{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:56:52Z","timestamp":1758268612547,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,17]]},"DOI":"10.1145\/3490725.3490733","type":"proceedings-article","created":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T23:52:48Z","timestamp":1640821968000},"page":"50-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An Android Malware Detection and Malicious Code Location Method Based on Graph Neural Network"],"prefix":"10.1145","author":[{"given":"Qing","family":"Wu","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology, China"}]},{"given":"Peng","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, China"}]},{"given":"Xueshu","family":"Hong","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, China"}]},{"given":"Xueling","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, China"}]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA.2017.18"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2013.803889"},{"key":"e_1_3_2_1_3_1","first-page":"e3675","article-title":"Android malware detection through generative adversarial networks","author":"Amin M.","year":"2019","unstructured":"M. Amin , B. Shah , A. Sharif , T. Ali , K.-l. Kim , and S. Anwar , \u201c Android malware detection through generative adversarial networks ,\u201d Transactions on Emerging Telecommunications Technologies , p. e3675 , 2019 . M. Amin, B. Shah, A. Sharif, T. Ali, K.-l. Kim, and S. Anwar, \u201cAndroid malware detection through generative adversarial networks,\u201d Transactions on Emerging Telecommunications Technologies, p. e3675, 2019.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"e_1_3_2_1_4_1","first-page":"1878","volume-title":"conference on neural networks (IJCNN). IEEE","author":"Nix R.","year":"2017","unstructured":"R. Nix and J. Zhang , \u201c Classification of android apps and malware using deep neural networks,\u201d in 2017 International joint conference on neural networks (IJCNN). IEEE , 2017 , pp. 1871\u2013 1878 . R. Nix and J. Zhang, \u201cClassification of android apps and malware using deep neural networks,\u201d in 2017 International joint conference on neural networks (IJCNN). IEEE, 2017, pp. 1871\u20131878."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23265"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1786-z"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2834344"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10227975"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9539-8"},{"key":"e_1_3_2_1_13_1","volume-title":"Droidetec: Android malware detection and malicious code localization through deep learning","author":"Ma Z.","year":"2002","unstructured":"Z. Ma , H. Ge , Z. Wang , Y. Liu , and X. Liu , \u201c Droidetec: Android malware detection and malicious code localization through deep learning ,\u201d arXiv preprint arXiv: 2002 .03594, 2020. Z. Ma, H. Ge, Z.Wang, Y. Liu, and X. Liu, \u201cDroidetec: Android malware detection and malicious code localization through deep learning,\u201d arXiv preprint arXiv:2002.03594, 2020."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"e_1_3_2_1_15_1","volume-title":"Graph attention networks","author":"Veli\u02c7ckovi\u00b4c P.","year":"2017","unstructured":"P. Veli\u02c7ckovi\u00b4c , G. Cucurull , A. Casanova , A. Romero , P. Lio , and Y. Bengio , \u201c Graph attention networks ,\u201d arXiv preprint arXiv:1710.10903, 2017 . P. Veli\u02c7ckovi\u00b4c, G. Cucurull, A. Casanova, A. Romero, P. Lio, and Y. Bengio, \u201cGraph attention networks,\u201d arXiv preprint arXiv:1710.10903, 2017."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656460"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00085"},{"key":"e_1_3_2_1_19_1","volume-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf T. N.","year":"2016","unstructured":"T. N. Kipf and M. Welling , \u201c Semi-supervised classification with graph convolutional networks ,\u201d arXiv preprint arXiv:1609.02907, 2016 . T. N. Kipf and M. Welling, \u201cSemi-supervised classification with graph convolutional networks,\u201d arXiv preprint arXiv:1609.02907, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2018.00034"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486316"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.88"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2523912"}],"event":{"name":"MLMI'21: 2021 The 4th International Conference on Machine Learning and Machine Intelligence","acronym":"MLMI'21","location":"Hangzhou China"},"container-title":["2021 The 4th International Conference on Machine Learning and Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490725.3490733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3490725.3490733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:30Z","timestamp":1750188630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490725.3490733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"references-count":25,"alternative-id":["10.1145\/3490725.3490733","10.1145\/3490725"],"URL":"https:\/\/doi.org\/10.1145\/3490725.3490733","relation":{},"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"2021-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}