foundations and Trends\u00ae in Signal Processing, 7(3--4):197--387, 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2012.02.002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.14"},{"key":"e_1_3_2_1_19_1","volume-title":"Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Transactions on Software Engineering and Methodology (TOSEM), 26(3):11","author":"Garcia J.","year":"2018","unstructured":"J. Garcia , M. Hammad , and S. Malek . Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Transactions on Software Engineering and Methodology (TOSEM), 26(3):11 , 2018 . J. Garcia, M. Hammad, and S. Malek. Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Transactions on Software Engineering and Methodology (TOSEM), 26(3):11, 2018."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-642-35473-1_12","volume-title":"Advances in Intelligent Systems and Applications-Volume 2","author":"Huang C.-Y.","year":"2013","unstructured":"C.-Y. Huang , Y.-T. Tsai , and C.-H. Hsu . Performance evaluation on permission-based detection for android malware . In Advances in Intelligent Systems and Applications-Volume 2 , pages 111 -- 120 . Springer , 2013 . C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu. Performance evaluation on permission-based detection for android malware. In Advances in Intelligent Systems and Applications-Volume 2, pages 111--120. Springer, 2013."},{"key":"e_1_3_2_1_21_1","volume-title":"Dadidroid: An obfuscation resilient tool for detecting android malware via weighted directed call graph modelling. arXiv preprint arXiv:1905.09136","author":"Ikram M.","year":"2019","unstructured":"M. Ikram , P. Beaume , and M. A. Kaafar . Dadidroid: An obfuscation resilient tool for detecting android malware via weighted directed call graph modelling. arXiv preprint arXiv:1905.09136 , 2019 . M. Ikram, P. Beaume, and M. A. Kaafar. Dadidroid: An obfuscation resilient tool for detecting android malware via weighted directed call graph modelling. arXiv preprint arXiv:1905.09136, 2019."},{"key":"e_1_3_2_1_22_1","volume-title":"Android malware detection using deep learning on api method sequences. arXiv preprint arXiv:1712.08996","author":"Karbab E. B.","year":"2017","unstructured":"E. B. Karbab , M. Debbabi , A. Derhab , and D. Mouheb . Android malware detection using deep learning on api method sequences. arXiv preprint arXiv:1712.08996 , 2017 . E. B. Karbab, M. Debbabi, A. Derhab, and D. Mouheb. Android malware detection using deep learning on api method sequences. arXiv preprint arXiv:1712.08996, 2017."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0167-4048(02)00514-x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"M. Lindorfer M. Neugschwandtner L. Weichselbaum Y. Fratantonio V. Van Der Veen and C. Platzer. Andrubis--1 000 000 apps later: A view on current android malware behaviors. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS) pages 3--17. IEEE 2014.  M. Lindorfer M. Neugschwandtner L. Weichselbaum Y. Fratantonio V. Van Der Veen and C. Platzer. Andrubis--1 000 000 apps later: A view on current android malware behaviors. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS) pages 3--17. IEEE 2014.","DOI":"10.1109\/BADGERS.2014.7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.22"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"e_1_3_2_1_29_1","volume-title":"A review on the use of deep learning in android malware detection. arXiv preprint arXiv:1812.10360","author":"Naway A.","year":"2018","unstructured":"A. Naway and Y. Li . A review on the use of deep learning in android malware detection. arXiv preprint arXiv:1812.10360 , 2018 . A. Naway and Y. Li. A review on the use of deep learning in android malware detection. arXiv preprint arXiv:1812.10360, 2018."},{"key":"e_1_3_2_1_30_1","volume-title":"Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version). ACM Transactions on Privacy and Security (TOPS), 22(2):14","author":"Onwuzurike L.","year":"2019","unstructured":"L. Onwuzurike , E. Mariconti , P. Andriotis , E. D. Cristofaro , G. Ross , and G. Stringhini . Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version). ACM Transactions on Privacy and Security (TOPS), 22(2):14 , 2019 . L. Onwuzurike, E. Mariconti, P. Andriotis, E. D. Cristofaro, G. Ross, and G. Stringhini. Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version). ACM Transactions on Privacy and Security (TOPS), 22(2):14, 2019."},{"key":"e_1_3_2_1_31_1","first-page":"8024","volume-title":"Advances in Neural Information Processing Systems","author":"Paszke A.","year":"2019","unstructured":"A. Paszke , S. Gross , F. Massa , A. Lerer , J. Bradbury , G. Chanan , T. Killeen , Z. Lin , N. Gimelshein , L. Antiga , : An imperative style, high-performance deep learning library . In Advances in Neural Information Processing Systems , pages 8024 -- 8035 , 2019 . A. Paszke, S. Gross, F. Massa, A. Lerer, J. Bradbury, G. Chanan, T. Killeen, Z. Lin, N. Gimelshein, L. Antiga, et al. Pytorch: An imperative style, high-performance deep learning library. In Advances in Neural Information Processing Systems, pages 8024--8035, 2019."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"e_1_3_2_1_35_1","volume-title":"https:\/\/github.com\/sharlwinkhin\/msoft20","author":"Shar L. K.","year":"2020","unstructured":"L. K. Shar . Experimental comparison of features and machine learning classifiers for android malware detection. https:\/\/github.com\/sharlwinkhin\/msoft20 , 2020 . L. K. Shar. Experimental comparison of features and machine learning classifiers for android malware detection. https:\/\/github.com\/sharlwinkhin\/msoft20, 2020."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12280-9_13"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861405"},{"volume-title":"Soot - a java optimization framework, https:\/\/github.com\/sable\/soot","year":"2018","key":"e_1_3_2_1_38_1","unstructured":"Soot. Soot - a java optimization framework, https:\/\/github.com\/sable\/soot . 2018 . Soot. Soot - a java optimization framework, https:\/\/github.com\/sable\/soot. 2018."},{"key":"e_1_3_2_1_39_1","volume-title":"Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15(1):1929--1958","author":"Srivastava N.","year":"2014","unstructured":"N. Srivastava , G. Hinton , A. Krizhevsky , I. Sutskever , and R. Salakhutdinov . Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15(1):1929--1958 , 2014 . N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15(1):1929--1958, 2014."},{"volume-title":"Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf","year":"2019","key":"e_1_3_2_1_40_1","unstructured":"Symantec. Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf , 2019 . Symantec. Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf, 2019."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-169424"},{"key":"e_1_3_2_1_44_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"2016","unstructured":"I. H. Witten , E. Frank , M. A. Hall , and C. J. Pal . Data Mining: Practical machine learning tools and techniques . Morgan Kaufmann , 2016 . I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2016."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00040"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180223"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0099"},{"key":"e_1_3_2_1_48_1","first-page":"371","volume-title":"ACM SIGCOMM Computer Communication Review","author":"Yuan Z.","year":"2014","unstructured":"Z. Yuan , Y. Lu , Z. Wang , and Y. Xue . Droid-sec: deep learning in android malware detection . In ACM SIGCOMM Computer Communication Review , volume 44 , pages 371 -- 372 . ACM , 2014 . Z. Yuan, Y. Lu, Z. Wang, and Y. Xue. Droid-sec: deep learning in android malware detection. In ACM SIGCOMM Computer Communication Review, volume 44, pages 371--372. ACM, 2014."},{"issue":"2","key":"e_1_3_2_1_49_1","first-page":"3","article-title":"The optimality of naive bayes","volume":"1","author":"Zhang H.","year":"2004","unstructured":"H. Zhang . The optimality of naive bayes . AA , 1 ( 2 ): 3 , 2004 . H. Zhang. The optimality of naive bayes. AA, 1(2):3, 2004.","journal-title":"AA"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"}],"event":{"name":"MOBILESoft '20: IEEE\/ACM 7th International Conference on Mobile Software Engineering and Systems","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"MOBILESoft '20"},"container-title":["Proceedings of the IEEE\/ACM 7th International Conference on Mobile Software Engineering and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387905.3388596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387905.3388596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:42Z","timestamp":1750200102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387905.3388596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":50,"alternative-id":["10.1145\/3387905.3388596","10.1145\/3387905"],"URL":"https:\/\/doi.org\/10.1145\/3387905.3388596","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}