{"id":"https://openalex.org/W4413822922","doi":"https://doi.org/10.1109/icccn65249.2025.11133975","title":"MalVIS: A pyramid vision transformer V2 (PVTv2) based framework for android malware detection","display_name":"MalVIS: A pyramid vision transformer V2 (PVTv2) based framework for android malware detection","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413822922","doi":"https://doi.org/10.1109/icccn65249.2025.11133975"},"language":"en","primary_location":{"id":"doi:10.1109/icccn65249.2025.11133975","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn65249.2025.11133975","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114641108","display_name":"Devnath","orcid":null},"institutions":[{"id":"https://openalex.org/I119241673","display_name":"Indian Institute of Technology Ropar","ror":"https://ror.org/02qkhhn56","country_code":"IN","type":"education","lineage":["https://openalex.org/I119241673"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Devnath","raw_affiliation_strings":["Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India","institution_ids":["https://openalex.org/I119241673"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119473945","display_name":"Manoneet Mahesh Sikhwal","orcid":null},"institutions":[{"id":"https://openalex.org/I119241673","display_name":"Indian Institute of Technology Ropar","ror":"https://ror.org/02qkhhn56","country_code":"IN","type":"education","lineage":["https://openalex.org/I119241673"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manoneet Mahesh Sikhwal","raw_affiliation_strings":["Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India","institution_ids":["https://openalex.org/I119241673"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017476118","display_name":"Basant Subba","orcid":"https://orcid.org/0000-0001-9482-8324"},"institutions":[{"id":"https://openalex.org/I119241673","display_name":"Indian Institute of Technology Ropar","ror":"https://ror.org/02qkhhn56","country_code":"IN","type":"education","lineage":["https://openalex.org/I119241673"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Basant Subba","raw_affiliation_strings":["Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Ropar,Computer Science and Engineering,Rupnagar,India","institution_ids":["https://openalex.org/I119241673"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5114641108"],"corresponding_institution_ids":["https://openalex.org/I119241673"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3371524,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6786090135574341},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6595550775527954},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5897579193115234},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5649054646492004},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5257552266120911},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5170536637306213},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.505931556224823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34592264890670776},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3223978579044342},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24108177423477173},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1348707675933838},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0907529890537262}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6786090135574341},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6595550775527954},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5897579193115234},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5649054646492004},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5257552266120911},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5170536637306213},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.505931556224823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34592264890670776},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3223978579044342},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24108177423477173},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1348707675933838},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0907529890537262},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn65249.2025.11133975","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn65249.2025.11133975","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2584961495","https://openalex.org/W2782290149","https://openalex.org/W2796394805","https://openalex.org/W2796681025","https://openalex.org/W3094190102","https://openalex.org/W3151633058","https://openalex.org/W3160345471","https://openalex.org/W3175515048","https://openalex.org/W4295700754","https://openalex.org/W4306316917","https://openalex.org/W4313495946","https://openalex.org/W4383899490","https://openalex.org/W4392909856","https://openalex.org/W4405993535"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"MalVIS,":[3],"an":[4,117],"android":[5,27,103],"malware":[6,29,88,104],"detection":[7,25,105],"framework":[8],"based":[9,28],"on":[10,71,92,127],"pyramid":[11,32],"vision":[12],"transformers":[13],"V2(PVTv2).":[14],"MalVIS":[15,35,75,99],"leverages":[16],"the":[17,41,58,93,128],"hierarchical":[18],"self-attention":[19],"mechanism":[20],"of":[21,26,34,60,119],"(PVTv2)":[22],"to":[23,38,52,82],"enhance":[24],"binaries.":[30],"The":[31],"structure":[33],"enables":[36],"it":[37,67],"efficiently":[39],"capture":[40],"fine-grained":[42],"and":[43,113,123],"high-level":[44],"features.":[45],"It":[46,115],"employs":[47],"Spatial":[48],"Reduction":[49],"Attention":[50],"(SRA)":[51],"reduce":[53],"computational":[54],"complexity":[55],"by":[56],"decreasing":[57],"number":[59],"tokens":[61],"at":[62],"each":[63],"stage,":[64],"which":[65],"makes":[66],"suitable":[68],"for":[69,86],"deployment":[70],"resource-constrained":[72],"environments.":[73],"Additionally,":[74],"benefits":[76],"from":[77],"convolutional":[78],"feed-forward":[79],"networks":[80],"(FFNs)":[81],"improve":[83],"feature":[84],"representation":[85],"effective":[87],"classification.":[89],"Experimental":[90],"analysis":[91],"benchmark":[94],"MALNET-IMAGE":[95,129],"dataset":[96],"shows":[97],"that":[98],"outperforms":[100],"many":[101],"state-of-the-art":[102],"frameworks,":[106],"such":[107],"as":[108],"ViT-B":[109],"Sherlock,":[110],"ResNet,":[111],"DenseNet,":[112],"MobileNetV2.":[114],"achieves":[116],"F1-score":[118],"0.965":[120],"(binary":[121],"classification)":[122,126],"0.724":[124],"(multi-class":[125],"dataset.":[130]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
