{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:04Z","timestamp":1750220164795,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,21]]},"DOI":"10.1145\/3556548.3559629","type":"proceedings-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T16:09:55Z","timestamp":1665072595000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MAPS"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5071-5803","authenticated-orcid":false,"given":"Amirmohammad","family":"Pasdar","sequence":"first","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Young Choon","family":"Lee","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Seok-Hee","family":"Hong","sequence":"additional","affiliation":[{"name":"University of Sydney, Australia"}]},{"given":"Tongliang","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_2_1","first-page":"23","article-title":"Drebin: Effective and explainable detection of android malware in your pocket","volume":"14","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp , Michael Spreitzenbarth , Malte Hubner , Hugo Gascon , Konrad Rieck , and CERT Siemens . 2014 . Drebin: Effective and explainable detection of android malware in your pocket .. In Ndss , Vol. 14. 23 -- 26 . Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of android malware in your pocket.. In Ndss, Vol. 14. 23--26.","journal-title":"Ndss"},{"key":"e_1_3_2_1_3_1","unstructured":"Alex Chapman. 2021. Google Play Store removes seven apps downloaded thousands of times over Joker malware fears. https:\/\/7news.com.au\/.  Alex Chapman. 2021. Google Play Store removes seven apps downloaded thousands of times over Joker malware fears. https:\/\/7news.com.au\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2015.1073510"},{"key":"e_1_3_2_1_6_1","unstructured":"Google. 2021. Google Play Protect. https:\/\/developers.google.com\/android\/play-protect.  Google. 2021. Google Play Protect. https:\/\/developers.google.com\/android\/play-protect."},{"key":"e_1_3_2_1_7_1","volume-title":"The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER","author":"Kiss Nicolas","year":"2016","unstructured":"Nicolas Kiss , Jean-Fran\u00e7ois Lalande , Mourad Leslous , and Val\u00e9rie Viet Triem Tong . 2016 . Kharon dataset: Android malware under a microscope . In The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). 1--12. Nicolas Kiss, Jean-Fran\u00e7ois Lalande, Mourad Leslous, and Val\u00e9rie Viet Triem Tong. 2016. Kharon dataset: Android malware under a microscope. In The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). 1--12."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00035"},{"volume-title":"2018 International Carnahan Conference on Security Technology (ICCST). 1--7.","author":"Lashkari Arash Habibi","key":"e_1_3_2_1_9_1","unstructured":"Arash Habibi Lashkari , Andi Fitriah A. Kadir , Laya Taheri , and Ali A. Ghorbani . 2018. Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification . In 2018 International Carnahan Conference on Security Technology (ICCST). 1--7. Arash Habibi Lashkari, Andi Fitriah A. Kadir, Laya Taheri, and Ali A. Ghorbani. 2018. Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification. In 2018 International Carnahan Conference on Security Technology (ICCST). 1--7."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_9"},{"key":"e_1_3_2_1_11_1","volume-title":"Rasool Fatemi, Dima Alhadidi, and Ali A Ghorbani.","author":"Mahdavifar Samaneh","year":"2020","unstructured":"Samaneh Mahdavifar , Andi Fitriah Abdul Kadir , Rasool Fatemi, Dima Alhadidi, and Ali A Ghorbani. 2020 . Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE , 515--522. Samaneh Mahdavifar, Andi Fitriah Abdul Kadir, Rasool Fatemi, Dima Alhadidi, and Ali A Ghorbani. 2020. Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE, 515--522."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_14_1","volume-title":"Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE Symposium on Security and Privacy. 95--109","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou and Xuxian Jiang . 2012 . Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE Symposium on Security and Privacy. 95--109 . Yajin Zhou and Xuxian Jiang. 2012. Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE Symposium on Security and Privacy. 95--109."}],"event":{"name":"ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Sydney NSW Australia","acronym":"ACM MobiCom '22"},"container-title":["Proceedings of the 17th ACM Workshop on Mobility in the Evolving Internet Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3556548.3559629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3556548.3559629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:32Z","timestamp":1750186832000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3556548.3559629"}},"subtitle":["a dataset for semantic profiling and analysis of Android applications"],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":14,"alternative-id":["10.1145\/3556548.3559629","10.1145\/3556548"],"URL":"https:\/\/doi.org\/10.1145\/3556548.3559629","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}