{"id":"https://openalex.org/W7125925052","doi":"https://doi.org/10.1109/smc58881.2025.11343274","title":"LRS-GGCN: An influence-sensitive subgraph-based approach for detecting Android malware","display_name":"LRS-GGCN: An influence-sensitive subgraph-based approach for detecting Android malware","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125925052","doi":"https://doi.org/10.1109/smc58881.2025.11343274"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shuhui Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuhui Zhang","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124101035","display_name":"Xinru Song","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinru Song","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121018958","display_name":"Lianhai Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lianhai Wang","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124104778","display_name":"Shujiang Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shujiang Xu","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100612384","display_name":"Wei Shao","orcid":"https://orcid.org/0000-0003-1478-5892"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Shao","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043086431","display_name":"Qizheng Wang","orcid":"https://orcid.org/0000-0003-2756-4650"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qizheng Wang","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.70717545,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2312","last_page":"2319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.004600000102072954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.0038999998942017555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.5954999923706055},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5845000147819519},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4823000133037567},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.4724000096321106},{"id":"https://openalex.org/keywords/subgraph-isomorphism-problem","display_name":"Subgraph isomorphism problem","score":0.42730000615119934},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.37929999828338623},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.34380000829696655},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.34279999136924744},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.3418999910354614}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.866599977016449},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.5954999923706055},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5845000147819519},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4823000133037567},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.4724000096321106},{"id":"https://openalex.org/C131992880","wikidata":"https://www.wikidata.org/wiki/Q2528185","display_name":"Subgraph isomorphism problem","level":3,"score":0.42730000615119934},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.37929999828338623},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.34380000829696655},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33329999446868896},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32829999923706055},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3246000111103058},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.303600013256073},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2897999882698059},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.2879999876022339},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2660999894142151},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2122672392","https://openalex.org/W2140095007","https://openalex.org/W2964136807","https://openalex.org/W2992853260","https://openalex.org/W3006334803","https://openalex.org/W3100013573","https://openalex.org/W3115449059","https://openalex.org/W3120945926","https://openalex.org/W3187047132","https://openalex.org/W3210231570","https://openalex.org/W4226294137","https://openalex.org/W4367603304","https://openalex.org/W4381995523","https://openalex.org/W4385755457","https://openalex.org/W4392114371","https://openalex.org/W4392697189","https://openalex.org/W4394611553","https://openalex.org/W4394688406","https://openalex.org/W4395673141","https://openalex.org/W4396506213","https://openalex.org/W4398183551"],"related_works":[],"abstract_inverted_index":{"The":[0],"open":[1],"architecture":[2],"and":[3,35,69,76,88,104,112,131,153],"inherent":[4],"flexibility":[5],"of":[6,115,136,166],"the":[7,79,85,110,119,133,137,170,180],"Android":[8],"platform":[9],"make":[10],"it":[11],"a":[12,54,140],"prime":[13],"target":[14],"for":[15],"malicious":[16,55,116,155],"code":[17,56,156],"penetration,":[18],"posing":[19],"huge":[20],"security":[21],"risks":[22],"to":[23,43,73,91,108,127,150,179],"users.":[24],"Current":[25],"graph-based":[26],"detection":[27,45,57,93],"methods":[28],"have":[29],"two":[30],"limitations:":[31],"high":[32],"computational":[33],"overhead":[34],"reliance":[36],"on":[37,60],"single-dimensional":[38],"feature":[39,67],"representation,":[40],"which":[41,64],"leads":[42],"poor":[44],"performance.":[46],"To":[47],"address":[48],"these":[49,147],"challenges,":[50],"this":[51],"paper":[52],"proposes":[53],"framework":[58],"based":[59],"impact-sensitive":[61,80],"subgraphs":[62],"(LRS-GGCN),":[63],"integrates":[65],"multi-level":[66],"fusion":[68],"graph":[70,142],"pruning":[71],"techniques":[72],"improve":[74,92],"efficiency":[75],"accuracy.":[77],"First,":[78],"subgraph":[81],"is":[82,125,173],"constructed":[83],"using":[84],"LeaderRank":[86],"algorithm":[87],"sensitive":[89],"APIs":[90],"efficiency.":[94],"Second,":[95],"node-level":[96],"features":[97,149],"are":[98],"enriched":[99],"by":[100,175],"fusing":[101],"opcode":[102],"structure":[103],"API":[105,122],"semantic":[106],"embedding":[107],"capture":[109],"syntactic":[111],"contextual":[113],"properties":[114],"code.":[117],"At":[118],"edge":[120],"level,":[121],"call":[123],"frequency":[124],"combined":[126],"model":[128],"interprocedural":[129],"interactions":[130],"enhance":[132],"representation":[134],"capability":[135],"graph.":[138],"Finally,":[139],"gated":[141],"convolutional":[143],"network":[144],"(GGCN)":[145],"synthesizes":[146],"heterogeneous":[148],"achieve":[151],"efficient":[152],"accurate":[154],"detection.":[157],"Experiments":[158],"show":[159],"that":[160],"our":[161],"method":[162],"achieves":[163],"an":[164],"accuracy":[165],"99.28%.":[167],"In":[168],"addition,":[169],"training":[171],"time":[172],"reduced":[174],"about":[176],"90%":[177],"compared":[178],"unpruned":[181],"baseline.":[182]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-29T00:00:00"}
