{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:14:55Z","timestamp":1725952495140},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1109\/iwcmc55113.2022.9824985","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T15:32:34Z","timestamp":1658244754000},"page":"572-577","source":"Crossref","is-referenced-by-count":13,"title":["Towards Multi-view Android Malware Detection Through Image-based Deep Learning"],"prefix":"10.1109","author":[{"given":"Jhonatan","family":"Geremias","sequence":"first","affiliation":[{"name":"Pontificia Universidade Catolica do Parana (PUCPR) - Graduate Program in Computer Science (PPGIa),Brazil"}]},{"given":"Eduardo K.","family":"Viegas","sequence":"additional","affiliation":[{"name":"Pontificia Universidade Catolica do Parana (PUCPR) - Graduate Program in Computer Science (PPGIa),Brazil"}]},{"given":"Altair O.","family":"Santin","sequence":"additional","affiliation":[{"name":"Pontificia Universidade Catolica do Parana (PUCPR) - Graduate Program in Computer Science (PPGIa),Brazil"}]},{"given":"Alceu","family":"Britto","sequence":"additional","affiliation":[{"name":"Pontificia Universidade Catolica do Parana (PUCPR) - Graduate Program in Computer Science (PPGIa),Brazil"}]},{"given":"Pedro","family":"Horchulhack","sequence":"additional","affiliation":[{"name":"Pontificia Universidade Catolica do Parana (PUCPR) - Graduate Program in Computer Science (PPGIa),Brazil"}]}],"member":"263","reference":[{"volume-title":"Understanding android users worldwide","year":"2021","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00041"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3417978"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111092"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.034"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685724"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348206"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3264746.3264780"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102718"},{"key":"ref11","article-title":"Dos and don\u2019ts of machine learning in computer security","volume-title":"31st USENIX Security Symposium","author":"Arp","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108618"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IECON43393.2020.9255062"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500259"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3038618"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028370"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969656"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405598"},{"article-title":"DeepFlow: Deep learning-based malware detection by mining android application for ab-normal usage of sensitive data","volume-title":"2017 IEEE Symposium on Computers and Communications (ISCC)","author":"Zhu","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102622"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47765-6"}],"event":{"name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2022,5,30]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9823957\/9824097\/09824985.pdf?arnumber=9824985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T21:40:27Z","timestamp":1706046027000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9824985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iwcmc55113.2022.9824985","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]}}}