{"id":"https://openalex.org/W4224925642","doi":"https://doi.org/10.1109/tifs.2022.3172213","title":"Smart App Attack: Hacking Deep Learning Models in Android Apps","display_name":"Smart App Attack: Hacking Deep Learning Models in Android Apps","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4224925642","doi":"https://doi.org/10.1109/tifs.2022.3172213"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3172213","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3172213","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015539236","display_name":"Yujin Huang","orcid":"https://orcid.org/0000-0003-2281-2504"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yujin Huang","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075639297","display_name":"Chunyang Chen","orcid":"https://orcid.org/0000-0003-2011-9618"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chunyang Chen","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015539236"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":2.6746,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.90274735,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"1827","last_page":"1840"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8575562238693237},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7554988861083984},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7014580965042114},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6421375274658203},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6048056483268738},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.580464243888855},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5694308876991272},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5654315948486328},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4702818691730499},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.45573198795318604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3701271414756775},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.27331221103668213}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8575562238693237},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7554988861083984},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7014580965042114},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6421375274658203},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6048056483268738},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.580464243888855},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5694308876991272},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5654315948486328},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4702818691730499},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.45573198795318604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3701271414756775},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27331221103668213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3172213","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3172213","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W1647671624","https://openalex.org/W1945616565","https://openalex.org/W2108598243","https://openalex.org/W2117876524","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2302255633","https://openalex.org/W2408141691","https://openalex.org/W2533598788","https://openalex.org/W2537189671","https://openalex.org/W2603766943","https://openalex.org/W2610305199","https://openalex.org/W2746600820","https://openalex.org/W2775795276","https://openalex.org/W2808423829","https://openalex.org/W2893099989","https://openalex.org/W2897865027","https://openalex.org/W2902663943","https://openalex.org/W2903650079","https://openalex.org/W2963070423","https://openalex.org/W2963163009","https://openalex.org/W2963857521","https://openalex.org/W2969546126","https://openalex.org/W2975763460","https://openalex.org/W2981207549","https://openalex.org/W2981744998","https://openalex.org/W2996458309","https://openalex.org/W3012470135","https://openalex.org/W3015445190","https://openalex.org/W3015625436","https://openalex.org/W3080797848","https://openalex.org/W3081141044","https://openalex.org/W3098703033","https://openalex.org/W3101903411","https://openalex.org/W3106412272","https://openalex.org/W3107235539","https://openalex.org/W3116074996","https://openalex.org/W3118608800","https://openalex.org/W3135939397","https://openalex.org/W3140030527","https://openalex.org/W3160456797","https://openalex.org/W3163168187","https://openalex.org/W3163672235","https://openalex.org/W3210511094","https://openalex.org/W4287719151","https://openalex.org/W4287905974","https://openalex.org/W4297775537","https://openalex.org/W4394663350","https://openalex.org/W6636915900","https://openalex.org/W6640425456","https://openalex.org/W6714069269","https://openalex.org/W6737664043","https://openalex.org/W6746608116","https://openalex.org/W6747218270","https://openalex.org/W6750404860","https://openalex.org/W6754279747","https://openalex.org/W6759580348","https://openalex.org/W6761076018","https://openalex.org/W6767352609","https://openalex.org/W6772495420","https://openalex.org/W6773658961","https://openalex.org/W6780833078","https://openalex.org/W6787972765","https://openalex.org/W6803950810","https://openalex.org/W6864274290"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W2502115930","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"On-device":[0],"deep":[1,13,21,153,200],"learning":[2,14,22,95,121,154,201],"is":[3,215],"rapidly":[4],"gaining":[5],"popularity":[6],"in":[7,110,181],"mobile":[8,155,202],"applications.":[9],"Compared":[10],"to":[11,17,49,52,80,205],"offloading":[12],"from":[15,100,158],"smartphones":[16,39],"the":[18,53,56,105,131,195,207],"cloud,":[19],"on-device":[20,57,68,82,208],"enables":[23],"offline":[24],"model":[25],"inference":[26],"while":[27],"preserving":[28],"user":[29],"privacy.":[30],"However,":[31],"such":[32],"mechanisms":[33],"inevitably":[34],"store":[35],"models":[36,83,90,99],"on":[37,92,151],"users\u2019":[38],"and":[40,97,108,123,140,184,197],"may":[41],"invite":[42],"adversarial":[43,61,77,124],"attacks":[44,62,133],"as":[45],"they":[46],"are":[47],"accessible":[48],"attackers.":[50],"Due":[51],"characteristic":[54],"of":[55,112,137,171,199,212],"model,":[58],"most":[59],"existing":[60],"cannot":[63],"be":[64,174],"directly":[65],"applied":[66],"for":[67,194],"models.":[69,209],"In":[70],"this":[71,213],"paper,":[72],"we":[73,167],"introduce":[74],"a":[75],"grey-box":[76],"attack":[78,106,125],"framework":[79],"hack":[81],"by":[84],"crafting":[85],"highly":[86],"similar":[87],"binary":[88],"classification":[89],"based":[91],"identified":[93],"transfer":[94,120,165],"approaches":[96,122],"pre-trained":[98,117],"TensorFlow":[101],"Hub.":[102],"We":[103,145],"evaluate":[104],"effectiveness":[107],"generality":[109],"terms":[111],"four":[113],"different":[114,138],"settings":[115],"including":[116],"models,":[118],"datasets,":[119],"algorithms.":[126],"The":[127,191,210],"results":[128,192],"demonstrate":[129],"that":[130,169],"proposed":[132],"remain":[134],"effective":[135],"regardless":[136],"settings,":[139],"significantly":[141],"outperform":[142],"state-of-the-art":[143],"baselines.":[144],"further":[146],"conduct":[147],"an":[148],"empirical":[149],"study":[150],"real-world":[152],"apps":[156,163],"collected":[157],"Google":[159],"Play.":[160],"Among":[161],"53":[162],"adopting":[164],"learning,":[166],"find":[168],"71.7%":[170],"them":[172],"can":[173],"successfully":[175],"attacked,":[176],"which":[177],"includes":[178],"popular":[179],"ones":[180],"medicine,":[182],"automation,":[183],"finance":[185],"categories":[186],"with":[187],"critical":[188],"usage":[189],"scenarios.":[190],"call":[193],"awareness":[196],"actions":[198],"app":[203],"developers":[204],"secure":[206],"code":[211],"work":[214],"available":[216],"at":[217],"<italic":[218],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[219],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><uri>https://github.com/Jinxhy/SmartAppAttack</uri></i>":[220],".":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
