{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:01:27Z","timestamp":1726851687685},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19A2068","62032002","62101358"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2020M683345"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012842","name":"Joint Innovation Fund of Sichuan University and Nuclear Power Institute of China","doi-asserted-by":"publisher","award":["HG2022143"],"id":[{"id":"10.13039\/100012842","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan University-Dazhou People\u2019s Government Strategic Cooperation Special Fund Project","award":["2022CDDZ-10"]},{"name":"Foundation Research Funds for the Central Universities","award":["SCU2021D052"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3287395","type":"journal-article","created":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:53:35Z","timestamp":1687197215000},"page":"3977-3990","source":"Crossref","is-referenced-by-count":14,"title":["Comprehensive Android Malware Detection Based on Federated Learning Architecture"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2100-4794","authenticated-orcid":false,"given":"Wenbo","family":"Fang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"given":"Junjiang","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"given":"Wenshan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3483-1710","authenticated-orcid":false,"given":"Xiaolong","family":"Lan","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5302-3180","authenticated-orcid":false,"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7625-5689","authenticated-orcid":false,"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing and the Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"}]},{"given":"Linlin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Software, Xinjiang University, Ürümqi, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102514"},{"key":"ref12","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2016","journal-title":"Proc 20th Int Conf Artifi Intell Stat (ICAIS)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3062-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102086"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3088938"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3043458"},{"key":"ref11","year":"2018","journal-title":"REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS50894.2020.00031"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100755"},{"key":"ref2","year":"2022","journal-title":"Android malware An underestimated problem"},{"key":"ref1","year":"2022","journal-title":"Mobile Operating System Market Share Worldwide"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100102"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2778147"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3056341"},{"key":"ref24","year":"2016","journal-title":"The Future of Mobile Malware"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.32"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3467981"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991401"},{"key":"ref42","article-title":"Flower: A friendly federated learning research framework","author":"beutel","year":"2020","journal-title":"arXiv 2007 14390"},{"key":"ref41","year":"2018","journal-title":"Contagio Dataset"},{"key":"ref22","first-page":"1","article-title":"Immune-based intrusion detection system: A general framework","author":"dasgupta","year":"1999","journal-title":"Proc 22nd Nat Inf Syst Secur Conf (NISSC)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3098259"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3161943"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3107783"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631434"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02450-5_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3299819.3299834"},{"key":"ref4","year":"2021","journal-title":"Flubot Malware—All You Need to Know & to Act Now"},{"key":"ref3","article-title":"DroidMorph: Are we ready to stop the attack of Android malware clones?","author":"alam","year":"2021","journal-title":"arXiv 2106 09218"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433204"},{"key":"ref40","year":"2020","journal-title":"Canadian Institute for Cybersecurity"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10155173.pdf?arnumber=10155173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T17:28:32Z","timestamp":1690824512000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10155173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3287395","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}