APKpure [Online]. Available: https://apkpure.com/tw/.
 Chau, M. (2018 ). Smartphone Market Share [Online]. Available: https://www.idc.com/promo/smartphone-market-share/os.
 Chebyshev, V. (2019). Mobile malware evolution 2018 [Online]. Available: https://securelist.com/mobile-malware-evolution-2018/89689/.
 Hoffman, G. (2018). Introduction to LSTMs with TensorFlow [Online]. Available: https://www.oreilly.com/ideas/introduction-to-lstms-with-tensorflow.
 Paller, G. (2018). Dalvik opcodes [Online]. Available: http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html.
 Alshahrani, H., Mansourt, H., Thorn, S., Alshehri, A., Alzahrani, A., and Fu, H., "DDefender: Android application threat detection using static and dynamic analysis," in 2018 IEEE International Conference on Consumer Electronics (ICCE), 2018: IEEE, pp. 1-6.
 Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., and Siemens, C., "Drebin: Effective and explainable detection of android malware in your pocket," in Ndss, 2014, vol. 14, pp. 23-26.
 Bacci, A., Bartoli, A., Martinelli, F., Medvet, E., and Mercaldo, F., "Detection of Obfuscation Techniques in Android Applications," in Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018: ACM, p. 57.
 Bengio, Y., Simard, P., and Frasconi, P., "Learning long-term dependencies with gradient descent is difficult," IEEE transactions on neural networks, vol. 5, no. 2, pp. 157-166, 1994.
 Canfora, G., De Lorenzo, A., Medvet, E., Mercaldo, F., and Visaggio, C. A., "Effectiveness of opcode ngrams for detection of multi family android malware," in 2015 10th International Conference on Availability, Reliability and Security, 2015: IEEE, pp. 333-340.
 Canfora, G., Mercaldo, F., and Visaggio, C. A., "Mobile malware detection using op-code frequency histograms," in 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), 2015, vol. 4: IEEE, pp. 27-38.
 Chen, T., Mao, Q., Yang, Y., Lv, M., and Zhu, J., "TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification," Mobile Information Systems, vol. 2018, 2018.
 Graves, A., "Long short-term memory," in Supervised sequence labelling with recurrent neural networks: Springer, 2012, pp. 37-45.
 Hasegawa, C. and Iyatomi, H., "One-dimensional convolutional neural networks for Android malware detection," in 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA), 2018: IEEE, pp. 99-102.
 Hochreiter, S. and Schmidhuber, J., "Long short-term memory," Neural computation, vol. 9, no. 8, pp. 1735-1780, 1997.
 Hsien-De Huang, T. and Kao, H.-Y., "R2-d2: Color-inspired convolutional neural network (cnn)-based android malware detections," in 2018 IEEE International Conference on Big Data (Big Data), 2018: IEEE, pp. 2633-2642.
 Ioffe, S. and Szegedy, C., "Batch normalization: Accelerating deep network training by reducing internal covariate shift," International Conference on Machine Learning, 2015.
 Jerome, Q., Allix, K., State, R., and Engel, T., "Using opcode-sequences to detect malicious Android applications," in 2014 IEEE International Conference on Communications (ICC), 2014: IEEE, pp. 914-919.
 Kang, B., Kang, B., Kim, J., and Im, E. G., "Android malware classification method: Dalvik bytecode frequency analysis," in Proceedings of the 2013 research in adaptive and convergent systems, 2013: ACM, pp. 349-350.
 Kang, J., Jang, S., Li, S., Jeong, Y.-S., and Sung, Y., "Long short-term memory-based Malware classification method for information security," Computers & Electrical Engineering, vol. 77, pp. 366-375, 2019.
 Le, Q., Boydell, O., Mac Namee, B., and Scanlon, M., "Deep learning at the shallow end: Malware classification for non-domain experts," Digital Investigation, vol. 26, pp. S118-S126, 2018.
 Liu, Y., Guo, K., Huang, X., Zhou, Z., and Zhang, Y., "Detecting android malwares with high-efficient hybrid analyzing methods," Mobile Information Systems, vol. 2018, 2018.
 McKinney, W., "pandas: a foundational Python library for data analysis and statistics," Python for High Performance and Scientific Computing, vol. 14, 2011.
 McLaughlin, N. et al., "Deep android malware detection," in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017: ACM, pp. 301-308.
 Naway, A. and LI, Y., "A Review on The Use of Deep Learning in Android Malware Detection," International Journal of Computer Science and Mobile Computing, vol. 7, no. 12, pp. 42-58, 2018.
 Pascanu, R., Stokes, J. W., Sanossian, H., Marinescu, M., and Thomas, A., "Malware classification with recurrent networks," in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015: IEEE, pp. 1916-1920.
 Ren, B., Liu, C., Cheng, B., Guo, J., and Chen, J., "MobiSentry: Towards Easy and Effective Detection of Android Malware on Smartphones," Mobile Information Systems, vol. 2018, 2018.
 Şahın, D. Ö., Kural, O. E., Akleylek, S., and Kiliç, E., "New results on permission based static analysis for Android malware," in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018: IEEE, pp. 1-4.
 Sak, H., Senior, A., and Beaufays, F., "Long short-term memory recurrent neural network architectures for large scale acoustic modeling," in Fifteenth annual conference of the international speech communication association, 2014.
 Sorzano, C. O. S., Vargas, J., and Montano, A. P., "A survey of dimensionality reduction techniques," arXiv:1403.2877 [stat.ML], 2014.
 Sun, G. and Qian, Q., "Deep Learning and Visualization for Identifying Malware Families," IEEE Transactions on Dependable and Secure Computing, 2018.
 Vinayakumar, R., Soman, K., Poornachandran, P., and Sachin Kumar, S., "Detecting Android malware using long short-term memory (LSTM)," Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1277-1288, 2018.
 Wang, W., Gao, Z., Zhao, M., Li, Y., Liu, J., and Zhang, X., "DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features," IEEE Access, vol. 6, pp. 31798-31807, 2018.
 Wang, Y. and Zong, H., "DroidGene: Detecting Android Malware Using Its Malicious Gene," in International Conference on Bio-Inspired Computing: Theories and Applications, 2018: Springer, pp. 315-330.
 Winsniewski, R., "Android–apktool: A tool for reverse engineering android apk files," ed: Tech. Rep, 2012.
 Xiao, X., Zhang, S., Mercaldo, F., Hu, G., and Sangaiah, A. K., "Android malware detection based on system call sequences and LSTM," Multimedia Tools and Applications, vol. 78, no. 4, pp. 3979-3999, 2019.
 Xiaofeng, L., Xiao, Z., Fangshuo, J., Shengwei, Y., and Jing, S., "ASSCA: API based Sequence and Statistics Features Combined Malware Detection Architecture," Procedia Computer Science, vol. 129, pp. 248-256, 2018.
 Yan, J., Qi, Y., and Rao, Q., "LSTM-Based Hierarchical Denoising Network for Android Malware Detection," Security and Communication Networks, vol. 2018, 2018.
 Yan, J., Qi, Y., and Rao, Q., "Detecting malware with an ensemble method based on deep neural network," Security and Communication Networks, vol. 2018, 2018.
 Ye, Y., Li, T., Adjeroh, D., and Iyengar, S. S., "A survey on malware detection using data mining techniques," ACM Computing Surveys (CSUR), vol. 50, no. 3, p. 41, 2017.
 Yuan, Z., Lu, Y., Wang, Z., and Xue, Y., "Droid-sec: deep learning in android malware detection," in ACM SIGCOMM Computer Communication Review, 2014, vol. 44, no. 4: ACM, pp. 371-372.
 Yuan, Z., Lu, Y., and Xue, Y., "Droiddetector: android malware characterization and detection using deep learning," Tsinghua Science and Technology, vol. 21, no. 1, pp. 114-123, 2016.
 Zhang, H., Zhang, W., Lv, Z., Sangaiah, A. K., Huang, T., and Chilamkurti, N., "MALDC: a depth detection method for malware based on behavior chains," World Wide Web, pp. 1-20, 2019.
 Zhang, J., Qin, Z., Zhang, K., Yin, H., and Zou, J., "Dalvik opcode graph based android malware variants detection using global topology features," IEEE Access, vol. 6, pp. 51964-51974, 2018.
 Zhang, Y., Yang, Y., and Wang, X., "A Novel Android Malware Detection Approach Based on Convolutional Neural Network," in Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018: ACM, pp. 144-149.