{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:49:15Z","timestamp":1759693755997},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,3,1]]},"DOI":"10.1587\/transinf.2021edp7133","type":"journal-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T22:25:00Z","timestamp":1646087100000},"page":"656-666","source":"Crossref","is-referenced-by-count":2,"title":["Android Malware Detection Based on Functional Classification"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Wenhao","family":"FAN","sequence":"first","affiliation":[{"name":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Dong","family":"LIU","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Fan","family":"WU","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Bihua","family":"TANG","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Yuan'an","family":"LIU","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] D. Arp, M. Spreitzenbarth, M. H\u00fcbner, H. Gascon, and K. Rieck, \u201cDrebin: Effective and explainable detection of android malware in your pocket,\u201d Network &amp; Distributed System Security Symposium, 2014. 10.14722\/ndss.2014.23247","DOI":"10.14722\/ndss.2014.23247"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, and H. Ye, \u201cSignificant permission identification for machine-learning-based android malware detection,\u201d IEEE Trans. Industr. Inform., vol.14, no.7, pp.3216-3225, 2018. 10.1109\/tii.2017.2789219","DOI":"10.1109\/TII.2017.2789219"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] F. Idrees and M. Rajarajan, \u201cInvestigating the android intents and permissions for malware detection,\u201d IEEE International Conference on Wireless &amp; Mobile Computing, pp.354-358, 2014. 10.1109\/wimob.2014.6962194","DOI":"10.1109\/WiMOB.2014.6962194"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] S. Liang and X. Du, \u201cPermission-combination-based scheme for android mobile malware detection,\u201d IEEE International Conference on Communications, pp.2301-2306, 2014. 10.1109\/icc.2014.6883666","DOI":"10.1109\/ICC.2014.6883666"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] N. Peiravian and X. Zhu, \u201cMachine learning for android malware detection using permission and API calls,\u201d 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pp.300-305, 2013. 10.1109\/ictai.2013.53","DOI":"10.1109\/ICTAI.2013.53"},{"key":"6","unstructured":"[6] D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, \u201cDroidMat: Android malware detection through manifest and API calls tracing,\u201d 2012 Seventh Asia Joint Conference on Information Security, pp.62-69, 2012. 10.1109\/asiajcis.2012.18"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N. Sheth, \u201cTaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones,\u201d ACM Trans. Comput. Syst., vol.32, no.2, Article No.5, 2014. 10.1145\/2619091","DOI":"10.1145\/2619091"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] X. Xiao, S. Zhang, F. Mercaldo, G. Hu, and A.K. Sangaiah, \u201cAndroid malware detection based on system call sequences and LSTM,\u201d Multimedia Tools and Applications, vol.78, no.4, pp.3979-3999, 2019. 10.1007\/s11042-017-5104-0","DOI":"10.1007\/s11042-017-5104-0"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Z. Ni, M. Yang, Z. Ling, J.-N. Wu, and J. Luo, \u201cReal-time detection of malicious behavior in android apps,\u201d 2016 International Conference on Advanced Cloud and Big Data (CBD), pp.221-227, 2017. 10.1109\/cbd.2016.046","DOI":"10.1109\/CBD.2016.046"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Y. Aafer, W. Du, and H. Yin, \u201cDroidAPIMiner: Mining API-level features for robust malware detection in android,\u201d International Conference on Security and Privacy in Communication Systems, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol.127, pp.86-103, 2013. 10.1007\/978-3-319-04283-1_6","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] H.-J. Zhu, Z.-H. You, Z.-X. Zhu, W.-L. Shi, X. Chen, and L. Cheng, \u201cDroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model,\u201d Neurocomputing, vol.272, pp.638-646, 2018. 10.1016\/j.neucom.2017.07.030","DOI":"10.1016\/j.neucom.2017.07.030"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] S.Y. Yerima and S. Sezer, \u201cDroidFusion: A novel multilevel classifier fusion approach for android malware detection.,\u201d IEEE Trans. Cybern., vol.49, no.2, pp.453-466, 2017. 10.1109\/TCYB.2017.2777960","DOI":"10.1109\/TCYB.2017.2777960"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] D.P. Gaikwad and R.C. Thool, \u201cIntrusion detection system using bagging with partial decision treebase classifier,\u201d Procedia Computer Science, vol.49, pp.92-98, 2015. 10.1016\/j.procs.2015.04.231","DOI":"10.1016\/j.procs.2015.04.231"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] Z. Wang, J. Cai, S. Cheng, and W. Li, \u201cDroidDeepLearner: Identifying android malware using deep learning,\u201d 2016 IEEE 37th Sarnoff Symposium, pp.160-165, 2016. 10.1109\/SARNOF.2016.7846747","DOI":"10.1109\/SARNOF.2016.7846747"},{"key":"15","unstructured":"[15] Apktool, https:\/\/ibotpeaches.github.io\/apktool\/, 2019."},{"key":"16","unstructured":"[16] Android Developers, http:\/\/developer.android.com\/guide\/components\/fundamentals.html, 2019."},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] W. Wang, Y. Li, X. Wang, J. Liu, and X. Zhang, \u201cDetecting android malicious apps and categorizing benign apps with ensemble of classifiers,\u201d Future Generation Computer Systems, vol.78, pp.987-994, 2018. 10.1016\/j.future.2017.01.019","DOI":"10.1016\/j.future.2017.01.019"},{"key":"18","unstructured":"[18] P. Lam, E. Bodden, L. Hendren, and T.U. Darmstadt, \u201cThe soot framework for java program analysis: A retrospective,\u201d 2011."},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y.L. Traon, D. Octeau, and P. McDaniel, \u201cFlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps,\u201d ACM Sigplan Notices, vol.49, no.6, pp.259-269, 2014. 10.1145\/2666356.2594299","DOI":"10.1145\/2666356.2594299"},{"key":"20","unstructured":"[20] A. Swami and R. Jain, \u201cScikit-learn: Machine learning in python,\u201d Journal of Machine Learning Research, vol.12, no.10, pp.2825-2830, 2013."},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] K. Sokolova, C. Perez, and M. Lemercier, \u201cAndroid application classification and anomaly detection with graph-based permission patterns,\u201d Decision Support Systems, vol.93, pp.62-76, 2017. 10.1016\/j.dss.2016.09.006","DOI":"10.1016\/j.dss.2016.09.006"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] M.R. Hamedani, D. Shin, M. Lee, S.-J. Cho, and C. Hwang, \u201cAndroClass: An effective method to classify android applications by applying deep neural networks to comprehensive features,\u201d Wireless Communications &amp; Mobile Computing, vol.2018, pp.1-21, 2018. 10.1155\/2018\/1250359","DOI":"10.1155\/2018\/1250359"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] F. Idrees, M. Rajarajan, M. Conti, T.M. Chen, and Y. Rahulamathavan, \u201cPIndroid: A novel android malware detection system using ensemble learning methods,\u201d Computers &amp; Security, vol.68, pp.36-46, 2017. 10.1016\/j.cose.2017.03.011","DOI":"10.1016\/j.cose.2017.03.011"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/3\/E105.D_2021EDP7133\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T03:58:14Z","timestamp":1646452694000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/3\/E105.D_2021EDP7133\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021edp7133","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]},"article-number":"2021EDP7133"}}