{"id":"https://openalex.org/W2700724597","doi":"https://doi.org/10.1109/ccece.2017.7946674","title":"Detection of unknown applications in smartphones: A signal processing perspective","display_name":"Detection of unknown applications in smartphones: A signal processing perspective","publication_year":2017,"publication_date":"2017-04-01","ids":{"openalex":"https://openalex.org/W2700724597","doi":"https://doi.org/10.1109/ccece.2017.7946674","mag":"2700724597"},"language":"en","primary_location":{"id":"doi:10.1109/ccece.2017.7946674","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2017.7946674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021230267","display_name":"Robin Joe Prabhahar Soundar Raja James","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Robin Joe Prabhahar Soundar Raja James","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, CA"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, CA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020679411","display_name":"Abdurhman Albasir","orcid":"https://orcid.org/0000-0002-1307-0273"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Abdurhman Albasir","raw_affiliation_strings":["University of Waterloo"],"affiliations":[{"raw_affiliation_string":"University of Waterloo","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087692639","display_name":"Kshirasagar Naik","orcid":"https://orcid.org/0000-0002-1064-4905"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kshirasagar Naik","raw_affiliation_strings":["University of Waterloo"],"affiliations":[{"raw_affiliation_string":"University of Waterloo","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047062425","display_name":"Mohamed-Yahia Dabbagh","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohamed-Yahia Dabbagh","raw_affiliation_strings":["University of Waterloo"],"affiliations":[{"raw_affiliation_string":"University of Waterloo","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108630549","display_name":"Prajna Paramita Dash","orcid":"https://orcid.org/0009-0005-1027-4202"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Prajna Dash","raw_affiliation_strings":["University of Waterloo"],"affiliations":[{"raw_affiliation_string":"University of Waterloo","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041665428","display_name":"Marzia Zaman","orcid":"https://orcid.org/0000-0002-0610-0470"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marzia Zaman","raw_affiliation_strings":["Sanstream Technology"],"affiliations":[{"raw_affiliation_string":"Sanstream Technology","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103566397","display_name":"Nishith Goel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nishith Goel","raw_affiliation_strings":["Cistech Ltd"],"affiliations":[{"raw_affiliation_string":"Cistech Ltd","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5021230267"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9246,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75050024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8333481550216675},{"id":"https://openalex.org/keywords/power-consumption","display_name":"Power consumption","score":0.6959433555603027},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6577037572860718},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.6158044338226318},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.612430989742279},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5319144129753113},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5169093608856201},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5023279190063477},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.47509849071502686},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.4583775997161865},{"id":"https://openalex.org/keywords/consumption","display_name":"Consumption (sociology)","score":0.4202912151813507},{"id":"https://openalex.org/keywords/signal-processing","display_name":"Signal processing","score":0.41664111614227295},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.41055455803871155},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.3486206829547882},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2698144018650055},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.24545416235923767},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2057299017906189},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13094037771224976},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09081214666366577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8333481550216675},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.6959433555603027},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6577037572860718},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.6158044338226318},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.612430989742279},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5319144129753113},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5169093608856201},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5023279190063477},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.47509849071502686},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.4583775997161865},{"id":"https://openalex.org/C30772137","wikidata":"https://www.wikidata.org/wiki/Q5164762","display_name":"Consumption (sociology)","level":2,"score":0.4202912151813507},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.41664111614227295},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41055455803871155},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.3486206829547882},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2698144018650055},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.24545416235923767},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2057299017906189},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13094037771224976},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09081214666366577},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccece.2017.7946674","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2017.7946674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8600000143051147}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1526009812","https://openalex.org/W1963971515","https://openalex.org/W2032724464","https://openalex.org/W2118840832","https://openalex.org/W2141224535","https://openalex.org/W2319817292","https://openalex.org/W2554125638","https://openalex.org/W2575803463","https://openalex.org/W2933096895","https://openalex.org/W6641190993"],"related_works":["https://openalex.org/W4210376836","https://openalex.org/W4210925376","https://openalex.org/W1633995705","https://openalex.org/W2596211269","https://openalex.org/W2360384790","https://openalex.org/W4232397253","https://openalex.org/W4235913033","https://openalex.org/W2109284253","https://openalex.org/W2039966832","https://openalex.org/W2359819289"],"abstract_inverted_index":{"Different":[0],"applications":[1,78,149],"in":[2,5,39,150,184,187],"smartphones":[3,151],"result":[4],"different":[6,148],"power":[7,41,48,82,109,144],"consumption":[8,42,49,83,110,145],"patterns.":[9],"The":[10,98,179],"fact":[11],"that":[12,26,75,90,104,135],"every":[13,27],"application":[14,56],"has":[15],"been":[16],"coded":[17],"to":[18,23,72,152,175],"perform":[19],"certain":[20],"tasks":[21],"leads":[22],"the":[24,40,44,54,59,94,108,127,143,177],"claim":[25,74],"action":[28],"on-board":[29],"(whether":[30],"software":[31],"or":[32],"hardware)":[33],"will":[34],"consequently":[35],"have":[36,80,92],"a":[37,113,130,166],"trace":[38],"of":[43,58,61,112,125,147,168],"smartphone.":[45],"However,":[46],"similar":[47,81],"patterns":[50,84],"are":[51,65],"observed":[52],"for":[53],"same":[55,95],"irrespective":[57],"types":[60],"operating":[62],"system":[63],"they":[64,91],"executed":[66],"on.":[67],"Therefore,":[68],"it":[69,86],"is":[70,87,103],"safe":[71],"further":[73],"no":[76],"two":[77],"can":[79,120],"as":[85],"highly":[88],"unlikely":[89],"exactly":[93],"source":[96],"code.":[97],"idea":[99],"behind":[100],"this":[101,162],"work":[102],"by":[105],"analyzing":[106],"only":[107],"signals":[111,146],"smartphone,":[114],"valuable":[115],"information":[116],"regarding":[117],"its":[118],"operation":[119],"be":[121],"revealed.":[122],"In":[123,161],"view":[124],"this,":[126],"authors":[128],"propose":[129],"systematic":[131],"and":[132,154],"generic":[133],"methodology":[134],"involves":[136],"performing":[137],"some":[138,172],"signal":[139],"processing":[140],"techniques":[141],"on":[142],"detect":[153],"separate":[155],"unknown":[156],"activities/applications":[157],"from":[158],"known":[159],"ones.":[160],"work,":[163],"we":[164],"present":[165],"proof":[167],"concept":[169],"supported":[170],"with":[171],"test":[173],"cases":[174],"validate":[176],"approach.":[178],"preliminary":[180],"results":[181],"hold":[182],"promise":[183],"detecting":[185],"malware":[186],"smartphones.":[188]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
