{"id":"https://openalex.org/W4283220304","doi":"https://doi.org/10.1109/infocomwkshps54753.2022.9798161","title":"An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection","display_name":"An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection","publication_year":2022,"publication_date":"2022-05-02","ids":{"openalex":"https://openalex.org/W4283220304","doi":"https://doi.org/10.1109/infocomwkshps54753.2022.9798161"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps54753.2022.9798161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps54753.2022.9798161","pdf_url":null,"source":{"id":"https://openalex.org/S4363607985","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.edgehill.ac.uk/en/publications/536d3986-279f-4bee-8ce4-030b00b06ee8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059307518","display_name":"Husnain Rafiq","orcid":"https://orcid.org/0000-0002-3178-4026"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Husnain Rafiq","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041150133","display_name":"Nauman Aslam","orcid":"https://orcid.org/0000-0002-9500-3970"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nauman Aslam","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060034165","display_name":"Biju Issac","orcid":"https://orcid.org/0000-0002-1109-8715"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Biju Issac","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020356302","display_name":"Rizwan Hamid Randhawa","orcid":"https://orcid.org/0000-0003-1563-5239"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rizwan Hamid Randhawa","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059307518"],"corresponding_institution_ids":["https://openalex.org/I32394136"],"apc_list":null,"apc_paid":null,"fwci":1.3375,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.82934509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.8878746628761292},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8023673295974731},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7223244905471802},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6929843425750732},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6820149421691895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6610872745513916},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.6474393606185913},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6311266422271729},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5601692199707031},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.511387288570404},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3204893469810486},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0967409610748291}],"concepts":[{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.8878746628761292},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8023673295974731},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7223244905471802},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6929843425750732},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6820149421691895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6610872745513916},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.6474393606185913},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6311266422271729},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5601692199707031},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.511387288570404},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3204893469810486},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0967409610748291},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/infocomwkshps54753.2022.9798161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps54753.2022.9798161","pdf_url":null,"source":{"id":"https://openalex.org/S4363607985","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire/536d3986-279f-4bee-8ce4-030b00b06ee8","is_oa":true,"landing_page_url":"https://research.edgehill.ac.uk/en/publications/536d3986-279f-4bee-8ce4-030b00b06ee8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402462","display_name":"Edge Hill University Research Information Repository (Edge Hill University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I165525304","host_organization_name":"Edge Hill University","host_organization_lineage":["https://openalex.org/I165525304"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"RAFIQ, HUSNAIN, Aslam, N, Randhawa, R H & Issac, B 2022, An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. in IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops. INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, IEEE, IEEE Conference on Computer Communications Workshops, New York, United States, 2/05/22. https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798161","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:nrl.northumbria.ac.uk:48534","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Book Section"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/536d3986-279f-4bee-8ce4-030b00b06ee8","is_oa":true,"landing_page_url":"https://research.edgehill.ac.uk/en/publications/536d3986-279f-4bee-8ce4-030b00b06ee8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402462","display_name":"Edge Hill University Research Information Repository (Edge Hill University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I165525304","host_organization_name":"Edge Hill University","host_organization_lineage":["https://openalex.org/I165525304"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"RAFIQ, HUSNAIN, Aslam, N, Randhawa, R H & Issac, B 2022, An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. in IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops. INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, IEEE, IEEE Conference on Computer Communications Workshops, New York, United States, 2/05/22. https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798161","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1535984709","https://openalex.org/W2122672392","https://openalex.org/W2182729154","https://openalex.org/W2403995870","https://openalex.org/W2432142698","https://openalex.org/W2591788621","https://openalex.org/W2599043313","https://openalex.org/W2772683029","https://openalex.org/W2783327762","https://openalex.org/W2799420851","https://openalex.org/W2882132993","https://openalex.org/W2918510905","https://openalex.org/W2945645805","https://openalex.org/W2965563623","https://openalex.org/W3011068154","https://openalex.org/W3026437360","https://openalex.org/W3036847733","https://openalex.org/W3103393388","https://openalex.org/W3104141960","https://openalex.org/W3164510030","https://openalex.org/W4287822221","https://openalex.org/W4293343253","https://openalex.org/W6632122400","https://openalex.org/W6717848421","https://openalex.org/W6734028196","https://openalex.org/W6751070894","https://openalex.org/W6759591194","https://openalex.org/W6775788796","https://openalex.org/W6777727634"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W4283221438","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4287828318","https://openalex.org/W3200508744","https://openalex.org/W3025122950"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"(ML)":[2],"classifiers":[3,51,70,108],"have":[4],"been":[5],"increasingly":[6],"used":[7],"in":[8],"Android":[9,80],"malware":[10],"detection":[11,104,160],"and":[12,63,142],"countermeasures":[13],"for":[14],"the":[15,46,49,103],"past":[16],"decade.":[17],"However,":[18],"ML-based":[19],"solutions":[20],"are":[21],"vulnerable":[22],"to":[23,35,82,120,146,164],"adversarial":[24,53,136,144,155,167],"evasion":[25,54,148],"attacks.":[26,55],"An":[27],"attacker":[28],"can":[29,109],"craft":[30],"a":[31,87,91,129,134,158],"malicious":[32],"sample":[33],"carefully":[34],"fool":[36],"an":[37],"underlying":[38],"pre-trained":[39],"classifier.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44,131],"highlight":[45],"fragility":[47],"of":[48,90,106,123,153,162],"ML":[50,101],"against":[52,68,166],"We":[56,75],"perform":[57],"mimicry":[58],"attacks":[59],"based":[60,139],"on":[61,79,140],"Oracle":[62,141],"Generative":[64],"Adversarial":[65],"Network":[66],"(GAN)":[67],"these":[69],"using":[71],"our":[72],"proposed":[73],"methodology.":[74],"use":[76],"static":[77],"analysis":[78],"applications":[81],"extract":[83],"API-based":[84],"features":[85],"from":[86],"balanced":[88],"excerpt":[89],"well-known":[92],"public":[93],"dataset.":[94],"The":[95,150],"empirical":[96],"results":[97,152],"demonstrate":[98],"that":[99],"among":[100],"classifiers,":[102],"capability":[105],"linear":[107],"be":[110],"reduced":[111],"as":[112,114],"low":[113],"0%":[115],"by":[116],"perturbing":[117],"only":[118],"up":[119,163],"4":[121],"out":[122],"315":[124],"extracted":[125],"API":[126],"features.":[127],"As":[128],"countermeasure,":[130],"propose":[132],"TrickDroid,":[133],"cumulative":[135,154],"training":[137,156],"scheme":[138],"GAN-based":[143],"data":[145],"improve":[147],"detection.":[149],"experimental":[151],"achieves":[157],"remarkable":[159],"accuracy":[161],"99.46%":[165],"samples.":[168]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
