{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:39Z","timestamp":1750220199346,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172194 and U1836116"],"award-info":[{"award-number":["62172194 and U1836116"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,11]]},"DOI":"10.1145\/3545258.3545278","type":"proceedings-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T16:09:39Z","timestamp":1663258179000},"page":"28-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel classification approach for Android malware based on feature fusion and natural language processing"],"prefix":"10.1145","author":[{"given":"Jinfu","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, China"}]},{"given":"Zian","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, China"}]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]},{"given":"Saihua","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, China"}]},{"given":"Shang","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, China"}]},{"given":"Luo","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"issue":"7","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"On-Device Detection of Repackaged Android Malware via Traffic Clustering","volume":"2020","author":"Gaofeng He","unstructured":"[ 1 ] Gaofeng He , Bingfeng Xu, Lu Zhang , and Haiting Zhu . On-Device Detection of Repackaged Android Malware via Traffic Clustering . Security and Communication Networks , 2020 ( 7 ): 1 - 19 . [1] Gaofeng He, Bingfeng Xu, Lu Zhang, and Haiting Zhu. On-Device Detection of Repackaged Android Malware via Traffic Clustering. Security and Communication Networks, 2020(7): 1-19.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100365"},{"key":"e_1_3_2_1_3_1","volume-title":"A method of HTTP malicious traffic detection on mobile networks \/\/2019 IEEE Wireless Communications and Networking Conference (WCNC)","author":"Li J","year":"2019","unstructured":"[ 3 ] Li J , Yun X , Tian M , A method of HTTP malicious traffic detection on mobile networks \/\/2019 IEEE Wireless Communications and Networking Conference (WCNC) . IEEE , 2019 : 1-8. [3] Li J, Yun X, Tian M, et al. A method of HTTP malicious traffic detection on mobile networks \/\/2019 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2019: 1-8."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.101.042304"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771228"},{"key":"e_1_3_2_1_6_1","volume-title":"Taheri L, et al. Toward developing a systematic approach to generate benchmark android malware datasets and classification \/\/2018 International Carnahan Conference on Security Technology (ICCST)","author":"Lashkari A H","year":"2018","unstructured":"[ 6 ] Lashkari A H , Kadir A F A , Taheri L, et al. Toward developing a systematic approach to generate benchmark android malware datasets and classification \/\/2018 International Carnahan Conference on Security Technology (ICCST) . IEEE , 2018 : 1-7. [6] Lashkari A H, Kadir A F A, Taheri L, et al. Toward developing a systematic approach to generate benchmark android malware datasets and classification \/\/2018 International Carnahan Conference on Security Technology (ICCST). IEEE, 2018: 1-7."},{"volume-title":"DIDroid: android Malware classification and characterization using deep image learning \/\/2020 the 10th International Conference on Communication and Network Security. 2020: 70-82","author":"Rahali A","key":"e_1_3_2_1_7_1","unstructured":"[ 7 ] Rahali A , Lashkari A H , Kaur G , DIDroid: android Malware classification and characterization using deep image learning \/\/2020 the 10th International Conference on Communication and Network Security. 2020: 70-82 . [7] Rahali A, Lashkari A H, Kaur G, et al. DIDroid: android Malware classification and characterization using deep image learning \/\/2020 the 10th International Conference on Communication and Network Security. 2020: 70-82."},{"key":"e_1_3_2_1_8_1","volume-title":"Automation, Privacy, and Security: A Big Data Challenge (RDAAPS)","author":"Keyes D S","year":"2021","unstructured":"[ 8 ] Keyes D S , Li B , Kaur G , EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics \/\/2021 Reconciling Data Analytics , Automation, Privacy, and Security: A Big Data Challenge (RDAAPS) . IEEE , 2021 : 1-12. [8] Keyes D S, Li B, Kaur G, et al. EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics \/\/2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). IEEE, 2021: 1-12."},{"key":"e_1_3_2_1_9_1","volume-title":"Lashkari A H. Extensible android malware detection and family classification using network-flows and API-calls \/\/2019 International Carnahan Conference on Security Technology (ICCST)","author":"Taheri L","year":"2019","unstructured":"[ 9 ] Taheri L , Kadir A F A , Lashkari A H. Extensible android malware detection and family classification using network-flows and API-calls \/\/2019 International Carnahan Conference on Security Technology (ICCST) . IEEE , 2019 : 1-8. [9] Taheri L, Kadir A F A, Lashkari A H. Extensible android malware detection and family classification using network-flows and API-calls \/\/2019 International Carnahan Conference on Security Technology (ICCST). IEEE, 2019: 1-8."},{"key":"e_1_3_2_1_10_1","volume-title":"Android malware clustering analysis on network-level behavior \/\/International Conference on Intelligent Computing","author":"Wang S","year":"2017","unstructured":"[ 10 ] Wang S , Chen Z , Li X , Android malware clustering analysis on network-level behavior \/\/International Conference on Intelligent Computing . Springer , Cham , 2017 : 796-807. [10] Wang S, Chen Z, Li X, et al. Android malware clustering analysis on network-level behavior \/\/International Conference on Intelligent Computing. Springer, Cham, 2017: 796-807."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1566-2535(02)00099-4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.06.014"},{"key":"e_1_3_2_1_14_1","volume-title":"RanDroid: Android malware detection using random machine learning classifiers \/\/2018 Technologies for Smart-City Energy Security and Power (ICSESP)","author":"Koli J D","year":"2018","unstructured":"[ 14 ] Koli J D . RanDroid: Android malware detection using random machine learning classifiers \/\/2018 Technologies for Smart-City Energy Security and Power (ICSESP) . IEEE , 2018 : 1-6. [14] Koli J D. RanDroid: Android malware detection using random machine learning classifiers \/\/2018 Technologies for Smart-City Energy Security and Power (ICSESP). IEEE, 2018: 1-6."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"}],"event":{"name":"Internetware 2022: 13th Asia-Pacific Symposium on Internetware","acronym":"Internetware 2022","location":"Hohhot China"},"container-title":["Proceedings of the 13th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545258.3545278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545258.3545278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:45Z","timestamp":1750186965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545258.3545278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":16,"alternative-id":["10.1145\/3545258.3545278","10.1145\/3545258"],"URL":"https:\/\/doi.org\/10.1145\/3545258.3545278","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}