{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:56:03Z","timestamp":1752360963203,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,11]]},"DOI":"10.1145\/3529399.3529412","type":"proceedings-article","created":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T15:43:09Z","timestamp":1654875789000},"page":"74-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Combining traditional machine learning and anomaly detection for several imbalanced Android malware dataset's classification"],"prefix":"10.1145","author":[{"given":"Yiwei","family":"Gan","sequence":"first","affiliation":[{"name":"Dalhousie University, Dalhousie University, Canada"}]},{"given":"Qian","family":"Han","sequence":"additional","affiliation":[{"name":"Computer Science, Dartmouth College, USA"}]},{"given":"Yumeng","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute of Infocomm Research, Agency for Science,Technology and Research(A*STAR), Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Forecast number of mobile users worldwide from 2020 to 2025: https:\/\/www.statista.com\/statistics\/218984\/number-of-global-mobile-users-since-2010\/  Forecast number of mobile users worldwide from 2020 to 2025: https:\/\/www.statista.com\/statistics\/218984\/number-of-global-mobile-users-since-2010\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919796"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931043"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05309-4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.12.088"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/app112110244"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01238-9"},{"key":"e_1_3_2_1_9_1","volume-title":"Thomas Given-Wilson, and Axel Legay. \"Unsupervised behavioural mining and clustering for malware family identification.\" Proceedings of the 36th Annual ACM Symposium on Applied Computing.","author":"Dam","year":"2021","unstructured":"Dam , Khanh Huu The , Thomas Given-Wilson, and Axel Legay. \"Unsupervised behavioural mining and clustering for malware family identification.\" Proceedings of the 36th Annual ACM Symposium on Applied Computing. 2021 . Dam, Khanh Huu The, Thomas Given-Wilson, and Axel Legay. \"Unsupervised behavioural mining and clustering for malware family identification.\" Proceedings of the 36th Annual ACM Symposium on Applied Computing. 2021."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601491"},{"key":"e_1_3_2_1_11_1","volume-title":"Ieee","author":"Bakour Khaled","year":"2018","unstructured":"Bakour , Khaled , H. Murat \u00dcnver , and Razan Ghanem . \" The android malware static analysis: techniques, limitations, and open challenges.\" 2018 3rd International Conference on Computer Science and Engineering (UBMK) . Ieee , 2018 . Bakour, Khaled, H. Murat \u00dcnver, and Razan Ghanem. \"The android malware static analysis: techniques, limitations, and open challenges.\" 2018 3rd International Conference on Computer Science and Engineering (UBMK). Ieee, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844349"},{"key":"e_1_3_2_1_13_1","volume-title":"Static and dynamic analysis for android malware detection.\" Advances in Big Data and Cloud Computing","author":"Sugunan Krishna","year":"2018","unstructured":"Sugunan , Krishna , T. Gireesh Kumar , and K. A. Dhanya . \" Static and dynamic analysis for android malware detection.\" Advances in Big Data and Cloud Computing . Springer , Singapore , 2018 . 147-155. Sugunan, Krishna, T. Gireesh Kumar, and K. A. Dhanya. \"Static and dynamic analysis for android malware detection.\" Advances in Big Data and Cloud Computing. Springer, Singapore, 2018. 147-155."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.001"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE","author":"Sun Lichao","year":"2016","unstructured":"Sun , Lichao , \"Sig PID : significant permission identification for android malware detection.\" 2016 11th international conference on malicious and unwanted software (MALWARE) . IEEE , 2016 . Sun, Lichao, \"SigPID: significant permission identification for android malware detection.\" 2016 11th international conference on malicious and unwanted software (MALWARE). IEEE, 2016."},{"key":"e_1_3_2_1_16_1","first-page":"2018","article-title":"TinyDroid: a lightweight and efficient model for Android malware detection and classification","author":"Chen Tieming","year":"2018","unstructured":"Chen , Tieming , \" TinyDroid: a lightweight and efficient model for Android malware detection and classification .\" Mobile information systems 2018 ( 2018 ). Chen, Tieming, \"TinyDroid: a lightweight and efficient model for Android malware detection and classification.\" Mobile information systems 2018 (2018).","journal-title":"Mobile information systems"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10144966"},{"key":"e_1_3_2_1_18_1","volume-title":"Effective and explainable detection of android malware in your pocket.\" Ndss","author":"Arp Daniel","year":"2014","unstructured":"Arp , Daniel , \" Drebin : Effective and explainable detection of android malware in your pocket.\" Ndss . Vol. 14 . 2014 . Arp, Daniel, \"Drebin: Effective and explainable detection of android malware in your pocket.\" Ndss. Vol. 14. 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.006"},{"key":"e_1_3_2_1_20_1","unstructured":"NJCCIC Android Malware Variants: https:\/\/www.cyber.nj.gov\/threat-center\/threat-profiles\/android-malware-variants\/  NJCCIC Android Malware Variants: https:\/\/www.cyber.nj.gov\/threat-center\/threat-profiles\/android-malware-variants\/"},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE","author":"Lashkari Arash Habibi","year":"2018","unstructured":"Lashkari , Arash Habibi , \" Toward developing a systematic approach to generate benchmark android malware datasets and classification.\" 2018 International Carnahan Conference on Security Technology (ICCST) . IEEE , 2018 . Lashkari, Arash Habibi, \"Toward developing a systematic approach to generate benchmark android malware datasets and classification.\" 2018 International Carnahan Conference on Security Technology (ICCST). IEEE, 2018."},{"key":"e_1_3_2_1_22_1","unstructured":"One-class SVM Novelty and Outlier Detection: https:\/\/scikit-learn.org\/stable\/modules\/outlier_detection.html#outlier-detection  One-class SVM Novelty and Outlier Detection: https:\/\/scikit-learn.org\/stable\/modules\/outlier_detection.html#outlier-detection"}],"event":{"name":"ICMLT 2022: 2022 7th International Conference on Machine Learning Technologies","acronym":"ICMLT 2022","location":"Rome Italy"},"container-title":["2022 7th International Conference on Machine Learning Technologies (ICMLT)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529399.3529412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529399.3529412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:24Z","timestamp":1750188684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529399.3529412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,11]]},"references-count":22,"alternative-id":["10.1145\/3529399.3529412","10.1145\/3529399"],"URL":"https:\/\/doi.org\/10.1145\/3529399.3529412","relation":{},"subject":[],"published":{"date-parts":[[2022,3,11]]},"assertion":[{"value":"2022-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}