{"id":"https://openalex.org/W3002250518","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965960","title":"Android Malicious Code Detection Based on Secondary Pruning Optimization","display_name":"Android Malicious Code Detection Based on Secondary Pruning Optimization","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3002250518","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965960","mag":"3002250518"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei48845.2019.8965960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112252891","display_name":"Q\u00ecng Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qing Yu","raw_affiliation_strings":["Tianjin Key Laboratory of Intelligence Computing and Network Security, Tianjin University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Intelligence Computing and Network Security, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062592003","display_name":"Kuolang Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kuolang Ma","raw_affiliation_strings":["Tianjin Key Laboratory of Intelligence Computing and Network Security, Tianjin University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Intelligence Computing and Network Security, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014309875","display_name":"Zuohua Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zuohua Wang","raw_affiliation_strings":["Tianjin Times Shengshi Technology Co., Ltd., No. 216, Hongqi Road, Nankai District, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Times Shengshi Technology Co., Ltd., No. 216, Hongqi Road, Nankai District, Tianjin, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112252891"],"corresponding_institution_ids":["https://openalex.org/I136765683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17282435,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8724347352981567},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8272802829742432},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.5164230465888977},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4218764901161194},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.37109655141830444},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33626657724380493}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8724347352981567},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8272802829742432},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.5164230465888977},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4218764901161194},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.37109655141830444},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33626657724380493},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei48845.2019.8965960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W79549259","https://openalex.org/W1971497680","https://openalex.org/W1985686072","https://openalex.org/W1989147187","https://openalex.org/W1997201541","https://openalex.org/W2003276999","https://openalex.org/W2023925542","https://openalex.org/W2041575831","https://openalex.org/W2057929437","https://openalex.org/W2085700758","https://openalex.org/W2086401659","https://openalex.org/W2087970742","https://openalex.org/W2090061444","https://openalex.org/W2123519624","https://openalex.org/W2131222089","https://openalex.org/W2139212933","https://openalex.org/W2153542583","https://openalex.org/W2156744053","https://openalex.org/W2162181963","https://openalex.org/W2399891510","https://openalex.org/W6603223915","https://openalex.org/W6679434007","https://openalex.org/W6712192629"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W1565885216","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5],"detection":[6],"algorithm":[7,64],"for":[8],"Android":[9,27,56],"malicious":[10,52],"code":[11,53],"based":[12,41],"on":[13,42],"integrated":[14,38],"multi-feature.":[15],"By":[16],"decompiling":[17],"and":[18,31,58],"processing":[19],"APK":[20],"files,":[21],"the":[22,32,51,55,60,63],"multi-class":[23],"behavior":[24],"features":[25],"of":[26,54,62],"application":[28],"are":[29],"extracted,":[30],"classification":[33],"is":[34],"achieved":[35],"through":[36,65],"an":[37],"learning":[39],"framework":[40],"quadratic":[43],"pruning":[44],"optimization.":[45],"The":[46],"prototype":[47],"system":[48],"automatically":[49],"detects":[50],"platform":[57],"analyzes":[59],"validity":[61],"experimental":[66],"verification.":[67]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
