{"id":"https://openalex.org/W2772660489","doi":"https://doi.org/10.1109/icacci.2017.8126084","title":"Deep android malware detection and classification","display_name":"Deep android malware detection and classification","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2772660489","doi":"https://doi.org/10.1109/icacci.2017.8126084","mag":"2772660489"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2017.8126084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8126084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112825787","display_name":"R. Vinayakumar","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R. Vinayakumar","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113113768","display_name":"K. P. Soman","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. P. Soman","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029900047","display_name":"Prabaharan Poornachandran","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prabaharan Poornachandran","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, IN"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, IN","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112825787"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":6.2874,"has_fulltext":false,"cited_by_count":84,"citation_normalized_percentile":{"value":0.97350445,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1677","last_page":"1683"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8187952637672424},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8163288831710815},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7493455410003662},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5635759234428406},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5138135552406311},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.4767257273197174},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.46187472343444824},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43350154161453247},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.4201143980026245},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.41225677728652954},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4036800265312195},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21468210220336914}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8187952637672424},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8163288831710815},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7493455410003662},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5635759234428406},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5138135552406311},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.4767257273197174},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.46187472343444824},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43350154161453247},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.4201143980026245},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.41225677728652954},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4036800265312195},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21468210220336914},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2017.8126084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8126084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W79549259","https://openalex.org/W121173099","https://openalex.org/W640375500","https://openalex.org/W1489067988","https://openalex.org/W1522301498","https://openalex.org/W1986330503","https://openalex.org/W2003276999","https://openalex.org/W2011392916","https://openalex.org/W2023925542","https://openalex.org/W2044117262","https://openalex.org/W2064675550","https://openalex.org/W2095470000","https://openalex.org/W2095705004","https://openalex.org/W2110485445","https://openalex.org/W2110889728","https://openalex.org/W2114275288","https://openalex.org/W2116261113","https://openalex.org/W2152175008","https://openalex.org/W2162181963","https://openalex.org/W2271840356","https://openalex.org/W2313513770","https://openalex.org/W2332506150","https://openalex.org/W2334842536","https://openalex.org/W2399891510","https://openalex.org/W2525905924","https://openalex.org/W2562169874","https://openalex.org/W2919115771","https://openalex.org/W2964121744","https://openalex.org/W4254816979","https://openalex.org/W4256462051","https://openalex.org/W4285719527","https://openalex.org/W4297827580","https://openalex.org/W6620782244","https://openalex.org/W6629239077","https://openalex.org/W6674330103","https://openalex.org/W6712192629"],"related_works":["https://openalex.org/W2056388267","https://openalex.org/W2904565725","https://openalex.org/W2059043756","https://openalex.org/W2035294644","https://openalex.org/W2786416059","https://openalex.org/W2180916833","https://openalex.org/W2773220181","https://openalex.org/W2765858545","https://openalex.org/W2401565922","https://openalex.org/W2945522736"],"abstract_inverted_index":{"Long":[0],"short-term":[1],"memory":[2,200],"recurrent":[3,79,163],"neural":[4,164],"network":[5,114,123,126,146,165,224],"(LSTM-RNN)":[6],"have":[7,117,148],"witnessed":[8],"as":[9,101,175],"a":[10,28,47,137,198],"powerful":[11],"approach":[12],"for":[13,103],"capturing":[14],"long-range":[15],"temporal":[16,208],"dependencies":[17],"in":[18,140,152,159],"sequences":[19,69],"of":[20,31,50,56,70,155,214],"arbitrary":[21],"length.":[22],"This":[23,188],"paper":[24],"seeks":[25],"to":[26,106,133,161,192,205,225],"model":[27],"large":[29,48],"set":[30],"Android":[32,51,64,71,180,215,228],"permissions":[33,36,72,216],"particularly":[34],"the":[35,86,110,141,162,172,178,195,207],"from":[37],"Normal,":[38],"Dangerous,":[39],"Signature":[40,42],"and":[41,85,93,113,125],"Or":[43],"System":[44],"categories":[45],"within":[46],"number":[49],"application":[52],"package":[53],"(APK)":[54],"files":[55],"Cyber":[57],"Security":[58],"Data":[59],"Mining":[60],"Competition":[61],"(CDMC":[62],"2016),":[63],"malware":[65,181,229],"classification":[66,153,230],"challenge.":[67],"The":[68],"are":[73,89,130],"transformed":[74],"into":[75,91],"features":[76,88],"by":[77,186],"using":[78],"LSTM":[80,145,169,196,223],"layer":[81,95],"with":[82,96,121,136,211],"bag-of-words":[83],"embedding":[84],"extracted":[87],"fed":[90],"dense":[92],"activation":[94,98],"non-linear":[97],"function":[99],"such":[100],"sigmoid":[102],"classification.":[104],"Furthermore,":[105],"selectively":[107],"find":[108],"out":[109],"optimal":[111],"paramaters":[112],"structure,":[115],"we":[116,219],"done":[118],"various":[119],"experimens":[120],"different":[122],"parameters":[124],"structures.":[127],"All":[128,144],"experiments":[129],"run":[131],"up":[132],"1000":[134],"epochs":[135],"learning":[138],"rate":[139],"range":[142],"[0.01-0.5].":[143],"configurations":[147],"substantially":[149],"performed":[150],"well":[151],"settings":[154],"5-fold":[156],"cross":[157],"validation":[158],"comparison":[160],"(RNN).":[166],"Most":[167],"importantly,":[168],"has":[170],"achieved":[171],"highest":[173],"accuracy":[174],"0.897":[176],"on":[177],"real-world":[179],"test":[182],"data":[183],"set,":[184],"provided":[185],"CDMC2016.":[187],"is":[189,231],"primarily":[190],"due":[191],"fact":[193],"that":[194,203,221],"houses":[197],"complex":[199],"processing":[201],"unit":[202],"facilitates":[204],"learn":[206],"behaviors":[209],"quickly":[210],"sparse":[212],"representations":[213],"sequences.":[217],"Thus,":[218],"claim":[220],"applying":[222],"permission":[226],"based":[227],"more":[232],"appropriate.":[233]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
