“…By the decompilation of classes.dex, API calls, used permissions or string features like network addresses can be extracted from disassembled java codes [76,122,209] or smali codes [57,68,113,172]. On the other hand, the source files, including APK [19,108,164,194], classes.dex [8,69,137,152], resources files [20,80], and smali codes [9,91,107,190,206], can be inputted directly as text features or bytecode features. Except the features from source files, the application information in app markets, metadata pertaining to Android application, could also be used as features [42,46,77,151].…”