{"id":"https://openalex.org/W4396506213","doi":"https://doi.org/10.1109/jiot.2024.3394555","title":"LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal Networks","display_name":"LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal Networks","publication_year":2024,"publication_date":"2024-04-30","ids":{"openalex":"https://openalex.org/W4396506213","doi":"https://doi.org/10.1109/jiot.2024.3394555"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3394555","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3394555","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089649495","display_name":"Huan Huan Liu","orcid":"https://orcid.org/0009-0006-6694-7143"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huan Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Tianjin University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076665590","display_name":"Liangyi Gong","orcid":"https://orcid.org/0000-0002-9067-8733"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangyi Gong","raw_affiliation_strings":["Computer Network Information Center, Chinese Academy of Sciences, Beijing, China","Computer Network Information Center (CNIC), Chinese Academy of Sciences (CAS), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Computer Network Information Center (CNIC), Chinese Academy of Sciences (CAS), Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003732504","display_name":"Xiuliang Mo","orcid":"https://orcid.org/0009-0002-9239-2859"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiuliang Mo","raw_affiliation_strings":["School of Computer Science and Engineering, Tianjin University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074712705","display_name":"Guozhong Dong","orcid":"https://orcid.org/0000-0002-7144-1327"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozhong Dong","raw_affiliation_strings":["Department of New Networks, Pengcheng Laboratory, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Pengcheng Laboratory, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jie Yu","orcid":"https://orcid.org/0009-0001-3628-6384"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Yu","raw_affiliation_strings":["School of Computer Science and Engineering, Tianjin University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089649495"],"corresponding_institution_ids":["https://openalex.org/I136765683"],"apc_list":null,"apc_paid":null,"fwci":5.8181,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.96921365,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"11","issue":"14","first_page":"25371","last_page":"25381"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.8896744847297668},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8674558401107788},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6778348088264465},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5533735156059265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5158928632736206},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.49654847383499146},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4877932369709015},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4651324152946472},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.444256067276001},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.426496297121048},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.412461519241333},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3347468078136444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20645886659622192}],"concepts":[{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.8896744847297668},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8674558401107788},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6778348088264465},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5533735156059265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5158928632736206},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.49654847383499146},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4877932369709015},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4651324152946472},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.444256067276001},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.426496297121048},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.412461519241333},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3347468078136444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20645886659622192},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3394555","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3394555","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5034729449","display_name":null,"funder_award_id":"PCL2023A05-005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5710008938","display_name":null,"funder_award_id":"62272440","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2571682498","https://openalex.org/W2593250011","https://openalex.org/W2618014206","https://openalex.org/W2618621776","https://openalex.org/W2900275727","https://openalex.org/W2906631928","https://openalex.org/W2919139886","https://openalex.org/W2947395823","https://openalex.org/W2953797486","https://openalex.org/W2961850650","https://openalex.org/W2963204406","https://openalex.org/W2982084047","https://openalex.org/W2982413766","https://openalex.org/W2999422148","https://openalex.org/W3015481738","https://openalex.org/W3021426193","https://openalex.org/W3083703328","https://openalex.org/W3099091571","https://openalex.org/W3105429705","https://openalex.org/W3115449059","https://openalex.org/W3120848642","https://openalex.org/W3120979750","https://openalex.org/W3160345471","https://openalex.org/W3161742098","https://openalex.org/W3174894387","https://openalex.org/W3177627266","https://openalex.org/W3217564040","https://openalex.org/W4206967005","https://openalex.org/W4281638412","https://openalex.org/W4285293538","https://openalex.org/W4287822221","https://openalex.org/W4288780798","https://openalex.org/W4385300771","https://openalex.org/W4385755457","https://openalex.org/W4387110583","https://openalex.org/W6775788796"],"related_works":["https://openalex.org/W36091977","https://openalex.org/W2800331776","https://openalex.org/W4382794599","https://openalex.org/W2903602818","https://openalex.org/W2003791967","https://openalex.org/W2904470035","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W3012517703","https://openalex.org/W3036603968"],"abstract_inverted_index":{"Android":[0,10,50,69],"applications":[1],"have":[2],"emerged":[3],"as":[4,14,183],"a":[5,15,47],"prime":[6],"target":[7],"for":[8,19],"hackers.":[9],"malware":[11,51],"detection":[12,53,119,165],"stands":[13],"pivotal":[16],"technology,":[17],"crucial":[18],"safeguarding":[20],"network":[21],"security":[22],"and":[23,78,85,94,137,161,167,186],"thwarting":[24],"anomalies.":[25],"However,":[26],"traditional":[27,178],"static":[28],"analysis":[29,40],"makes":[30],"it":[31],"difficult":[32],"to":[33,75,90,140],"analyze":[34],"new":[35],"malicious":[36,149],"applications,":[37],"while":[38],"dynamic":[39],"requires":[41],"higher":[42,164],"system":[43],"resources.":[44],"We":[45],"propose":[46],"novel":[48],"lightweight":[49],"deep-learning":[52],"framework":[54],"based":[55],"on":[56,175],"attention":[57,135],"temporal":[58,101,125],"networks.":[59,190],"This":[60],"study":[61],"delves":[62],"into":[63],"the":[64,72,118,142],"Dalvik":[65,104,128],"opcode":[66,105,129],"sequences":[67,77],"of":[68,100,120,173],"malware,":[70],"employing":[71],"N-gram":[73],"algorithm":[74],"partition":[76],"extract":[79],"contextual":[80],"information":[81,102],"features.":[82],"Then,":[83],"LSTM":[84],"TCN":[86,108],"algorithms":[87],"are":[88],"employed":[89],"capture":[91],"long-term":[92],"dependencies":[93],"local":[95],"features,":[96],"enabling":[97,117],"comprehensive":[98],"comprehension":[99],"within":[103,127,148],"sequences.":[106,130,151],"Especially,":[107],"facilitates":[109],"feature":[110],"extraction":[111],"across":[112,123],"various":[113],"time":[114],"scales,":[115],"thereby":[116],"anomaly":[121],"patterns":[122],"diverse":[124],"scales":[126],"Moreover,":[131],"we":[132],"introduce":[133],"multi-head":[134],"mechanisms":[136],"reinforced":[138],"learning":[139,180],"direct":[141],"model\u2019s":[143],"focus":[144],"toward":[145],"behavioral":[146],"cues":[147],"software":[150],"Finally,":[152],"extensive":[153],"experiment":[154],"results":[155],"show":[156],"that":[157],"our":[158],"proposed":[159],"methodology":[160],"model":[162],"exhibit":[163],"accuracy":[166,171],"robustness,":[168],"achieving":[169],"an":[170],"rate":[172],"98.69%":[174],"average,":[176],"surpassing":[177],"machine":[179],"methods":[181],"such":[182],"random":[184],"forest,":[185],"Pseudo-Label":[187],"deep":[188],"neural":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
