{"id":"https://openalex.org/W2955305247","doi":"https://doi.org/10.1109/icit.2019.8755048","title":"Mobile Malware Detection: An Analysis of Deep Learning Model","display_name":"Mobile Malware Detection: An Analysis of Deep Learning Model","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2955305247","doi":"https://doi.org/10.1109/icit.2019.8755048","mag":"2955305247"},"language":"en","primary_location":{"id":"doi:10.1109/icit.2019.8755048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit.2019.8755048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Industrial Technology (ICIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Mobile_malware_detection_An_analysis_of_deep_learning_model/13453844","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055543654","display_name":"Mahbub E Khoda","orcid":"https://orcid.org/0000-0002-3440-2564"},"institutions":[{"id":"https://openalex.org/I149672521","display_name":"Federation University","ror":"https://ror.org/05qbzwv83","country_code":"AU","type":"education","lineage":["https://openalex.org/I149672521"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mahbub E Khoda","raw_affiliation_strings":["Internet Commerce Security Laboratory, Federation University, Australia"],"affiliations":[{"raw_affiliation_string":"Internet Commerce Security Laboratory, Federation University, Australia","institution_ids":["https://openalex.org/I149672521"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013199739","display_name":"Joarder Kamruzzaman","orcid":"https://orcid.org/0000-0002-3748-0277"},"institutions":[{"id":"https://openalex.org/I149672521","display_name":"Federation University","ror":"https://ror.org/05qbzwv83","country_code":"AU","type":"education","lineage":["https://openalex.org/I149672521"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joarder Kamruzzaman","raw_affiliation_strings":["Internet Commerce Security Laboratory, Federation University, Australia"],"affiliations":[{"raw_affiliation_string":"Internet Commerce Security Laboratory, Federation University, Australia","institution_ids":["https://openalex.org/I149672521"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003563704","display_name":"Iqbal Gondal","orcid":"https://orcid.org/0000-0001-7963-2446"},"institutions":[{"id":"https://openalex.org/I149672521","display_name":"Federation University","ror":"https://ror.org/05qbzwv83","country_code":"AU","type":"education","lineage":["https://openalex.org/I149672521"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Iqbal Gondal","raw_affiliation_strings":["Internet Commerce Security Laboratory, Federation University, Australia"],"affiliations":[{"raw_affiliation_string":"Internet Commerce Security Laboratory, Federation University, Australia","institution_ids":["https://openalex.org/I149672521"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045350428","display_name":"Tasadduq Imam","orcid":"https://orcid.org/0000-0002-8864-4155"},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tasadduq Imam","raw_affiliation_strings":["School of Business and Law, CQUniversity, Australia"],"affiliations":[{"raw_affiliation_string":"School of Business and Law, CQUniversity, Australia","institution_ids":["https://openalex.org/I74899385"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000151716","display_name":"Ashfaqur Rahman","orcid":"https://orcid.org/0000-0002-0236-5447"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ashfaqur Rahman","raw_affiliation_strings":["Data61, CSIRO"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5055543654"],"corresponding_institution_ids":["https://openalex.org/I149672521"],"apc_list":null,"apc_paid":null,"fwci":0.6676,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.68263145,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"abs 1706 947","issue":null,"first_page":"1161","last_page":"1166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8897506594657898},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8309534788131714},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7635201215744019},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7057772874832153},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6735167503356934},{"id":"https://openalex.org/keywords/dropout","display_name":"Dropout (neural networks)","score":0.6032116413116455},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5808622241020203},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5708309412002563},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.49312111735343933},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.475023090839386},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11428982019424438}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8897506594657898},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8309534788131714},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7635201215744019},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7057772874832153},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6735167503356934},{"id":"https://openalex.org/C2776145597","wikidata":"https://www.wikidata.org/wiki/Q25339462","display_name":"Dropout (neural networks)","level":2,"score":0.6032116413116455},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5808622241020203},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5708309412002563},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.49312111735343933},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.475023090839386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11428982019424438}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/icit.2019.8755048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit.2019.8755048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Industrial Technology (ICIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:acquire.cqu.edu.au:cqu:18782","is_oa":false,"landing_page_url":"http://hdl.cqu.edu.au/10018/1312049","pdf_url":null,"source":{"id":"https://openalex.org/S4306400635","display_name":"Acquire (CQUniversity)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I74899385","host_organization_name":"Central Queensland University","host_organization_lineage":["https://openalex.org/I74899385"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khoda, ME, Kamruzzaman, J, Gondal, I, Imam, T, Rahman, A, (2019). Mobile malware detection: An analysis of deep learning model. 13-15 February 2019, 20th IEEE International Conference on Industrial Technology (ICIT 2019), Melbourne, Australia, IEEE, Piscataway, NJ, p. 1161-1166, http://dx.doi.org/10.1109/ICIT.2019.8755048","raw_type":"conference"},{"id":"pmh:vital:14292","is_oa":false,"landing_page_url":"http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/171245","pdf_url":null,"source":{"id":"https://openalex.org/S4306400234","display_name":"FedUni ResearchOnline (Federation University Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210158496","host_organization_name":"Australian Federation of University Women \u2013 South Australia","host_organization_lineage":["https://openalex.org/I4210158496"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:alma61RMIT.INST:11278493140001341","is_oa":false,"landing_page_url":"http://doi.org/10.1109/ICIT.2019.8755048","pdf_url":null,"source":{"id":"https://openalex.org/S4306402074","display_name":"RMIT Research Repository (RMIT University Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82951845","host_organization_name":"RMIT University","host_organization_lineage":["https://openalex.org/I82951845"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:figshare.com:article/13453844","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Mobile_malware_detection_An_analysis_of_deep_learning_model/13453844","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:figshare.com:article/27592794","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/13453844","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Mobile_malware_detection_An_analysis_of_deep_learning_model/13453844","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1982730827","https://openalex.org/W1982773740","https://openalex.org/W1994167151","https://openalex.org/W2026875669","https://openalex.org/W2041151434","https://openalex.org/W2041963100","https://openalex.org/W2067057029","https://openalex.org/W2110798204","https://openalex.org/W2110889728","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2136922672","https://openalex.org/W2150341604","https://openalex.org/W2308726246","https://openalex.org/W2313513770","https://openalex.org/W2318851192","https://openalex.org/W2536311873","https://openalex.org/W2551095084","https://openalex.org/W2586845402","https://openalex.org/W2587002069","https://openalex.org/W2598119844","https://openalex.org/W2599823825","https://openalex.org/W2606250847","https://openalex.org/W2622584974","https://openalex.org/W2901220696","https://openalex.org/W4205947740","https://openalex.org/W4242210993","https://openalex.org/W4300607852","https://openalex.org/W6676481782","https://openalex.org/W6736332964","https://openalex.org/W6738633777"],"related_works":["https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W4245250093","https://openalex.org/W3114159050","https://openalex.org/W2484248966","https://openalex.org/W4244354662","https://openalex.org/W2609233367","https://openalex.org/W4200054778","https://openalex.org/W2777464647","https://openalex.org/W2965539362"],"abstract_inverted_index":{"Due":[0],"to":[1,59,92],"its":[2,60],"widespread":[3],"use,":[4],"with":[5,114],"numerous":[6],"applications":[7,24],"deployed":[8],"everyday,":[9],"smartphones":[10],"have":[11,34],"become":[12],"an":[13],"inevitable":[14],"target":[15],"of":[16,23,28,52,62,89,96,110,117,138],"the":[17,55,94,108,115,136],"malware":[18,37,56,158],"developers.":[19],"This":[20,144],"huge":[21],"number":[22],"renders":[25],"manual":[26],"inspection":[27],"codes":[29],"infeasible;":[30],"as":[31],"such,":[32],"researchers":[33,57],"proposed":[35],"several":[36,77],"detection":[38],"techniques":[39],"based":[40,155],"on":[41,76,99],"automatic":[42],"machine":[43],"learning":[44,47,72,80],"tools.":[45],"Deep":[46],"has":[48],"gained":[49],"a":[50],"lot":[51],"attention":[53],"from":[54],"due":[58],"ability":[61],"capture":[63],"complex":[64],"relationships":[65],"among":[66],"inputs":[67],"and":[68],"outputs.":[69],"However,":[70],"deep":[71,125,152],"models":[73],"depend":[74],"largely":[75],"hyper-parameters":[78,139],"(i.e.,":[79],"rate,":[81],"batch":[82],"size,":[83],"dropout":[84],"rate).":[85],"Hence,":[86],"it":[87],"is":[88],"utmost":[90],"importance":[91],"analyze":[93],"effect":[95,109,116],"these":[97,111],"parameters":[98,112],"classifier":[100,131],"performance.":[101,132],"In":[102],"this":[103],"paper,":[104],"we":[105],"systematically":[106],"studied":[107],"along":[113],"network":[118,154],"architecture.":[119],"We":[120,133],"showed":[121],"that":[122,140],"building":[123,150],"arbitrary":[124],"networks":[126],"does":[127],"not":[128],"always":[129],"improve":[130],"also":[134],"determined":[135],"combination":[137],"yields":[141],"best":[142],"result.":[143],"study":[145],"will":[146],"be":[147],"useful":[148],"in":[149],"better":[151],"neural":[153],"model":[156],"for":[157],"classification.":[159]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
