{"id":"https://openalex.org/W4384028594","doi":"https://doi.org/10.1109/lsp.2023.3294695","title":"Detecting Android Malware With Pre-Existing Image Classification Neural Networks","display_name":"Detecting Android Malware With Pre-Existing Image Classification Neural Networks","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4384028594","doi":"https://doi.org/10.1109/lsp.2023.3294695"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2023.3294695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3294695","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100349444","display_name":"Chenhao Zhang","orcid":"https://orcid.org/0009-0000-6779-072X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenhao Zhang","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067172848","display_name":"S.Y. Yin","orcid":"https://orcid.org/0009-0006-8185-0999"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuijun Yin","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","Wuhan Maritime Communication Research Institute, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Wuhan Maritime Communication Research Institute, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027427522","display_name":"Heng Li","orcid":"https://orcid.org/0000-0001-8045-8983"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Li","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074663989","display_name":"Minghui Cai","orcid":"https://orcid.org/0000-0001-5396-1057"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minghui Cai","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101957538","display_name":"Wei Yuan","orcid":"https://orcid.org/0000-0002-5867-5364"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yuan","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100349444"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":1.3867,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.81779293,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"30","issue":null,"first_page":"858","last_page":"862"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8256467580795288},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.807402491569519},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7975656986236572},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7513888478279114},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6671650409698486},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5987879037857056},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.563873827457428},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48844924569129944},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.477812796831131},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4489172101020813},{"id":"https://openalex.org/keywords/contextual-image-classification","display_name":"Contextual image classification","score":0.44627976417541504},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4421539902687073},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3443037271499634},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23614943027496338},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22728955745697021},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2003258466720581}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8256467580795288},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.807402491569519},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7975656986236572},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7513888478279114},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6671650409698486},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5987879037857056},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.563873827457428},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48844924569129944},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.477812796831131},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4489172101020813},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.44627976417541504},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4421539902687073},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3443037271499634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23614943027496338},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22728955745697021},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2003258466720581}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2023.3294695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3294695","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1576445103","https://openalex.org/W1861492603","https://openalex.org/W1983436880","https://openalex.org/W2110889728","https://openalex.org/W2116988482","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2575599800","https://openalex.org/W2587002069","https://openalex.org/W2599734722","https://openalex.org/W2618530766","https://openalex.org/W2738029666","https://openalex.org/W2781682587","https://openalex.org/W2792310543","https://openalex.org/W2792481260","https://openalex.org/W2899684919","https://openalex.org/W2899717138","https://openalex.org/W2900967758","https://openalex.org/W2963446712","https://openalex.org/W2970508906","https://openalex.org/W2971438638","https://openalex.org/W2997690675","https://openalex.org/W2998906013","https://openalex.org/W3002912819","https://openalex.org/W3004280948","https://openalex.org/W3027732850","https://openalex.org/W3035742266","https://openalex.org/W3158304330","https://openalex.org/W3174784402","https://openalex.org/W3191935420","https://openalex.org/W3200384003","https://openalex.org/W3210278576","https://openalex.org/W4213328902","https://openalex.org/W4298312696","https://openalex.org/W4312526003","https://openalex.org/W6631190155","https://openalex.org/W6634343353","https://openalex.org/W6639102338","https://openalex.org/W6741502269","https://openalex.org/W6752946794","https://openalex.org/W6779945560"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W4312334973","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W4327939473","https://openalex.org/W2085301524","https://openalex.org/W2591124010","https://openalex.org/W4311848503","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Android":[0,19,47,51],"malware":[1,20,87],"detection":[2,21,88,113,139],"has":[3],"attracted":[4],"increasing":[5],"attention":[6],"due":[7],"to":[8,34,38,45,102,123],"the":[9,53,65,71,75,104],"rapid":[10],"growth":[11],"of":[12,106],"mobile":[13],"malware.":[14,48],"However,":[15],"running":[16],"an":[17,40,50,61],"in-cloud":[18,41,76],"system":[22],"usually":[23,121],"incurs":[24],"high":[25],"hardware":[26],"and":[27,68,97,111,125,134],"bandwidth":[28],"costs.":[29],"This":[30],"dilemma":[31],"motivates":[32],"us":[33],"develop":[35],"a":[36,86],"method":[37,55,127],"repurpose":[39],"image-classification":[42],"neural":[43],"network":[44],"detect":[46],"Given":[49],"app,":[52],"proposed":[54,101],"first":[56],"embeds":[57],"its":[58],"features":[59],"into":[60,74,85],"image,":[62,67],"skillfully":[63],"perturbs":[64],"feature-embedded":[66],"then":[69],"feeds":[70],"modified":[72],"image":[73,77],"classifier.":[78],"The":[79],"classifier's":[80],"outputs":[81],"are":[82,100,120],"finally":[83],"mapped":[84],"result.":[89],"In":[90],"addition,":[91],"two":[92],"new":[93],"techniques":[94],"(perturbation":[95],"hiding":[96],"group":[98],"mapping)":[99],"reduce":[103],"risk":[105],"repurposing":[107],"behavior":[108],"being":[109],"recognized":[110],"improve":[112],"performance.":[114,140],"Experiments":[115],"show":[116],"that":[117],"our":[118,126],"perturbations":[119],"imperceptible":[122],"humans,":[124],"outperforms":[128],"both":[129],"traditional":[130],"machine":[131],"learning-based":[132,136],"detectors":[133,137],"deep":[135],"in":[138]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
