{"id":"https://openalex.org/W4413213075","doi":"https://doi.org/10.1109/access.2025.3597575","title":"A Review of Explainable AI for Android Malware Detection and Analysis","display_name":"A Review of Explainable AI for Android Malware Detection and Analysis","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413213075","doi":"https://doi.org/10.1109/access.2025.3597575"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3597575","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3597575","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3597575","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004206195","display_name":"Maryam Tanha","orcid":"https://orcid.org/0000-0001-7281-1943"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Maryam Tanha","raw_affiliation_strings":["Khoury College of Computer Sciences, Northeastern University, Vancouver, BC, Canada","Khoury College of Computer Sciences, Northeastern University, Vancouver, British Columbia, Canada"],"raw_orcid":"https://orcid.org/0000-0001-7281-1943","affiliations":[{"raw_affiliation_string":"Khoury College of Computer Sciences, Northeastern University, Vancouver, BC, Canada","institution_ids":[]},{"raw_affiliation_string":"Khoury College of Computer Sciences, Northeastern University, Vancouver, British Columbia, Canada","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021000866","display_name":"Somayeh Kafaie","orcid":"https://orcid.org/0000-0002-5685-6487"},"institutions":[{"id":"https://openalex.org/I66890659","display_name":"Saint Mary's University","ror":"https://ror.org/010zh7098","country_code":"CA","type":"education","lineage":["https://openalex.org/I66890659"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Somayeh Kafaie","raw_affiliation_strings":["Department of Mathematics and Computing Science, Saint Mary&#x2019;s University, Halifax, NS, Canada","Department of Mathematics and Computing Science, Saint Mary&#x2019;s University, Halifax, Nova Scotia, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computing Science, Saint Mary&#x2019;s University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I66890659"]},{"raw_affiliation_string":"Department of Mathematics and Computing Science, Saint Mary&#x2019;s University, Halifax, Nova Scotia, Canada","institution_ids":["https://openalex.org/I66890659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004206195"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.4624,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.89919355,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"141958","last_page":"141974"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.958899974822998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8147133588790894},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8058334589004517},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7444711327552795},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5740107297897339},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4882548153400421},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48370295763015747},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32331711053848267},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.32196593284606934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8147133588790894},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8058334589004517},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7444711327552795},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5740107297897339},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4882548153400421},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48370295763015747},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32331711053848267},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.32196593284606934}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3597575","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3597575","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6379e8dd1c0847eaa952f36e7dd3ee0e","is_oa":true,"landing_page_url":"https://doaj.org/article/6379e8dd1c0847eaa952f36e7dd3ee0e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 141958-141974 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3597575","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3597575","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F7388874660","display_name":"MasterCard","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W1787224781","https://openalex.org/W2060537671","https://openalex.org/W2064149108","https://openalex.org/W2122672392","https://openalex.org/W2407313496","https://openalex.org/W2516809705","https://openalex.org/W2612123163","https://openalex.org/W2807026630","https://openalex.org/W2890991187","https://openalex.org/W2891503716","https://openalex.org/W2910705748","https://openalex.org/W2945295328","https://openalex.org/W2954503794","https://openalex.org/W2962772482","https://openalex.org/W2964088652","https://openalex.org/W2981731882","https://openalex.org/W2990121995","https://openalex.org/W2995528912","https://openalex.org/W3021357056","https://openalex.org/W3036603968","https://openalex.org/W3039088822","https://openalex.org/W3083155189","https://openalex.org/W3096425977","https://openalex.org/W3101981467","https://openalex.org/W3120704879","https://openalex.org/W3133963303","https://openalex.org/W3134215180","https://openalex.org/W3160238701","https://openalex.org/W3174086521","https://openalex.org/W3174752098","https://openalex.org/W3204683301","https://openalex.org/W3209153585","https://openalex.org/W4205152863","https://openalex.org/W4205510105","https://openalex.org/W4226431491","https://openalex.org/W4283214976","https://openalex.org/W4294559022","https://openalex.org/W4308328479","https://openalex.org/W4309156333","https://openalex.org/W4309674289","https://openalex.org/W4312290548","https://openalex.org/W4312417093","https://openalex.org/W4313650676","https://openalex.org/W4327771520","https://openalex.org/W4365505506","https://openalex.org/W4377042690","https://openalex.org/W4381997116","https://openalex.org/W4385412351","https://openalex.org/W4387251303","https://openalex.org/W4390517513","https://openalex.org/W4391887969","https://openalex.org/W4392399563","https://openalex.org/W4394005843","https://openalex.org/W4399449888","https://openalex.org/W4402475681","https://openalex.org/W6737947904","https://openalex.org/W6751959524","https://openalex.org/W6753153400","https://openalex.org/W6755207826","https://openalex.org/W6767901206","https://openalex.org/W6777615688","https://openalex.org/W6777774854","https://openalex.org/W6787959460","https://openalex.org/W6796084863"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W1565885216","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,129],"complex":[3],"machine":[4],"learning":[5],"models":[6,17],"have":[7],"significantly":[8],"enhanced":[9],"Android":[10,65,85],"malware":[11,66,86],"detection":[12],"and":[13,44,48,53,88,114,123],"analysis.":[14],"However,":[15],"these":[16],"often":[18],"operate":[19],"as":[20],"closed":[21],"boxes,":[22],"making":[23],"it":[24],"difficult":[25],"to":[26,64,97,112],"understand":[27],"which":[28],"aspects":[29],"of":[30,84],"the":[31,82,94,108],"input":[32],"data":[33],"influence":[34],"their":[35,89],"decisions.":[36],"Such":[37],"interpretability":[38],"is":[39],"essential":[40],"for":[41,72,80,126],"building":[42],"trust":[43],"improving":[45],"model":[46],"robustness":[47],"performance.":[49],"This":[50],"paper":[51],"reviews":[52],"analyzes":[54],"recent":[55],"research":[56,128],"on":[57],"explainable":[58],"artificial":[59],"intelligence":[60],"(XAI)":[61],"techniques":[62,78],"applied":[63],"detection.":[67],"We":[68,91],"identify":[69],"key":[70],"objectives":[71],"integrating":[73],"explainability,":[74],"examine":[75,93],"current":[76,121],"XAI":[77],"used":[79,96],"explaining":[81],"results":[83],"detectors,":[87],"limitations.":[90],"also":[92],"metrics":[95],"evaluate":[98],"explanation":[99],"quality.":[100],"Furthermore,":[101],"we":[102,119],"introduce":[103],"a":[104],"system":[105],"that":[106],"utilizes":[107],"MITRE":[109],"ATT&CK":[110],"framework":[111],"enhance":[113],"structure":[115],"feature-based":[116],"explanations.":[117],"Lastly,":[118],"highlight":[120],"challenges":[122],"suggest":[124],"directions":[125],"future":[127],"this":[130],"emerging":[131],"field.":[132]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-08-17T00:00:00"}
