{"id":"https://openalex.org/W4410153120","doi":"https://doi.org/10.1109/access.2025.3567338","title":"GNSTAM: Integrating Graph Networks With Spatial and Temporal Signature Analysis for Enhanced Android Malware Detection","display_name":"GNSTAM: Integrating Graph Networks With Spatial and Temporal Signature Analysis for Enhanced Android Malware Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410153120","doi":"https://doi.org/10.1109/access.2025.3567338"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3567338","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3567338","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3567338","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100638665","display_name":"Yogesh Kumar Sharma","orcid":"https://orcid.org/0000-0001-8280-3146"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Yogesh Kumar Sharma","raw_affiliation_strings":["Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India"],"raw_orcid":"https://orcid.org/0000-0001-8280-3146","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074527311","display_name":"Deepak Singh Tomar","orcid":null},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepak Singh Tomar","raw_affiliation_strings":["Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041506920","display_name":"R. K. Pateriya","orcid":"https://orcid.org/0000-0001-7163-0024"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. K. Pateriya","raw_affiliation_strings":["Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044287222","display_name":"Surendra Solanki","orcid":"https://orcid.org/0000-0002-5067-7621"},"institutions":[{"id":"https://openalex.org/I73779912","display_name":"Manipal University Jaipur","ror":"https://ror.org/040h76494","country_code":null,"type":"education","lineage":["https://openalex.org/I73779912"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Surendra Solanki","raw_affiliation_strings":["Department of Artificial Intelligence and Machine Learning, Manipal University Jaipur, Jaipur, Rajasthan, India"],"raw_orcid":"https://orcid.org/0000-0002-5067-7621","affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Machine Learning, Manipal University Jaipur, Jaipur, Rajasthan, India","institution_ids":["https://openalex.org/I73779912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100638665"],"corresponding_institution_ids":["https://openalex.org/I91277730"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.4624,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.8816864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"81326","last_page":"81346"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9527000188827515,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7957004308700562},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7956535816192627},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6154090762138367},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5169986486434937},{"id":"https://openalex.org/keywords/power-graph-analysis","display_name":"Power graph analysis","score":0.49592623114585876},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.45959386229515076},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32839757204055786},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32034939527511597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24912548065185547},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16275927424430847}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7957004308700562},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7956535816192627},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6154090762138367},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5169986486434937},{"id":"https://openalex.org/C106937863","wikidata":"https://www.wikidata.org/wiki/Q7236518","display_name":"Power graph analysis","level":3,"score":0.49592623114585876},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.45959386229515076},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32839757204055786},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32034939527511597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24912548065185547},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16275927424430847}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3567338","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3567338","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0cf8cf8528fc4f9098255dcafad88ed5","is_oa":true,"landing_page_url":"https://doaj.org/article/0cf8cf8528fc4f9098255dcafad88ed5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 81326-81346 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3567338","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3567338","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322932","display_name":"Manipal University","ror":"https://ror.org/02xzytt36"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W2885070483","https://openalex.org/W2899730059","https://openalex.org/W2906631928","https://openalex.org/W2962984188","https://openalex.org/W3093636427","https://openalex.org/W3128484727","https://openalex.org/W3135916744","https://openalex.org/W3151633058","https://openalex.org/W3172817683","https://openalex.org/W3176943954","https://openalex.org/W3210231570","https://openalex.org/W3216588331","https://openalex.org/W4210490210","https://openalex.org/W4211249255","https://openalex.org/W4226034576","https://openalex.org/W4285108339","https://openalex.org/W4285253065","https://openalex.org/W4285293538","https://openalex.org/W4288780798","https://openalex.org/W4289313429","https://openalex.org/W4293181753","https://openalex.org/W4309490546","https://openalex.org/W4312008223","https://openalex.org/W4312106740","https://openalex.org/W4312205020","https://openalex.org/W4312334973","https://openalex.org/W4312562149","https://openalex.org/W4313023659","https://openalex.org/W4319777770","https://openalex.org/W4321021238","https://openalex.org/W4321786606","https://openalex.org/W4323539141","https://openalex.org/W4327661585","https://openalex.org/W4360770829","https://openalex.org/W4365446886","https://openalex.org/W4366989594","https://openalex.org/W4367603304","https://openalex.org/W4379033774","https://openalex.org/W4380372993","https://openalex.org/W4380716409","https://openalex.org/W4383376739","https://openalex.org/W4383899490","https://openalex.org/W4384300587","https://openalex.org/W4384787757","https://openalex.org/W4385492466","https://openalex.org/W4385502443","https://openalex.org/W4385627058","https://openalex.org/W4386362878","https://openalex.org/W4387004102","https://openalex.org/W4387010952","https://openalex.org/W4387063777","https://openalex.org/W4387546243","https://openalex.org/W4388019037","https://openalex.org/W4388543945","https://openalex.org/W4404032966"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"The":[0],"sophistication":[1],"of":[2,63,89,115,129,141],"Android":[3,51,185,212],"malware":[4,19,52,79,91,143,180,186,205],"poses":[5],"significant":[6],"threats":[7],"to":[8,26,45,76,125,153,203],"user":[9,159],"security":[10,210],"and":[11,21,31,48,58,65,85,117,200],"privacy.":[12,216],"Traditional":[13],"detection":[14,140,193],"methods":[15],"struggle":[16],"with":[17,56,145],"rapid":[18,151],"evolution":[20],"benign":[22,64],"application":[23],"diversity,":[24],"leading":[25],"high":[27],"false":[28,198],"positive":[29],"rates":[30],"limited":[32],"adaptability.":[33],"This":[34,182],"paper":[35],"introduces":[36],"a":[37,60,133,166],"hybrid":[38],"methodology":[39,183],"leveraging":[40],"advanced":[41],"machine":[42],"learning":[43,135,157,171],"techniques":[44],"enhance":[46],"accuracy":[47],"adaptability":[49,202],"in":[50,192,197,223],"detection.":[53],"It":[54,207],"begins":[55],"collecting":[57],"preprocessing":[59],"comprehensive":[61],"dataset":[62,84],"malicious":[66,130],"applications.":[67],"An":[68],"efficient":[69,104],"Generative":[70],"Adversarial":[71],"Network":[72,107],"(GAN)":[73],"is":[74,110,148],"employed":[75],"generate":[77],"synthetic":[78],"samples,":[80],"effectively":[81],"augmenting":[82],"the":[83,87,90,98,139,163],"enhancing":[86],"diversity":[88],"samples":[92],"under":[93],"study":[94],"process.":[95],"To":[96],"model":[97,136,164,172],"intricate":[99],"relationships":[100],"between":[101],"applications,":[102],"an":[103],"Graph":[105],"Neural":[106],"(GNN)":[108],"process":[109],"utilized.":[111],"Incorporating":[112],"transformers,":[113],"sequences":[114],"system":[116],"API":[118],"calls":[119],"are":[120],"analyzed,":[121],"harnessing":[122],"this":[123],"ability":[124],"discern":[126],"patterns":[127],"indicative":[128],"activities.":[131],"Additionally,":[132],"one-shot":[134],"tailored":[137],"for":[138,211],"new":[142,204],"variants":[144],"minimal":[146],"examples":[147],"introduced,":[149],"enabling":[150],"adaptation":[152],"emerging":[154],"threats.":[155,181],"Federated":[156],"preserves":[158],"privacy":[160],"by":[161],"training":[162],"across":[165],"distributed":[167],"network.":[168],"A":[169],"reinforcement":[170],"initiates":[173],"proactive":[174],"defenses,":[175],"identifying":[176],"optimal":[177],"actions":[178],"against":[179],"advances":[184],"detection,":[187],"showing":[188],"over":[189],"5.9%":[190],"improvement":[191],"accuracy,":[194],"4.5%":[195],"reduction":[196],"positives,":[199],"enhanced":[201,209],"variants.":[206],"ensures":[208],"users":[213],"while":[214],"preserving":[215],"Evaluation":[217],"results":[218],"highlight":[219],"its":[220],"practical":[221],"applicability":[222],"real-time":[224],"scenarios.":[225]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-05-08T00:00:00"}
