{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:40Z","timestamp":1750220080419,"version":"3.41.0"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61702155, 61972128, 61872219, 62177014"],"award-info":[{"award-number":["61702155, 61972128, 61872219, 62177014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"crossref","award":["ZR2019MF001"],"award-info":[{"award-number":["ZR2019MF001"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Anhui Province","award":["1808085MF176"],"award-info":[{"award-number":["1808085MF176"]}]},{"name":"Open Project of State Key Laboratory for Novel Software Technology","award":["KFKT2020B08"],"award-info":[{"award-number":["KFKT2020B08"]}]},{"name":"Research Foundation of Hunan Provincial Education Department of China","award":["20B222"],"award-info":[{"award-number":["20B222"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["PA2021KCPY0050"],"award-info":[{"award-number":["PA2021KCPY0050"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"ARC DECRA","award":["DE210101458"],"award-info":[{"award-number":["DE210101458"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>In the era of smart healthcare tremendous growth, plenty of smart devices facilitate cognitive computing for the purposes of lower cost, smarter diagnostic, etc. Android system has been widely used in the field of IoMT, and as the main operating system. However, Android malware is becoming one major security concern for healthcare, by the serious threat for our medical software assets, like the leakage of private information, the abusing of critical operations, etc. Unfortunately, the existing methods focus on building sustainable classification models, without fully considering system API which is the key to model aging. Compared to the traditional methods, we apply the lifeCycle of API as temporal metric. In addition to the temporal view, the \u201csizes\u201d of the APPs are utilized as spatial metric in the spatial view. Based on this, we firstly discuss the temporal and spatial metrics together in terms of clustering, and then propose our novel framework-TSDroid. In this framework, we use TS-based clustering algorithm to obtain clustering subsets to enhance the detection capability. We have carried out an experimental verification on three existing excellent methods (i.e., Drebin, HinDroid, and DroidEvolver) and obtain good promotion effects by our framework.<\/jats:p>","DOI":"10.1145\/3532091","type":"journal-article","created":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T12:25:24Z","timestamp":1651494324000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["TSDroid: A Novel Android Malware Detection Framework Based on Temporal &amp; Spatial Metrics in IoMT"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0536-7226","authenticated-orcid":false,"given":"Gaofeng","family":"Zhang","sequence":"first","affiliation":[{"name":"Hefei University of Technology, China and Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6680-1992","authenticated-orcid":false,"given":"Yu","family":"Li","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5004-9038","authenticated-orcid":false,"given":"Xudan","family":"Bao","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4385-0975","authenticated-orcid":false,"given":"Chinmay","family":"Chakarborty","sequence":"additional","affiliation":[{"name":"Department of Electronics &amp; Communication Engineering, Birla Institute of Technology, India and Federal University of Piaui, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China), China and Instituto de Telecomunica\u00e7\u00f5es, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5071-9628","authenticated-orcid":false,"given":"Liping","family":"Zheng","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, China and Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7353-4159","authenticated-orcid":false,"given":"Xuyun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Macquarie University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7746-4901","authenticated-orcid":false,"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[{"name":"Qufu Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2029-5067","authenticated-orcid":false,"given":"Mohammad R.","family":"Khosravi","sequence":"additional","affiliation":[{"name":"Persian Gulf University, Iran and Shiraz University of Technology, Iran"}]}],"member":"320","published-online":{"date-parts":[[2023,3]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.047"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_1_4_2","volume-title":"Engineering Secure Software and Systems - 7th International Symposium (ESSoS 2015)","author":"Allix Kevin","year":"2015","unstructured":"Kevin Allix, Tegawend\u00e9 F. Bissyand\u00e9, Jacques Klein, and Yves Le Traon. 2015. Are your training datasets yet relevant?. In Engineering Secure Software and Systems - 7th International Symposium (ESSoS 2015)."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73689-7_90"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36617-9_11"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-020-00598-6"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-020-00598-6"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.004"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-020-05913-4"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456253"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2907070"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370306"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2739145"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4157156"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"e_1_3_1_18_2","unstructured":"Deloitte 2021. Medtech and the Internet of Medical Things. (2021). arXiv:https:\/\/www2.deloitte.com\/global\/en\/pages\/life-sciences-and-healthcare\/articles\/medtech-internet-of-medical-things.html."},{"key":"e_1_3_1_19_2","unstructured":"Google Android developer. Android API reference. https:\/\/developer.android.google.cn\/reference."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2019.00067"},{"key":"e_1_3_1_22_2","article-title":"Symantec internet security threat report trends for 2010","author":"Fossi Marc","year":"2011","unstructured":"Marc Fossi, Gerry Egan, Kevin Haley, Eric Johnson, Trevor Mack, T\u00e9o Adams, Joseph Blackbird, Mo King Low, Debbie Mazurek, David McKinney, et\u00a0al. 2011. Symantec internet security threat report trends for 2010. Volume XVI (2011).","journal-title":"Volume XVI"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2009.17.3.275"},{"key":"e_1_3_1_24_2","unstructured":"G. V. Research 2021. Healthcare Mobile Application Market Size Share & Trends Report. (2021). arXiv:https:\/\/www.grandviewresearch.com\/industry-analysis\/healthcare-mobile-applications-market."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.46"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2912970"},{"key":"e_1_3_1_28_2","article-title":"Mobile apps for foot measurement: A scoping review","volume":"2009","author":"Kabir Muhammad Ashad","year":"2020","unstructured":"Muhammad Ashad Kabir, Sowmen Rahman, Mohammad Mainul Islam, Sayed Ahmed, and Craig Laird. 2020. Mobile apps for foot measurement: A scoping review. CoRR abs\/2009.04198 (2020). arXiv:2009.04198 https:\/\/arxiv.org\/abs\/2009.04198.","journal-title":"CoRR"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00202-2_20"},{"key":"e_1_3_1_30_2","unstructured":"Kaspersky Labs 2020. Mobile malware evolution 2020. (2020). arXiv:https:\/\/securelist.com\/mobile-malware-evolution-2020\/101029."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20174828"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-030-60936-8_22","volume-title":"Similarity Search and Applications","author":"Lang Andreas","year":"2020","unstructured":"Andreas Lang and Erich Schubert. 2020. BETULA: Numerically stable CF-trees for BIRCH clustering. In Similarity Search and Applications. Springer International Publishing, Cham, 281\u2013296."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2019.2919916"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2220543"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03765-w"},{"key":"e_1_3_1_37_2","doi-asserted-by":"crossref","unstructured":"E. Mariconti L. Onwuzurike P. Andriotis E. De Cristofaro G. Ross and G. Stringhini. 2017. MaMaDroid: Detecting Android malware by building Markov chains of behavioral models. (2017).","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1978"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102181"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_7"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114035"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2826225"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2019.000-1"},{"key":"e_1_3_1_44_2","first-page":"729","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating experimental bias in malware classification across space and time. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 729\u2013746. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/pendlebury."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106990"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100358"},{"key":"e_1_3_1_47_2","article-title":"A first look at Android applications in google play related to Covid-19","volume":"2006","author":"Samhi Jordan","year":"2020","unstructured":"Jordan Samhi, Kevin Allix, Tegawend\u00e9 F. Bissyand\u00e9, and Jacques Klein. 2020. A first look at Android applications in google play related to Covid-19. CoRR abs\/2006.11002 (2020). arXiv:2006.11002 https:\/\/arxiv.org\/abs\/2006.11002.","journal-title":"CoRR"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.004"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4121206"},{"key":"e_1_3_1_50_2","article-title":"Eight years of rider measurement in the Android malware ecosystem: Evolution and lessons learned","volume":"1801","author":"Suarez-Tangil Guillermo","year":"2018","unstructured":"Guillermo Suarez-Tangil and Gianluca Stringhini. 2018. Eight years of rider measurement in the Android malware ecosystem: Evolution and lessons learned. CoRR abs\/1801.08115 (2018). arxiv:1801.08115http:\/\/arxiv.org\/abs\/1801.08115.","journal-title":"CoRR"},{"key":"e_1_3_1_51_2","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. (2014). arxiv:cs.CV\/1312.6199."},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.3390\/app8071044"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/IICAIET51634.2021.9573645"},{"key":"e_1_3_1_55_2","unstructured":"VirusTotal Community 2019. Malware datasets. (2019). arXiv:https:\/\/www.virustotal.com\/gui."},{"key":"e_1_3_1_56_2","first-page":"252","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Wei Fengguo","year":"2017","unstructured":"Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep ground truth analysis of current Android malware. In Detection of Intrusions and Malware, and Vulnerability Assessment, Michalis Polychronakis and Michael Meier (Eds.). Springer International Publishing, Cham, 252\u2013276."},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12817-7_44"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.029"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.04.016"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717703116"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0099"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.07.024"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:23Z","timestamp":1750183763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3532091"],"URL":"https:\/\/doi.org\/10.1145\/3532091","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"2021-10-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}