{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:24:06Z","timestamp":1771514646538,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,12]]},"DOI":"10.1145\/3597503.3639122","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T16:43:26Z","timestamp":1712940206000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1649-7549","authenticated-orcid":false,"given":"Haodong","family":"Li","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3310-926X","authenticated-orcid":false,"given":"Guosheng","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3982-4993","authenticated-orcid":false,"given":"Liu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4797-4294","authenticated-orcid":false,"given":"Xusheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9582-0698","authenticated-orcid":false,"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1100-8633","authenticated-orcid":false,"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Hubei, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_2_1","unstructured":"AppBrain. 2022. \"Number of Android Applications \". https:\/\/www.appbrain.com\/stats.."},{"key":"e_1_3_2_1_3_1","first-page":"23","article-title":"Drebin: Effective and explainable detection of Android malware in your pocket","volume":"14","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of Android malware in your pocket.. In Ndss, Vol. 14. 23--26.","journal-title":"Ndss"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.24"},{"key":"e_1_3_2_1_5_1","first-page":"215","article-title":"Ensemble learning in Bayesian neural networks","volume":"168","author":"Barber David","year":"1998","unstructured":"David Barber and Christopher M Bishop. 1998. Ensemble learning in Bayesian neural networks. Nato ASI Series F Computer and Systems Sciences 168 (1998), 215--238.","journal-title":"Nato ASI Series F Computer and Systems Sciences"},{"key":"e_1_3_2_1_6_1","volume-title":"Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 805--823","author":"Barbero Federico","year":"2022","unstructured":"Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, and Lorenzo Cavallaro. 2022. Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 805--823."},{"key":"e_1_3_2_1_7_1","volume-title":"Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","author":"Booz Jarrett","unstructured":"Jarrett Booz, Josh McGiff, William G Hatcher, Wei Yu, James Nguyen, and Chao Lu. 2018. Tuning Deep Learning Performance for Android Malware Detection. In 2018 19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD). IEEE, 140--145."},{"key":"e_1_3_2_1_8_1","volume-title":"Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. computers & security 73","author":"Chen Sen","year":"2018","unstructured":"Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, and Bo Li. 2018. Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. computers & security 73 (2018), 326--344."},{"key":"e_1_3_2_1_9_1","unstructured":"Clarivate. [n. d.]. \"Web of Science\". https:\/\/www.webofscience.com\/."},{"key":"e_1_3_2_1_10_1","first-page":"9","article-title":"Evaluating Smartphone Application Security: A Case Study on Android","volume":"13","author":"Dar Muneer Ahmad","year":"2013","unstructured":"Muneer Ahmad Dar and Javaid Parvez. 2013. Evaluating Smartphone Application Security: A Case Study on Android. Global Journal of Computer Science and Technology 13, E12 (2013), 9--15.","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.114"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_13_1","volume-title":"international conference on machine learning. PMLR, 1050--1059","author":"Gal Yarin","year":"2016","unstructured":"Yarin Gal and Zoubin Ghahramani. 2016. Dropout as a bayesian approximation: Representing model uncertainty in deep learning. In international conference on machine learning. PMLR, 1050--1059."},{"key":"e_1_3_2_1_14_1","volume-title":"Mohsin Ali, Jongseok Lee, Matthias Humt, Jianxiang Feng, Anna Kruspe, Rudolph Triebel, Peter Jung, Ribana Roscher, et al.","author":"Gawlikowski Jakob","year":"2021","unstructured":"Jakob Gawlikowski, Cedrique Rovile Njieutcheu Tassi, Mohsin Ali, Jongseok Lee, Matthias Humt, Jianxiang Feng, Anna Kruspe, Rudolph Triebel, Peter Jung, Ribana Roscher, et al. 2021. A Survey of Uncertainty in Deep Neural Networks. arXiv preprint arXiv:2107.03342 (2021)."},{"key":"e_1_3_2_1_15_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_17_1","volume-title":"Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435","author":"Grosse Kathrin","year":"2016","unstructured":"Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick McDaniel. 2016. Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435 (2016)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00065"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"G. E. Hinton and D. V. Camp. 1993. Keeping the neural networks simple by minimizing the description length of the weights. (1993).","DOI":"10.1145\/168304.168306"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622324"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Donghui Hu Zhongjin Ma Xiaotian Zhang Peipei Li Dengpan Ye Baohong Ling et al. 2017. The Concept Drift Problem in Android Malware Detection and Its Solution. Security and Communication Networks 2017 (2017).","DOI":"10.1155\/2017\/4956386"},{"key":"e_1_3_2_1_24_1","volume-title":"Generating adversarial malware examples for black-box attacks based on GAN. arXiv preprint arXiv:1702.05983","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan. 2017. Generating adversarial malware examples for black-box attacks based on GAN. arXiv preprint arXiv:1702.05983 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013870"},{"key":"e_1_3_2_1_26_1","volume-title":"International Journal of Application or Innovation in Engineering Management 3","author":"Ingale Sumedh","year":"2014","unstructured":"Sumedh Ingale and Sunil Gupta. 2014. SECURITY IN ANDROID BASED SMART-PHONE. International Journal of Application or Innovation in Engineering Management 3 (2014)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00079"},{"key":"e_1_3_2_1_28_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney, Kumar Sharad, Santanu K Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting concept drift in malware classification models. In 26th USENIX Security Symposium (USENIX Security 17). 625--642."},{"key":"e_1_3_2_1_29_1","volume-title":"Uncertainty-aware reinforcement learning for collision avoidance. arXiv preprint arXiv:1702.01182","author":"Kahn Gregory","year":"2017","unstructured":"Gregory Kahn, Adam Villaflor, Vitchyr Pong, Pieter Abbeel, and Sergey Levine. 2017. Uncertainty-aware reinforcement learning for collision avoidance. arXiv preprint arXiv:1702.01182 (2017)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517320"},{"key":"e_1_3_2_1_31_1","volume-title":"What uncertainties do we need in bayesian deep learning for computer vision? Advances in neural information processing systems 30","author":"Kendall Alex","year":"2017","unstructured":"Alex Kendall and Yarin Gal. 2017. What uncertainties do we need in bayesian deep learning for computer vision? Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"e_1_3_2_1_33_1","volume-title":"Simple and scalable predictive uncertainty estimation using deep ensembles. Advances in neural information processing systems 30","author":"Lakshminarayanan Balaji","year":"2017","unstructured":"Balaji Lakshminarayanan, Alexander Pritzel, and Charles Blundell. 2017. Simple and scalable predictive uncertainty estimation using deep ensembles. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_35_1","volume-title":"Training confidence-calibrated classifiers for detecting out-of-distribution samples. arXiv preprint arXiv:1711.09325","author":"Lee Kimin","year":"2017","unstructured":"Kimin Lee, Honglak Lee, Kibok Lee, and Jinwoo Shin. 2017. Training confidence-calibrated classifiers for detecting out-of-distribution samples. arXiv preprint arXiv:1711.09325 (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3003571"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485916"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433204"},{"key":"e_1_3_2_1_39_1","volume-title":"MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis. In 2015 IEEE 39th annual computer software and applications conference","author":"Lindorfer Martina","year":"2015","unstructured":"Martina Lindorfer, Matthias Neugschwandtner, and Christian Platzer. 2015. MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis. In 2015 IEEE 39th annual computer software and applications conference, Vol. 2. IEEE, 422--433."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8793611"},{"key":"e_1_3_2_1_41_1","volume-title":"Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:2002.03594","author":"Ma Zhuo","year":"2020","unstructured":"Zhuo Ma, Haoran Ge, Zhuzhu Wang, Yang Liu, and Ximeng Liu. 2020. Droidetec: Android malware detection and malicious code localization through deep learning. arXiv preprint arXiv:2002.03594 (2020)."},{"key":"e_1_3_2_1_42_1","unstructured":"MalCertain. 2024. \"MALCERTAIN:Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty\". https:\/\/github.com\/Dirtyboy1029\/MALCERTAIN\/."},{"key":"e_1_3_2_1_43_1","volume-title":"ICML Workshop on Uncertainty and Robustness in Deep Learning.","author":"Manunza Gilberto","year":"2021","unstructured":"Gilberto Manunza, Matteo Pagliardini, Martin Jaggi, and Tatjana Chavdarova. 2021. Improved Adversarial Robustness via Uncertainty Targeted Attacks. In ICML Workshop on Uncertainty and Robustness in Deep Learning."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"e_1_3_2_1_45_1","volume-title":"On the validity of Bayesian neural networks for uncertainty estimation. arXiv preprint arXiv:1912.01530","author":"Mitros John","year":"2019","unstructured":"John Mitros and Brian Mac Namee. 2019. On the validity of Bayesian neural networks for uncertainty estimation. arXiv preprint arXiv:1912.01530 (2019)."},{"key":"e_1_3_2_1_46_1","first-page":"6527","article-title":"Review on Android and smartphone security","volume":"2320","author":"Mohini Tiwari","year":"2013","unstructured":"Tiwari Mohini, Srivastava Ashish Kumar, and Gupta Nitesh. 2013. Review on Android and smartphone security. Research Journal of Computer and Information Technology Sciences 2320 (2013), 6527.","journal-title":"Research Journal of Computer and Information Technology Sciences"},{"key":"e_1_3_2_1_47_1","volume-title":"Edward Raff, Charles Nicholas, and James Holt.","author":"Nguyen Andre T","year":"2022","unstructured":"Andre T Nguyen, Fred Lu, Gary Lopez Munoz, Edward Raff, Charles Nicholas, and James Holt. 2022. Out of Distribution Data Detection Using Dropout Bayesian Neural Networks. arXiv preprint arXiv:2202.08985 (2022)."},{"key":"e_1_3_2_1_48_1","volume-title":"Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints. arXiv preprint arXiv:2108.04081","author":"Nguyen Andre T","year":"2021","unstructured":"Andre T Nguyen, Edward Raff, Charles Nicholas, and James Holt. 2021. Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints. arXiv preprint arXiv:2108.04081 (2021)."},{"key":"e_1_3_2_1_49_1","volume-title":"Interval neural networks: Uncertainty scores. arXiv preprint arXiv:2003.11566","author":"Oala Luis","year":"2020","unstructured":"Luis Oala, Cosmas Hei\u00df, Jan Macdonald, Maximilian M\u00e4rz, Wojciech Samek, and Gitta Kutyniok. 2020. Interval neural networks: Uncertainty scores. arXiv preprint arXiv:2003.11566 (2020)."},{"key":"e_1_3_2_1_50_1","volume-title":"Can you trust your model's uncertainty? evaluating predictive uncertainty under dataset shift. Advances in neural information processing systems 32","author":"Ovadia Yaniv","year":"2019","unstructured":"Yaniv Ovadia, Emily Fertig, Jie Ren, Zachary Nado, David Sculley, Sebastian Nowozin, Joshua Dillon, Balaji Lakshminarayanan, and Jasper Snoek. 2019. Can you trust your model's uncertainty? evaluating predictive uncertainty under dataset shift. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_51_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. {TESSERACT}: Eliminating experimental bias in malware classification across space and time. In 28th USENIX Security Symposium (USENIX Security 19). 729--746."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946392"},{"key":"e_1_3_2_1_53_1","volume-title":"Static Analysis of Executables for Collaborative Malware Detection on Android. In 2009 IEEE International Conference on Communications. IEEE, 1--5.","author":"Schmidt A-D","year":"2009","unstructured":"A-D Schmidt, Rainer Bye, H-G Schmidt, Jan Clausen, Osman Kiraz, Kamer A Yuksel, Seyit Ahmet Camtepe, and Sahin Albayrak. 2009. Static Analysis of Executables for Collaborative Malware Detection on Android. In 2009 IEEE International Conference on Communications. IEEE, 1--5."},{"key":"e_1_3_2_1_54_1","volume-title":"Adversarial Examples - A Complete Characterisation of the Phenomenon. arXiv preprint arXiv:1810.01185","author":"Serban Alexandru Constantin","year":"2018","unstructured":"Alexandru Constantin Serban, Erik Poll, and Joost Visser. 2018. Adversarial Examples - A Complete Characterisation of the Phenomenon. arXiv preprint arXiv:1810.01185 (2018)."},{"key":"e_1_3_2_1_55_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_56_1","volume-title":"Understanding Measures of Uncertainty for Adversarial Example Detection. arXiv preprint arXiv:1803.08533","author":"Smith Lewis","year":"2018","unstructured":"Lewis Smith and Yarin Gal. 2018. Understanding Measures of Uncertainty for Adversarial Example Detection. arXiv preprint arXiv:1803.08533 (2018)."},{"key":"e_1_3_2_1_57_1","volume-title":"Functional variational Bayesian neural networks. arXiv preprint arXiv:1903.05779","author":"Sun Shengyang","year":"2019","unstructured":"Shengyang Sun, Guodong Zhang, Jiaxin Shi, and Roger Grosse. 2019. Functional variational Bayesian neural networks. arXiv preprint arXiv:1903.05779 (2019)."},{"key":"e_1_3_2_1_58_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_59_1","volume-title":"An Android Malware Detection Technique Based on Optimized Permissions and API. In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 258--263","author":"Tiwari Suman R","year":"2018","unstructured":"Suman R Tiwari and Ravi U Shukla. 2018. An Android Malware Detection Technique Based on Optimized Permissions and API. In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 258--263."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-3132-2"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.13"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906934"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555652"},{"key":"e_1_3_2_1_64_1","volume-title":"Deep Ground Truth Analysis of Current Android Malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 252--276","author":"Wei Fengguo","year":"2017","unstructured":"Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep Ground Truth Analysis of Current Android Malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 252--276."},{"key":"e_1_3_2_1_65_1","volume-title":"Bayesian deep learning and a probabilistic perspective of generalization. Advances in neural information processing systems 33","author":"Wilson Andrew G","year":"2020","unstructured":"Andrew G Wilson and Pavel Izmailov. 2020. Bayesian deep learning and a probabilistic perspective of generalization. Advances in neural information processing systems 33 (2020), 4697--4708."},{"key":"e_1_3_2_1_66_1","volume-title":"Droidmat: Android malware detection through manifest and api calls tracing. In 2012 Seventh Asia joint conference on information security","author":"Wu Dong-Jie","year":"2012","unstructured":"Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, and Kuo-Ping Wu. 2012. Droidmat: Android malware detection through manifest and api calls tracing. In 2012 Seventh Asia joint conference on information security. IEEE, 62--69."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363193"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00041"},{"key":"e_1_3_2_1_69_1","volume-title":"DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 473--487","author":"Xu Ke","year":"2018","unstructured":"Ke Xu, Yingjiu Li, Robert H Deng, and Kai Chen. 2018. DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 473--487."},{"key":"e_1_3_2_1_70_1","volume-title":"Generalized out-of-distribution detection: A survey. arXiv preprint arXiv:2110.11334","author":"Yang Jingkang","year":"2021","unstructured":"Jingkang Yang, Kaiyang Zhou, Yixuan Li, and Ziwei Liu. 2021. Generalized out-of-distribution detection: A survey. arXiv preprint arXiv:2110.11334 (2021)."},{"key":"e_1_3_2_1_71_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Yang Limin","year":"2021","unstructured":"Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, and Gang Wang. 2021. {CADE}: Detecting and explaining concept drift samples for security applications. In 30th USENIX Security Symposium (USENIX Security 21). 2327--2344."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264476"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_74_1","volume-title":"Understanding Intrinsic Robustness Using Label Uncertainty. In International Conference on Learning Representations.","author":"Zhang Xiao","year":"2021","unstructured":"Xiao Zhang and David Evans. 2021. Understanding Intrinsic Robustness Using Label Uncertainty. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380368"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405598"},{"key":"e_1_3_2_1_77_1","volume-title":"Quantifying classification uncertainty using regularized evidential neural networks. arXiv preprint arXiv:1910.06864","author":"Zhao Xujiang","year":"2019","unstructured":"Xujiang Zhao, Yuzhe Ou, Lance Kaplan, Feng Chen, and Jin-Hee Cho. 2019. Quantifying classification uncertainty using regularized evidential neural networks. arXiv preprint arXiv:1910.06864 (2019)."},{"key":"e_1_3_2_1_78_1","volume-title":"Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE symposium on security and privacy. IEEE, 95--109","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou and Xuxian Jiang. 2012. Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE symposium on security and privacy. IEEE, 95--109."}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639122","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3639122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:12Z","timestamp":1750286952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":78,"alternative-id":["10.1145\/3597503.3639122","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3639122","relation":{},"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}