{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:40:34Z","timestamp":1766137234037},"publisher-location":"California","reference-count":0,"publisher":"International Joint Conferences on Artificial Intelligence Organization","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"abstract":"<jats:p>The increasingly sophisticated Android malware calls for new defensive techniques that are capable of protecting mobile users against novel threats. In this paper, we first extract the runtime Application Programming Interface (API) call sequences from Android apps, and then analyze higher-level semantic relations within the ecosystem to comprehensively characterize the apps. To model different types of entities (i.e., app, API, device, signature, affiliation) and rich relations among them, we present a structured heterogeneous graph (HG) for modeling. To efficiently classify nodes (e.g., apps) in the constructed HG, we propose the HG-Learning method to first obtain in-sample node embeddings and then learn representations of out-of-sample nodes without rerunning\/adjusting HG embeddings at the first attempt. We later design a deep neural network classifier taking the learned HG representations as inputs for real-time Android malware detection. Comprehensive experiments on large-scale and real sample collections from Tencent Security Lab are performed to compare various baselines. Promising results demonstrate that our developed system AiDroid which integrates our proposed method outperforms others in real-time Android malware detection.<\/jats:p>","DOI":"10.24963\/ijcai.2019\/576","type":"proceedings-article","created":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T03:46:05Z","timestamp":1564285565000},"page":"4150-4156","source":"Crossref","is-referenced-by-count":35,"title":["Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection"],"prefix":"10.24963","author":[{"given":"Yanfang","family":"Ye","sequence":"first","affiliation":[{"name":"Department of CDS, Case Western Reserve University, OH, USA"},{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[{"name":"Department of CDS, Case Western Reserve University, OH, USA"},{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Lingwei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Jingwei","family":"Lei","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Tencent, Guangdong, China"}]},{"given":"Wenqiang","family":"Wan","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Tencent, Guangdong, China"}]},{"given":"Jiabin","family":"Wang","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Tencent, Guangdong, China"}]},{"given":"Qi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Tencent, Guangdong, China"}]},{"given":"Fudong","family":"Shao","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Tencent, Guangdong, China"}]}],"member":"10584","event":{"number":"28","sponsor":["International Joint Conferences on Artificial Intelligence Organization (IJCAI)"],"acronym":"IJCAI-2019","name":"Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}","start":{"date-parts":[[2019,8,10]]},"theme":"Artificial Intelligence","location":"Macao, China","end":{"date-parts":[[2019,8,16]]}},"container-title":["Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence"],"original-title":[],"deposited":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T03:50:14Z","timestamp":1564285814000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ijcai.org\/proceedings\/2019\/576"}},"subtitle":[],"proceedings-subject":"Artificial Intelligence Research Articles","short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":0,"URL":"https:\/\/doi.org\/10.24963\/ijcai.2019\/576","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}