{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:23:21Z","timestamp":1730265801639,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966078","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:41:30Z","timestamp":1499722890000},"page":"1871-1878","source":"Crossref","is-referenced-by-count":80,"title":["Classification of Android apps and malware using deep neural networks"],"prefix":"10.1109","author":[{"given":"Robin","family":"Nix","sequence":"first","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2003.1227801"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.25"},{"key":"ref10","first-page":"69","article-title":"Deep convolutional neural networks for sentiment analysis of short texts","author":"dos santos","year":"2014","journal-title":"COLING"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref12","first-page":"2267","article-title":"Recurrent convolutional neural networks for text classification","author":"lai","year":"2015","journal-title":"AAAI"},{"volume":"abs 1412 1058","journal-title":"Effective use of word order for text categorization with convolutional neural networks","year":"2014","author":"johnson","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.10.011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"journal-title":"Droidnative Semantic-based detection of android native code malware","year":"2016","author":"alam","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2556464.2556467"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.007"},{"journal-title":"Contagio Mobile","year":"0","author":"parkour","key":"ref28"},{"key":"ref4","first-page":"3320","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"2014","journal-title":"Advances in neural information processing systems"},{"journal-title":"Lasagne First Release","year":"2015","author":"dieleman","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref29","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"scikit-learn","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","year":"2014","author":"simonyan","key":"ref8"},{"key":"ref7","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"journal-title":"Lookout security blog","year":"0","author":"wyatt","key":"ref2"},{"journal-title":"Deep residual learning for image recognition","year":"2015","author":"he","key":"ref9"},{"journal-title":"The Statisticain","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"journal-title":"URL code google com\/p\/androguard","article-title":"Androguard-reverse engineering, malware and goodware analysis of android applications","year":"2013","author":"desnos","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7399288"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"journal-title":"T development team","article-title":"Theano: A python framework for fast computation of mathematical expressions","year":"2016","author":"al-rfou","key":"ref26"},{"key":"ref25","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2017,5,14]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966078.pdf?arnumber=7966078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,21]],"date-time":"2017-07-21T05:37:09Z","timestamp":1500615429000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966078","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}