{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:58Z","timestamp":1750220338655,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,4]],"date-time":"2021-12-04T00:00:00Z","timestamp":1638576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,4]]},"DOI":"10.1145\/3507548.3507586","type":"proceedings-article","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T23:12:40Z","timestamp":1646867560000},"page":"249-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hybrid Classification and Clustering Algorithm on Recent Android Malware Detection"],"prefix":"10.1145","author":[{"given":"jiezhong","family":"xiao","sequence":"first","affiliation":[{"name":"Guangzhou Foreign Language school, China"}]},{"given":"qian","family":"han","sequence":"additional","affiliation":[{"name":"Dartmouth College, U.S."}]},{"given":"yumeng","family":"gao","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore,"}]}],"member":"320","published-online":{"date-parts":[[2022,3,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the tenth ACM conference on data and application security and privacy (pp. 353-364)","author":"Millar S.","year":"2020","unstructured":"Millar , S. , McLaughlin , N. , Martinez del Rincon , J. , Miller , P. , & Zhao , Z. ( 2020 , March). DANdroid: A multi-view discriminative adversarial network for obfuscated Android malware detection . In Proceedings of the tenth ACM conference on data and application security and privacy (pp. 353-364) . Millar, S., McLaughlin, N., Martinez del Rincon, J., Miller, P., & Zhao, Z. (2020, March). DANdroid: A multi-view discriminative adversarial network for obfuscated Android malware detection. In Proceedings of the tenth ACM conference on data and application security and privacy (pp. 353-364)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002842"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965646"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102794"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9647-6_85"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050858"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2020.03.002"},{"issue":"3","key":"e_1_3_2_1_8_1","first-page":"1","article-title":"D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware","volume":"11","author":"La Marra A.","year":"2020","unstructured":"La Marra , A. , Martinelli , F. , Mercaldo , F. , Saracino , A. , & Sheikhalishahi , M. ( 2020 ). D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. , 11 ( 3 ), 1 - 28 . La Marra, A., Martinelli, F., Mercaldo, F., Saracino, A., & Sheikhalishahi, M. (2020). D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 11(3), 1-28.","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.10.2.10238"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106569"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_15_1","first-page":"23","volume-title":"Ndss (Vol. 14","author":"Arp D.","year":"2014","unstructured":"Arp , D. , Spreitzenbarth , M. , Hubner , M. , Gascon , H. , Rieck , K. , & Siemens , C. E. R. T. ( 2014 , February). Drebin: Effective and explainable detection of android malware in your pocket . In Ndss (Vol. 14 , pp. 23 - 26 ). Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., & Siemens, C. E. R. T. (2014, February). Drebin: Effective and explainable detection of android malware in your pocket. In Ndss (Vol. 14, pp. 23-26)."},{"key":"e_1_3_2_1_16_1","unstructured":"https:\/\/github.com\/alexMyG\/AndroPyTool  https:\/\/github.com\/alexMyG\/AndroPyTool"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585560"},{"key":"e_1_3_2_1_18_1","first-page":"217","volume-title":"November, 2011.doi:10","author":"Pragadeesh Kumar N.","unstructured":"K. Pragadeesh Kumar , N. Jaisankar , and N. Mythili , \" An Efficient Technique for Detection of Suspicious Malicious Web Site,\" Journal of Advances in Information Technology, Vol. 2, No. 4, pp. 217-221 , November, 2011.doi:10 .4304\/jait.2.4. 217 - 221 10.4304\/jait.2.4.217-221 K. Pragadeesh Kumar, N. Jaisankar, and N. Mythili, \"An Efficient Technique for Detection of Suspicious Malicious Web Site,\" Journal of Advances in Information Technology, Vol. 2, No. 4, pp. 217-221, November, 2011.doi:10.4304\/jait.2.4.217-221"},{"volume-title":"Sung, \"School of Computing, the University of Southern Mississippi","author":"Trung T.","key":"e_1_3_2_1_19_1","unstructured":"Trung T. Nguyen , Amartya Hatua, and Andrew H . Sung, \"School of Computing, the University of Southern Mississippi , Hattiesburg, MS, U.S.A. ,\" Vol. 8 , No. 2, pp. 141-147, May, 2017. doi: 10.12720\/jait.8.2.141-147 10.12720\/jait.8.2.141-147 Trung T. Nguyen, Amartya Hatua, and Andrew H. Sung, \"School of Computing, the University of Southern Mississippi, Hattiesburg, MS, U.S.A.,\" Vol. 8, No. 2, pp. 141-147, May, 2017. doi: 10.12720\/jait.8.2.141-147"},{"key":"e_1_3_2_1_20_1","first-page":"129","volume-title":"August, 2013.doi:10","author":"Dewan Md","unstructured":"Dewan Md . Farid and Chowdhury Mofizur Rahman, \"Mining Complex Data Streams: Discretization, Attribute Selection and Classification,\" Journal of Advances in Information Technology, Vol. 4, No. 3, pp. 129-135 , August, 2013.doi:10 .4304\/jait.4.3. 129 - 135 10.4304\/jait.4.3.129-135 Dewan Md. Farid and Chowdhury Mofizur Rahman, \"Mining Complex Data Streams: Discretization, Attribute Selection and Classification,\" Journal of Advances in Information Technology, Vol. 4, No. 3, pp. 129-135, August, 2013.doi:10.4304\/jait.4.3.129-135"}],"event":{"name":"CSAI 2021: 2021 5th International Conference on Computer Science and Artificial Intelligence","acronym":"CSAI 2021","location":"Beijing China"},"container-title":["2021 5th International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507548.3507586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507548.3507586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:26Z","timestamp":1750191146000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507548.3507586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,4]]},"references-count":20,"alternative-id":["10.1145\/3507548.3507586","10.1145\/3507548"],"URL":"https:\/\/doi.org\/10.1145\/3507548.3507586","relation":{},"subject":[],"published":{"date-parts":[[2021,12,4]]},"assertion":[{"value":"2022-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}