{"id":"https://openalex.org/W4414587951","doi":"https://doi.org/10.1002/spy2.70110","title":"A Stacked Ensemble Framework for Android Malware Detection Using Semantic Permission Aggregation and Explainable <scp>AI</scp>","display_name":"A Stacked Ensemble Framework for Android Malware Detection Using Semantic Permission Aggregation and Explainable <scp>AI</scp>","publication_year":2025,"publication_date":"2025-09-28","ids":{"openalex":"https://openalex.org/W4414587951","doi":"https://doi.org/10.1002/spy2.70110"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70110","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70110","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119756897","display_name":"Priya Pudke","orcid":null},"institutions":[{"id":"https://openalex.org/I70971781","display_name":"Dr. B. R. Ambedkar National Institute of Technology Jalandhar","ror":"https://ror.org/03xt0bg88","country_code":"IN","type":"education","lineage":["https://openalex.org/I70971781"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Priya Pudke","raw_affiliation_strings":["Dr. B R Ambedkar National Institute of Technology Jalandhar  Jalandhar India","Dr. B R Ambedkar National Institute of Technology Jalandhar, Jalandhar, India"],"raw_orcid":"https://orcid.org/0009-0000-2593-449X","affiliations":[{"raw_affiliation_string":"Dr. B R Ambedkar National Institute of Technology Jalandhar  Jalandhar India","institution_ids":["https://openalex.org/I70971781"]},{"raw_affiliation_string":"Dr. B R Ambedkar National Institute of Technology Jalandhar, Jalandhar, India","institution_ids":["https://openalex.org/I70971781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108943881","display_name":"Urvashi Bansal","orcid":null},"institutions":[{"id":"https://openalex.org/I70971781","display_name":"Dr. B. R. Ambedkar National Institute of Technology Jalandhar","ror":"https://ror.org/03xt0bg88","country_code":"IN","type":"education","lineage":["https://openalex.org/I70971781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Urvashi Bansal","raw_affiliation_strings":["Dr. B R Ambedkar National Institute of Technology Jalandhar  Jalandhar India","Dr. B R Ambedkar National Institute of Technology Jalandhar, Jalandhar, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Dr. B R Ambedkar National Institute of Technology Jalandhar  Jalandhar India","institution_ids":["https://openalex.org/I70971781"]},{"raw_affiliation_string":"Dr. B R Ambedkar National Institute of Technology Jalandhar, Jalandhar, India","institution_ids":["https://openalex.org/I70971781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5119756897"],"corresponding_institution_ids":["https://openalex.org/I70971781"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":1.2753,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83463882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5640000104904175},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5620999932289124},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5317999720573425},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.5171999931335449},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4480000138282776},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.44769999384880066},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.4300999939441681},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.4099000096321106},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.40720000863075256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8245999813079834},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5932000279426575},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5640000104904175},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5620999932289124},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5598000288009644},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5317999720573425},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.5171999931335449},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4480000138282776},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.44769999384880066},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.4300999939441681},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41749998927116394},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.4099000096321106},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.40720000863075256},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.3709999918937683},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.350600004196167},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.33649998903274536},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.32019999623298645},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.3174000084400177},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C2781122975","wikidata":"https://www.wikidata.org/wiki/Q16928266","display_name":"Semantic feature","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70110","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70110","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1546375476","https://openalex.org/W2002454301","https://openalex.org/W2009292602","https://openalex.org/W2033247376","https://openalex.org/W2088794999","https://openalex.org/W2102636708","https://openalex.org/W2140046357","https://openalex.org/W2256588869","https://openalex.org/W2787649770","https://openalex.org/W2911964244","https://openalex.org/W2975495759","https://openalex.org/W3011036830","https://openalex.org/W3119955105","https://openalex.org/W3182600083","https://openalex.org/W3196781733","https://openalex.org/W3198183881","https://openalex.org/W3202406575","https://openalex.org/W4205876068","https://openalex.org/W4211249255","https://openalex.org/W4212881197","https://openalex.org/W4281618489","https://openalex.org/W4321055749","https://openalex.org/W4321481948","https://openalex.org/W4360602064","https://openalex.org/W4381736097","https://openalex.org/W4382240482","https://openalex.org/W4385492466","https://openalex.org/W4388499283","https://openalex.org/W4390517513","https://openalex.org/W4391756158","https://openalex.org/W4392377655","https://openalex.org/W4392481752","https://openalex.org/W4392697189","https://openalex.org/W4396803152","https://openalex.org/W4400251647","https://openalex.org/W4401074733","https://openalex.org/W4403277278","https://openalex.org/W4403536866","https://openalex.org/W4403628430","https://openalex.org/W4403674712","https://openalex.org/W4403694436","https://openalex.org/W4403733186","https://openalex.org/W4404060117","https://openalex.org/W4404348651","https://openalex.org/W4405916916","https://openalex.org/W4407637598","https://openalex.org/W4408068764","https://openalex.org/W4409709589","https://openalex.org/W4410492054"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Android":[1,59,185],"is":[2,39,65,82],"a":[3,86,109,114,129,141,156,179],"popular":[4],"target":[5],"for":[6,18,184,200],"malware":[7,186],"attacks":[8],"due":[9],"to":[10,66,77,84],"its":[11],"rapid":[12],"proliferation,":[13],"which":[14],"emphasizes":[15],"the":[16,46,74,117,172],"need":[17],"efficient":[19],"and":[20,34,48,69,102,126,140,155,168,181,195],"understandable":[21],"detection":[22],"methods.":[23],"A":[24],"novel":[25],"ensemble\u2010based":[26],"framework":[27],"that":[28,90,166],"combines":[29],"semantic":[30,63],"feature":[31,71,148],"engineering":[32],"(SFE)":[33],"explainable":[35],"artificial":[36],"intelligence":[37],"(XAI)":[38],"presented":[40],"in":[41],"this":[42],"paper.":[43],"It":[44],"addresses":[45],"generalizability":[47],"transparency":[49],"issues":[50],"with":[51,108,128,135],"current":[52],"models.":[53],"The":[54,120],"purpose":[55],"of":[56,92,133,138,143,190],"combining":[57],"low\u2010level":[58],"permissions":[60,170],"into":[61],"high\u2010level":[62],"categories":[64],"improve":[67],"interpretability":[68],"reduce":[70],"dimensionality,":[72],"making":[73],"model":[75,121],"easier":[76],"understand.":[78],"Grid":[79],"search":[80],"optimization":[81],"used":[83],"assess":[85],"stacked":[87],"ensemble":[88,192],"classifier":[89],"consists":[91],"k\u2010nearest":[93],"neighbors":[94],"(KNN),":[95],"random":[96],"forest":[97],"(RF),":[98],"gradient":[99],"boosting":[100],"(GB),":[101],"support":[103],"vector":[104],"machine":[105],"(SVM)":[106],"models":[107],"logistic":[110],"regression":[111],"(LR)":[112],"as":[113],"meta\u2010learner":[115],"on":[116,205],"TUANDROMD":[118],"dataset.":[119],"demonstrates":[122],"strong":[123],"class":[124],"separation":[125],"generalization":[127],"high":[130],"test":[131],"accuracy":[132],"97.54%,":[134],"an":[136],"F1\u2010score":[137],"0.9847":[139],"ROC\u2010AUC":[142],"0.9929.":[144],"For":[145],"explainability,":[146],"permutation":[147],"importance":[149],"(PFI),":[150],"partial":[151],"dependence":[152],"plots":[153],"(PDPs),":[154],"global":[157],"surrogate":[158],"decision":[159],"tree":[160],"(GSDT)":[161],"are":[162,171],"used.":[163],"Results":[164],"show":[165],"network":[167],"location":[169],"most":[173],"important":[174],"features.":[175],"This":[176],"study":[177],"offers":[178],"robust":[180],"interpretable":[182],"solution":[183],"detection.":[187],"Its":[188],"combination":[189],"SFE,":[191],"learning":[193],"(EL),":[194],"XAI":[196],"makes":[197],"it":[198],"suitable":[199],"real\u2010world":[201],"cybersecurity":[202],"applications,":[203],"especially":[204],"mobile":[206],"devices.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
