{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T17:04:17Z","timestamp":1766336657123,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DoJ\/NIJ","award":["NIJ 2018-75-CX-0032"],"award-info":[{"award-number":["NIJ 2018-75-CX-0032"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618629, CNS-1814825, CNS-1845138, OAC-1839909 and III-1908215"],"award-info":[{"award-number":["CNS-1618629, CNS-1814825, CNS-1845138, OAC-1839909 and III-1908215"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,3]]},"DOI":"10.1145\/3357384.3357875","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"609-618","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["<i>\u03b1Cyber<\/i>\n            : Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model"],"prefix":"10.1145","author":[{"given":"Shifu","family":"Hou","sequence":"first","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Yujie","family":"Fan","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Jingwei","family":"Lei","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Shenzhen, China"}]},{"given":"Wenqiang","family":"Wan","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Shenzhen, China"}]},{"given":"Jiabin","family":"Wang","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Shenzhen, China"}]},{"given":"Qi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Shenzhen, China"}]},{"given":"Fudong","family":"Shao","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"e_1_3_2_1_2_1","unstructured":"Aleksandar Bojcheski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings. In ICLR .  Aleksandar Bojcheski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings. In ICLR ."},{"key":"e_1_3_2_1_3_1","first-page":"1455","article-title":"Droidcat: Effective android malware detection and categorization via app-level profiling","volume":"14","author":"Cai Haipeng","year":"2019","journal-title":"IEEE TIFS"},{"volume-title":"Towards evaluating the robustness of neural networks","author":"Carlini Nicholas","key":"e_1_3_2_1_4_1"},{"volume-title":"Droideye: Fortifying security of learning-based classifier against adversarial android malware attacks","year":"2018","author":"Chen Lingwei","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial Attack on Graph Structured Data. In PMLR .  Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial Attack on Graph Structured Data. In PMLR ."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Yuxiao Dong Nitesh V Chawla and Ananthram Swami. 2017. metapath2vec: Scalable representation learning for heterogeneous networks. In KDD. ACM 135--144.  Yuxiao Dong Nitesh V Chawla and Ananthram Swami. 2017. metapath2vec: Scalable representation learning for heterogeneous networks. In KDD. ACM 135--144.","DOI":"10.1145\/3097983.3098036"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Yujie Fan Shifu Hou Yiming Zhang Yanfang Ye and Melih Abdulhayoglu. 2018. Gotcha-sly malware! Scorpion: a metagraph2vec based malware detection system. In KDD .  Yujie Fan Shifu Hou Yiming Zhang Yanfang Ye and Melih Abdulhayoglu. 2018. Gotcha-sly malware! Scorpion: a metagraph2vec based malware detection system. In KDD .","DOI":"10.1145\/3219819.3219862"},{"key":"e_1_3_2_1_9_1","unstructured":"Tao-Yang Fu Wang-Chien Lee and Zhen Lei. 2017. HIN2Vec: Explore Meta-paths in Heterogeneous Information Networks for Representation Learning. In CIKM .  Tao-Yang Fu Wang-Chien Lee and Zhen Lei. 2017. HIN2Vec: Explore Meta-paths in Heterogeneous Information Networks for Representation Learning. In CIKM ."},{"key":"e_1_3_2_1_10_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NIPS. 2672--2680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NIPS. 2672--2680."},{"key":"e_1_3_2_1_11_1","unstructured":"William Hardy Lingwei Chen Shifu Hou Yanfang Ye and Xin Li. 2016. DL4MD: A deep learning framework for intelligent malware detection. In DMIN . 61--67.  William Hardy Lingwei Chen Shifu Hou Yanfang Ye and Xin Li. 2016. DL4MD: A deep learning framework for intelligent malware detection. In DMIN . 61--67."},{"volume-title":"Deep4maldroid: A deep learning framework for android malware detection based on linux kernel system call graphs","author":"Hou Shifu","key":"e_1_3_2_1_12_1"},{"volume-title":"Droiddelver: An android malware detection system using deep belief network based on api call blocks","year":"2016","author":"Hou Shifu","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_15_1","first-page":"773","article-title":"A Multimodal Deep Learning Method for Android Malware Detection Using Various Features","volume":"14","author":"Kim TaeGuen","year":"2019","journal-title":"IEEE TIFS"},{"key":"e_1_3_2_1_16_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In ICLR .  Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In ICLR ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Shike Mei and Xiaojin Zhu. 2015. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners. In AAAI. 2871--2877.  Shike Mei and Xiaojin Zhu. 2015. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners. In AAAI. 2871--2877.","DOI":"10.1609\/aaai.v29i1.9569"},{"volume-title":"Madam: Effective and efficient behavior-based android malware detection and prevention. TDSC","year":"2018","author":"Saracino Andrea","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Statcounter. 2019. Mobile Operating System Market Share Worldwide. In http:\/\/gs.statcounter.com\/os-market-share \/mobile\/worldwide .  Statcounter. 2019. Mobile Operating System Market Share Worldwide. In http:\/\/gs.statcounter.com\/os-market-share \/mobile\/worldwide ."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"e_1_3_2_1_21_1","unstructured":"C. Szegedy W. Zaremba I. Sutskever J. Bruna D. Erhan I. Goodfellow and R. Fergus. 2014. Intriguing properties of neural networks. In ICLR .  C. Szegedy W. Zaremba I. Sutskever J. Bruna D. Erhan I. Goodfellow and R. Fergus. 2014. Intriguing properties of neural networks. In ICLR ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"K. Tam S. Khan A. Fattori and L. Cavallaro. 2015. CopperDroid: Automatic Reconstruction of Android Malware Behaviors.. In NDSS .  K. Tam S. Khan A. Fattori and L. Cavallaro. 2015. CopperDroid: Automatic Reconstruction of Android Malware Behaviors.. In NDSS .","DOI":"10.14722\/ndss.2015.23145"},{"volume-title":"Mobile phone security report for the first half of","year":"2018","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Chao Yang Zhaoyan Xu Guofei Gu Vinod Yegneswaran and Phillip Porras. 2014. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. In ESORICS .  Chao Yang Zhaoyan Xu Guofei Gu Vinod Yegneswaran and Phillip Porras. 2014. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. In ESORICS .","DOI":"10.1007\/978-3-319-11203-9_10"},{"key":"e_1_3_2_1_25_1","unstructured":"Yanfang Ye Shifu Hou Lingwei Chen Jingwei Lei Wenqiang Wan Jiabin Wang Qi Xiong and Fudong Shao. 2019. Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection. In IJCAI. 4150--4156.  Yanfang Ye Shifu Hou Lingwei Chen Jingwei Lei Wenqiang Wan Jiabin Wang Qi Xiong and Fudong Shao. 2019. Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection. In IJCAI. 4150--4156."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"e_1_3_2_1_27_1","unstructured":"Quanzeng You Hailin Jin Zhaowen Wang Chen Fang and Jiebo Luo. 2016. Image captioning with semantic attention. In CVPR.  Quanzeng You Hailin Jin Zhaowen Wang Chen Fang and Jiebo Luo. 2016. Image captioning with semantic attention. In CVPR."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD.  Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD.","DOI":"10.24963\/ijcai.2019\/872"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR.  Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR.","DOI":"10.24963\/ijcai.2019\/872"},{"key":"e_1_3_2_1_30_1","unstructured":"Dengyong Zhou Olivier Bousquet Thomas N Lal Jason Weston and Bernhard Sch\u00f6lkopf. 2004. Learning with local and global consistency. In NIPS.  Dengyong Zhou Olivier Bousquet Thomas N Lal Jason Weston and Bernhard Sch\u00f6lkopf. 2004. Learning with local and global consistency. In NIPS."}],"event":{"name":"CIKM '19: The 28th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Beijing China","acronym":"CIKM '19"},"container-title":["Proceedings of the 28th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3357875","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3357875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:43Z","timestamp":1750203883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,3]]},"references-count":30,"alternative-id":["10.1145\/3357384.3357875","10.1145\/3357384"],"URL":"https:\/\/doi.org\/10.1145\/3357384.3357875","relation":{},"subject":[],"published":{"date-parts":[[2019,11,3]]},"assertion":[{"value":"2019-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}