{"id":"https://openalex.org/W2996826556","doi":"https://doi.org/10.1109/access.2019.2958927","title":"Android Malware Detection Based on Factorization Machine","display_name":"Android Malware Detection Based on Factorization Machine","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2996826556","doi":"https://doi.org/10.1109/access.2019.2958927","mag":"2996826556"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2958927","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2958927","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931539.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931539.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100675579","display_name":"Chenglin Li","orcid":"https://orcid.org/0000-0001-7477-7945"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Chenglin Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044090050","display_name":"Keith G. Mills","orcid":"https://orcid.org/0000-0001-6054-1798"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Keith Mills","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032424832","display_name":"Di Niu","orcid":"https://orcid.org/0000-0002-5250-7327"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Di Niu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101849995","display_name":"Rui Zhu","orcid":"https://orcid.org/0000-0002-5924-454X"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rui Zhu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100670031","display_name":"Hongwen Zhang","orcid":"https://orcid.org/0000-0002-6619-9425"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hongwen Zhang","raw_affiliation_strings":["Wedge Networks, Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Wedge Networks, Calgary, Canada","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060644465","display_name":"Husam Kinawi","orcid":"https://orcid.org/0000-0001-6044-0962"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Husam Kinawi","raw_affiliation_strings":["Wedge Networks, Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Wedge Networks, Calgary, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100675579"],"corresponding_institution_ids":["https://openalex.org/I154425047"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.7035,"has_fulltext":true,"cited_by_count":67,"citation_normalized_percentile":{"value":0.97553535,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"184008","last_page":"184019"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8314931392669678},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8091645240783691},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7974423766136169},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6187161207199097},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5543142557144165},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5368362665176392},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5107262134552002},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.43786177039146423},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4376922845840454},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4336158335208893},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3200313448905945},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2591822147369385}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8314931392669678},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8091645240783691},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7974423766136169},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6187161207199097},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5543142557144165},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5368362665176392},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5107262134552002},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.43786177039146423},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4376922845840454},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4336158335208893},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3200313448905945},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2591822147369385}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2958927","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2958927","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931539.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b1523409ad2b4fd8a5ef9e45ed9fdc5b","is_oa":true,"landing_page_url":"https://doaj.org/article/b1523409ad2b4fd8a5ef9e45ed9fdc5b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 184008-184019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2958927","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2958927","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931539.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2996826556.pdf","grobid_xml":"https://content.openalex.org/works/W2996826556.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1665214252","https://openalex.org/W1982029046","https://openalex.org/W1985746537","https://openalex.org/W2002478203","https://openalex.org/W2007857904","https://openalex.org/W2033811191","https://openalex.org/W2041276426","https://openalex.org/W2077278164","https://openalex.org/W2092942461","https://openalex.org/W2101234009","https://openalex.org/W2122672392","https://openalex.org/W2130735345","https://openalex.org/W2137983211","https://openalex.org/W2141278204","https://openalex.org/W2153542583","https://openalex.org/W2187089797","https://openalex.org/W2295739661","https://openalex.org/W2548846043","https://openalex.org/W2591624555","https://openalex.org/W2620844046","https://openalex.org/W2744097819","https://openalex.org/W2789247308","https://openalex.org/W2896241050","https://openalex.org/W2963204406","https://openalex.org/W4242210993","https://openalex.org/W4244726870","https://openalex.org/W4251541794","https://openalex.org/W4256462051","https://openalex.org/W6631190155","https://openalex.org/W6637242042","https://openalex.org/W6675354045","https://openalex.org/W6682754051"],"related_works":["https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2311926078","https://openalex.org/W3199551743","https://openalex.org/W2781346976","https://openalex.org/W4281384336","https://openalex.org/W4312234627","https://openalex.org/W2895504842","https://openalex.org/W2899262475","https://openalex.org/W2401343441"],"abstract_inverted_index":{"As":[0],"the":[1,15,22,32,46,62,96,128,144,162,192,206,212,227],"popularity":[2],"of":[3,17,34,48,72,79,100,130,148,187,214,229],"Android":[4,37,73,118,131,217],"smart":[5],"phones":[6],"has":[7,14,39,81],"increased":[8],"in":[9,69,153],"recent":[10],"years,":[11],"so":[12],"too":[13],"number":[16],"malicious":[18,97,171],"applications.":[19],"Due":[20],"to":[21,58,85,92,169,232],"potential":[23],"for":[24,45,103,117],"data":[25],"theft":[26],"that":[27,143,161],"mobile":[28,101],"phone":[29],"users":[30,60],"face,":[31],"detection":[33,120,219],"malware":[35,104,218],"on":[36,122,191,205],"devices":[38],"become":[40],"an":[41,149,176],"increasingly":[42],"important":[43],"issue":[44],"field":[47],"cyber":[49],"security.":[50],"Traditional":[51],"methods":[52,91,220],"like":[53],"signature-based":[54],"routines":[55],"are":[56,167],"unable":[57],"protect":[59],"from":[61,134],"ever-increasing":[63],"sophistication":[64],"and":[65,90,94,113,127,137,156,160,195,221],"rapid":[66],"behavior":[67,98,172],"changes":[68],"new":[70],"types":[71],"malware.":[74],"Therefore,":[75],"a":[76,111,123,154,184],"great":[77],"deal":[78],"effort":[80],"been":[82],"made":[83],"recently":[84],"use":[86],"machine":[87],"learning":[88],"models":[89],"characterize":[93],"generalize":[95],"patterns":[99],"apps":[102],"detection.":[105],"In":[106],"this":[107],"paper,":[108],"we":[109],"propose":[110],"novel":[112],"highly":[114,157],"reliable":[115],"classifier":[116],"Malware":[119],"based":[121],"Factorization":[124],"Machine":[125],"architecture":[126],"extraction":[129],"app":[132,150],"features":[133,166],"manifest":[135],"files":[136],"source":[138],"code.":[139],"Our":[140],"results":[141,152],"indicate":[142],"numerical":[145],"feature":[146],"representation":[147],"typically":[151],"long":[155],"sparse":[158],"vector":[159],"interactions":[163],"among":[164],"different":[165],"critical":[168],"revealing":[170],"patterns.":[173],"After":[174],"performing":[175],"extensive":[177],"performance":[178,213],"evaluation,":[179],"our":[180],"proposed":[181],"method":[182],"achieved":[183],"test":[185],"result":[186],"100.00%":[188],"precision":[189,197],"score":[190,198],"DREBIN":[193],"dataset":[194],"99.22%":[196],"with":[199,226],"only":[200],"1.10%":[201],"false":[202],"positive":[203],"rate":[204],"AMD":[207],"dataset.":[208],"These":[209],"metrics":[210],"match":[211],"state-of-the-art":[215],"machine-learning-based":[216],"several":[222],"commercial":[223],"antivirus":[224],"engines":[225],"benefit":[228],"training":[230],"up":[231],"50":[233],"times":[234],"faster.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
