{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,9,23]],“日期-时间”:“2024-09-23T04:17:53Z”,“时间戳”:1727065073397},“参考-计数”:115,“出版商”:“电气与电子工程师学会(IEEE)”,“许可证”:[{“开始”:}“日期-零件”:[2020,1]],”日期-时间“:”2020-01-01 01T00:00:00Z“,“timestamp”:1577836800000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode”}],“funder”:[{“DOI”:“10.13039\/501100001809”,“name”:“国家自然科学基金”,“DOI-asserted-by”:“publisher”,“award”:[“61802171”,”“61772014”],“id”:[}“id”10.13039\/501100001809“,”身份类型“:”DOI“,“asserted-by”:“publisher”}]},{“DOI”:“10.13039\/501100012226”,“name”:“中央高校基本科研业务费”,“DOI-asserted-by”:”publisher“,”award“:[”021714380017“],“id”:[{“id”:“10.13029\/50110012226”,”id-type“:”DOI“,”asserted-py“:”publiser“}]},{”DOI:“10.130039\/5010001246”,“name”:“南京大学新软件技术国家重点实验室开放基金会”,“doi-asserted-by”:“publisher”,“award”:[“ZZKT2017B09”],“id”:[{“id”:“10.13039\/501100011246”,“id-type”:“doi”,“asserted-by”:“publisher”}]],“content-domain”:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[”IEEE Access“],“published-print”:{“日期部分”:[[2020]]},“DOI”:“10.1109\/access.2020.3002842”,“类型”:“期刊文章”,“已创建”:{“日期部分”:[[2020,6,16]],“日期时间”:“2020-06-16T21:07:06Z”,“时间戳”:1592341626000},“页面”:“116363-116379”,“来源”:“Crossref”,“按计数引用”:95,“标题”:[“使用静态分析的Android恶意软件检测的系统文献综述”],“前缀”:“10.1109”,“卷”:“8”,“作者”:[{“给定”:“雅”,“家族”:“潘”,“序列”:“第一”,“从属关系”:[]},{“ORCID”:“http://\/ORCID.org\/00000-0002-0289-7291”,“authenticated-ORCID”:false,“给定”:“秀亭”,“家庭”:“葛”,“顺序”:“附加”,“附属关系”:[]}/0000-0002-9930-7111“,”authenticated-ORCID“:假,”给定“:“春荣”,“家族”:“方”,“序列”:“附加”,“隶属关系”:[]},{“给定”:“勇”,“家族”:“范”,“序列”:“附加”,“隶属关系”:[]},“成员”:“263”,“引用”:[{“密钥”:“ref39”,“doi断言者”:“publisher”,“doi”:“10.1007\\s12652-018-0803-6”},{“密钥”:“ref38”,“doi断言者”:“publisher”,“doi”:“10.1007\\s10 664-014-9352-6“},{“键”:“参考文献33”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/AsiaJCIS.2016.29”},{“key”:“ref32”,“doo-asserted-by”:”publisher“,”doi“:”10.1109\/TST.2016.7399288“},”{“key”:”ref31“,”doi-assert-by“:”publister“,”doi“:doi“:”10.1109\/ACCESS.2018.2792941“},{“键”:“参考37”,“首页”:“11”,“article-title”:“Android恶意软件的轻量级、抗混淆检测和家族识别”,“volume”:“26”,“author”:“garcia”,“year”:“2016”,“journal-title“:”ACM Trans-Softw Eng Methodol“},{“key”:”ref36“,“doi-asserted-by”:“publisher”,“doi”:“10.1155\/2017\/6451260”},“key“:”ref35“,”doi-assert-by“:”publisher“,”doi“:“10.14722\/ndss.2014.23247”},{“key”:“ref34”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/MALWARE.2016.7888731”}“},{”key“:”ref29“,”doi-asserted-by“:”publisher“,”doi“:“10.1016\/j.neucom.2017.07.030”},{“key”:“ref20”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TIFS.2018.2806891”}5“},{”key“:”ref24“,”doi-asserted-by“:”publisher“,”doi“:“10.1016\/j.future.2017.01.019”},{“key”:“ref23”,“doi-asserted-by”:“publisher”,“doi”:“10.116\/j.ins.2018.04.092”}、{“密钥”:“ref101”、“doi-aserted-by“:”publisher“,”doi“:”10.1109\/TMC.2018.2861405“},“key“:”ref26“,”首页“:”“1”,“author”:“galingani”,“year”:“2015”,“journal”al标题“:“静态检测和自动利用Android应用程序中的意图消息漏洞”},{“key”:“ref100”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3331453.3361306”},{“key”:“ref51”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/MALWARE.2016.7888730”},{“key”:“ref59”,“doi-assertd-by”:“publisher”,“DI:”10.1109\/TIFS.2016.2523912 y“:”publisher“,”doi“:”10.1109\/TDSC.2014.2355839“},{”key“:”ref56“,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.cose.2017.11.007”},{“key”:“ref55”,“doi-asserted-by”:”publisher“,”doi“:”10.1007\/s00521-018-3726-4“},}“key”:”ref54“,”doi-assert-by“:”publicher“,”doi“:“,”doi“:”10.1016\/j.cose.2017.03.011“},{”key“:”ref52“,”doi-asserted-by“:“publisher”,“DOI”:“10.1145\/313460.3134636”},{“key”:“ref40”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1109\/SARNOF.2016.7846747“},}“key:”ref4“,”first page“:”1“,”article-title“:”ScanDal:用于检测Android应用程序中隐私泄漏的静态分析器“,”volume“:“12”,“author”:“kim”,“year”:“2012”,“journal-title”:“Most”},{“键”:“参考3”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1653662.1653691”},{“key”:“ref6”,“doo-asserted-by”:”publisher“,”doi“:”10.1093\/comjnl\/bxu148“},“key“:”ref5“,”doi-assert-by“:”publister“,”doi“:“10.1109\/ICSE.2015.48”}“:”10.1007\/978-3-319-45719-2_15“},{”key“:”ref49“,”doi-asserted-by“:”publisher“,”doi“:“10.1155\/2018\/8087303”},{“key”:“ref7”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/COMST.2014.2386139”},{“key”:“ref45”,“doi-asserted-by”:“publisher”,“doi”:“10.1155\/2018\/5749481”},{“key”:“ref48”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TIFS.2018.2824250”},{“key”:”ref47“,”doi-assert-by“:”publisher“,”doi“:”10.1007\/978-3319-66399-9_4由“:”publisher“,”doi“:”10.1631\/FITEE.1601491“}插入,{”key“:”ref44“、“doi-asserted-by”:“publisher”,“doi”:“10.1049\/iet-ifs.2015.0211”},{“key”:“ref43”,“doi-sserted-by“:”publisher“,”doi“:”10.1016\/j.infsof.2017.04.007“},”{“key”:“ref73”,“doi-assertd-by”:“publisher”,“DI:”10.1186\/s13635-017-0059-2,“doi”:“10.1109\/ACCESS.2018.2870534”},{“key”:“ref71”,“doi-asserted-by”:“publisher”,“DOI”:“10.1002\/sec.1600”},{“key”:“ref70”,“首页”:“1”,“article-title”:“Opseq:Android恶意软件指纹”,“author”:“ali-gombe”,”年份“:“2016”,“journal-title“:”Proc 5th Program Protection Reverse Eng Workshop“},”{“密钥”:“ref76”,“DOI-asserted-by”:“publider”,“DI:”10.1007\/s1127-018-5982-0“}”,{”key:“ref77”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1016\/j.cose.2016.01.008”},{“key”:“ref74”,“首页”:“438”,“article-title”:“DeepFlow:通过挖掘Android应用程序对异常使用的敏感数据进行基于深度学习的恶意软件检测”,“author”:“zhu”,“year”:“2017”,“journal-title“:”Proc IEEE Symp Compute Commun(ISCC),“DOI”:“10.1016\/j.cose.2018.02.006”},{“key”:“ref78”,“DOI-asserted-by”:“publisher”,“DOI:”10.1145\/2635868.2635869“},”{“key”:”ref79“,”DOI-assert-by“:”publisher“,”DOI“:”10.1145 \/2660267.2660359“}56386“},{”key“:”ref62“,”DOI-asserted-by“:”publisher“,”DOI“:“10.1007\/s11704-017-6493-y”},{“key”:“ref61”,“doi-asserted-by”:“publisher”,“doi”:“10.107\/s00521-017-2914-y”}.,{”key“:”ref63“,”doi-assert-by“:”publisher“,”doi“:”10.1016\/j.diin.2018.01.007“},{”key“:”ref65“,”doi-asserted-by“:”publisher“,”doi“:“10.1109\/TSUSC.2018.2809665”},{“key”:“ref66”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3029806.3029823”}、{“密钥”:“ref67”,“doi-asserte-by”:“publisher”、“doi“:”10.1109\/ACCESC.2018.2864871“},}“key”:“res68”、“doi-aserted-by“:”publisher“,”doi“:”10.1109 \/MSR.2015.38“},{“key”:“ref2”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SP.2012.16”},{:“ref69”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.cose.2016.04.009”},{“key”:“ref1”,“doi-assertd-by”:“publisher”,“DI:”10.1145\/2133601.2133640 y“:”publisher“,”doi“:”10.1109\/QRS-C.2019.00027“},{”key“:”ref108“,“doi断言者”:“publisher”,“doi”:“10.1109\/TSE.2018.28434344”},{“key”:“ref94”,“doi断言者”:“publisher”,“doi”:“10.1016\/j.cose.2018.10.001”},{“key”:“ref107”,“doi断言者”:“publisher”,“doi”:“10.1109\/ACCESS.20192951751”},{“key”:“ref93”,“doi断言者”:“publisher”,“doi”:“10.1145\/327280.3297396“},{”key“:”ref106“,”doi断言者“:“publisher”,“DOI”:“10.1109\/ICSE.2019.00085”},{“key”:“ref92”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1109\/TIFS.2018.2866319“},}“key:”ref105“,”DOI-assert-by“:”publisher“,”DOI“:”10.1145\/330061.3345452“}.2019.2896003“},{”key“:”ref104“,”DOI-asserted-by“:”publisher“,”DOI“:“10.1145\/3300061.3345452”},{“key”:“ref90”,“首页”:“138”,“article-title”:“战争的艺术:二进制分析中的进攻性技术”,“author”:“yan”,”year“:“2016”,“journal-title“:”Proceedings of Security and Privacy“},”{“key”:”ref103“,”doi-asserted-by“:”publisher“,”doi“:”10.1016\/j.cose.2019.04.004“}”,{”key“:”ref102“,”doi-asserted by“:”publisher“,“DOI”:“10.1109\/TASE.2019.00-20”},{“key”:“ref111”,“DOI-asserted-by”:“publisher”,“DOI:”10.1109\/ICNC.2019.8685502“},“key“:”ref112“,”DOI-assert-by“:”publisher“,”DOI“:”10.1016\/j.comnet.2019.107026.5308“},{“key”:“ref98”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1111\/exsy.12468”},{“key”:“ref99”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.cose.2019.101573”},{“key”:”ref96“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/ACCES.2019.2919796“},”key“:”ref97“,”doi-asserted-by“由“:”publisher“,”doi“:”10.1016\/j.infsof.2017.04.001“}插入,{”key“:”ref11“、“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ARES.2015.57”},{“key”:“ref12”,“doi-sserted-by“:”publisher“,”doi“:”10.1145\/1134285.1134500“},”{“key”:“ref13”,“doi-assertd-by”:“publisher”,“DI:”10.1007\/978-981-10-8848-3_26 I“:”10.1007\/s10664-005-3861-2“},{“key”:“ref15”,“doi-asserted-by”:“publisher”,“DOI”:“10.1016\/j.cose.2016.11.007”},{“key”:“ref16”,“DOI-asserted-by”:“publisher”,“DOI:”10.1049\/iet-ifs.2014.0099“},“key“:”ref82“,”DOI-assert-by“:”publisher“,2014.6883436“},{“key”:“ref81”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1145\/2660267.2660357”},{“key”:“ref18”,“doi-asserted-by”:“publisher”,“doi”:“10.1155\/2018\/5249190”},“doi-asserted-by”:“publisher”,“doi”:“10.1145\/2666356.2594299”},{“key”:“ref83”,“doi-asserted-by”:”publisher“,”doi“:”10.1109\/ACCESS.2017.2720160“},“key“:”ref114“,“doiasserted-by I“:”10.1016\/j.future.2019.11.034“},{”key“:”ref80“,”doi-asserted-by“:“publisher”,“DOI”:“10.1109\/TSA.2014.10”},{“key”:“ref115”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1504\/IJESDF.2018.090948“},}“key”:”ref89“,“doo-asserted-by”:”publisher“,”DOI“:”10.1109\/IJCNN.2016.7727817“}”,{”key“:”ref85“,”DOI-assert-by“:”publicher“,”DOI“:\/CyberC.2017.36“},{”key“:”ref86“,”first-page“:”77“,”article-title“:“Android:从反向编译到反编译”,“author”:“desnos”,“year”:“2011”,“journal-title”:“Black Hat Abu Dhabi”},{“key”:“ref87”,“doi-sserted-by”:“publisher”,“doi”:“10.1016\/j.asoc.2014.11.023”}“],”original-title“:[],”link“:[{”URL“:“http://\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09118907.pdf?arnumber=9118907”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,1,12]],“date-time”:”2022-01-12T01:08:38Z“,“timestamp”:1641949718000},“score”:1,“resource”:{“primary”(主要):{“URL”(URL):“https:\/\/ieeexplore.iee.org\/document\/9118907\/”}},“副标题”:[],“短标题”:[],“发布”:{“日期-部件”:[[2020]]}36“,”type“:”electronic“}],”subject“:[],”published“:{”date-parts“:[[2020]]}}}