{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:11:44Z","timestamp":1757589104518},"publisher-location":"California","reference-count":0,"publisher":"International Joint Conferences on Artificial Intelligence Organization","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>To combat the evolving Android malware attacks, in this paper, instead of only using Application Programming Interface (API) calls, we further analyze the different relationships between them and create higher-level semantics which require more efforts for attackers to evade the detection. We represent the Android applications (apps), related APIs, and their rich relationships as a structured heterogeneous information network (HIN). Then we use a meta-path based approach to characterize the semantic relatedness of apps and APIs. We use each meta-path to formulate a similarity measure over Android apps, and aggregate different similarities using multi-kernel learning to make predictions. Promising experimental results based on real sample collections from Comodo Cloud Security Center demonstrate that our developed system HinDroid outperforms other alternative Android malware detection techniques.<\/jats:p>","DOI":"10.24963\/ijcai.2018\/737","type":"proceedings-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T01:49:10Z","timestamp":1530755350000},"page":"5279-5283","source":"Crossref","is-referenced-by-count":14,"title":["Make Evasion Harder: An Intelligent Android Malware Detection System"],"prefix":"10.24963","author":[{"given":"Shifu","family":"Hou","sequence":"first","affiliation":[{"name":"Department of CSEE, West Virginia Univerisity, WV, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of CSEE, West Virginia Univerisity, WV, USA"}]},{"given":"Yangqiu","family":"Song","sequence":"additional","affiliation":[{"name":"Department of CSE, Hong Kong University of Science and Technology, Hong Kong"}]},{"given":"Melih","family":"Abdulhayoglu","sequence":"additional","affiliation":[{"name":"Comodo Security Solutions, Inc., Clifton, NJ, USA"}]}],"member":"10584","event":{"number":"27","sponsor":["International Joint Conferences on Artificial Intelligence Organization (IJCAI)"],"acronym":"IJCAI-2018","name":"Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}","start":{"date-parts":[[2018,7,13]]},"theme":"Artificial Intelligence","location":"Stockholm, Sweden","end":{"date-parts":[[2018,7,19]]}},"container-title":["Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence"],"original-title":[],"deposited":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T01:55:38Z","timestamp":1530755738000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ijcai.org\/proceedings\/2018\/737"}},"subtitle":[],"proceedings-subject":"Artificial Intelligence Research Articles","short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":0,"URL":"https:\/\/doi.org\/10.24963\/ijcai.2018\/737","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}