{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:46:13Z","timestamp":1774453573119,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,18]]},"DOI":"10.1145\/3603273.3635055","type":"proceedings-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T18:12:40Z","timestamp":1704823960000},"page":"380-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Multi-modality Feature Fusion Method for Android Malware Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9378-1963","authenticated-orcid":false,"given":"Jiahao","family":"Song","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Zhengzhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7259-9321","authenticated-orcid":false,"given":"Runzhi","family":"Li","sequence":"additional","affiliation":[{"name":"Network Center, Zhengzhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0018-3524","authenticated-orcid":false,"given":"Zijiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Network Center, Zhengzhou University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kaspersky. Mobile malware evolution 2020[EB\/OL]. https:\/\/securelist.com\/mobile-malware_x0002_evolution-2020\/101029."},{"key":"e_1_3_2_1_2_1","volume-title":"MLHat","author":"Daoudi N","year":"2021","unstructured":"Daoudi N, Samhi J, Kabore A K, Dexray: a simple, yet effective deep learning approach to android malware detection based on image representation of bytecode[C]\/\/Deployable Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings 2. Springer International Publishing, 2021: 81-106."},{"key":"e_1_3_2_1_3_1","volume-title":"Android malware detection using function call graph with graph convolutional networks[C]\/\/2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC)","author":"Vinayaka K V","year":"2021","unstructured":"Vinayaka K V, Jaidhar C D. Android malware detection using function call graph with graph convolutional networks[C]\/\/2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC). IEEE, 2021: 279-287."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"e_1_3_2_1_5_1","volume-title":"Applying machine learning classifiers to dynamic android malware detection at scale[C]. 2013 9th international wireless communications and mobile computing conference","author":"Amos B","year":"2013","unstructured":"Amos B, Turner H, White J. Applying machine learning classifiers to dynamic android malware detection at scale[C]. 2013 9th international wireless communications and mobile computing conference, 2013: 1666-1671."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008081"},{"key":"e_1_3_2_1_9_1","volume-title":"Available online: https:\/\/androguard.readthedocs.io\/en\/latest\/index.html (accessed on","author":"Welcome","year":"2022","unstructured":"Welcome to Androguard's Documentation. Available online: https:\/\/androguard.readthedocs.io\/en\/latest\/index.html (accessed on 17 March 2022)."},{"key":"e_1_3_2_1_10_1","volume-title":"Dalvik opcodes","author":"Gabor Paller","year":"2020","unstructured":"Gabor Paller, \u201cDalvik opcodes,\u201d 2020, (accessed: 07.12.2020). [Online]. Available: http:\/\/pallergabor.uw.hu\/androidblog\/dalvik opcodes.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Zhang X Zhang Y Zhong M Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware[C]\/\/Proceedings of the 2020 ACM SIGSAC conference on computer and communications security. 2020: 757-770.","DOI":"10.1145\/3372297.3417291"},{"key":"e_1_3_2_1_12_1","volume-title":"DroidFax: A toolkit for systematic characterization of Android applications[C]\/\/2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Cai H","year":"2017","unstructured":"Cai H, Ryder B G. DroidFax: A toolkit for systematic characterization of Android applications[C]\/\/2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2017: 643-647."},{"key":"e_1_3_2_1_13_1","unstructured":"Arzt S Rasthofer S Bodden E. Susi: A tool for the fully automated classification and categorization of android sources and sinks[J]. University of Darmstadt Tech. Rep. TUDCS-2013-0114 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_15_1","volume-title":"Inductive representation learning on large graphs[J]. Advances in neural information processing systems","author":"Hamilton W","year":"2017","unstructured":"Hamilton W, Ying Z, Leskovec J. Inductive representation learning on large graphs[J]. Advances in neural information processing systems, 2017, 30."},{"key":"e_1_3_2_1_16_1","volume-title":"PMLR","author":"Lee J","unstructured":"Lee J, Lee I, Kang J. Self-attention graph pooling[C]\/\/International conference on machine learning. PMLR, 2019: 3734-3743."},{"key":"e_1_3_2_1_17_1","volume-title":"Lee J Y","author":"Woo S","year":"2018","unstructured":"Woo S, Park J, Lee J Y, Cbam: Convolutional block attention module[C]\/\/Proceedings of the European conference on computer vision (ECCV). 2018: 3-19."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"He K Zhang X Ren S Deep residual learning for image recognition[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770-778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_19_1","volume-title":"meeting. NIH Public Access, 2018","author":"Gu Y","year":"2018","unstructured":"Gu Y, Yang K, Fu S, Hybrid attention based multimodal network for spoken language classification[C]\/\/Proceedings of the Conference. association for Computational Linguistics. meeting. NIH Public Access, 2018, 2018: 2379."},{"key":"e_1_3_2_1_20_1","volume-title":"Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE","author":"Mahdavifar S","unstructured":"Mahdavifar S, Kadir A F A, Fatemi R, Dynamic android malware category classification using semi-supervised deep learning[C]\/\/2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE, 2020: 515-522."},{"key":"e_1_3_2_1_21_1","volume-title":"Klein J","author":"Allix K","year":"2016","unstructured":"Allix K, Bissyand\u00e9 T F, Klein J, Androzoo: Collecting millions of android apps for the research community[C]\/\/Proceedings of the 13th international conference on mining software repositories. 2016: 468-471."}],"event":{"name":"AAIA 2023: 2023 International Conference on Advances in Artificial Intelligence and Applications","location":"Wuhan China","acronym":"AAIA 2023"},"container-title":["Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3635055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603273.3635055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:34:24Z","timestamp":1755891264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3635055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":21,"alternative-id":["10.1145\/3603273.3635055","10.1145\/3603273"],"URL":"https:\/\/doi.org\/10.1145\/3603273.3635055","relation":{},"subject":[],"published":{"date-parts":[[2023,11,18]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}