{"id":"https://openalex.org/W2782290149","doi":"https://doi.org/10.1109/tcyb.2017.2777960","title":"DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection","display_name":"DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection","publication_year":2018,"publication_date":"2018-01-04","ids":{"openalex":"https://openalex.org/W2782290149","doi":"https://doi.org/10.1109/tcyb.2017.2777960","mag":"2782290149","pmid":"https://pubmed.ncbi.nlm.nih.gov/29993965"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2017.2777960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2017.2777960","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072809002","display_name":"Suleiman Y. Yerima","orcid":"https://orcid.org/0000-0003-0346-1219"},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Suleiman Y. Yerima","raw_affiliation_strings":["Faculty of Technology, De Montfort University, Leicester, U.K"],"affiliations":[{"raw_affiliation_string":"Faculty of Technology, De Montfort University, Leicester, U.K","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen\u2019s University Belfast, Belfast, Northern Ireland","Centre for Secure Information Technologies, Queen's University Belfast, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen\u2019s University Belfast, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University Belfast, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072809002"],"corresponding_institution_ids":["https://openalex.org/I66943878"],"apc_list":null,"apc_paid":null,"fwci":11.9401,"has_fulltext":false,"cited_by_count":210,"citation_normalized_percentile":{"value":0.9902439,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"49","issue":"2","first_page":"453","last_page":"466"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7742425203323364},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.713378369808197},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7012152075767517},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.68218594789505},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6656723022460938},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5381951928138733},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.42887169122695923},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.418912798166275},{"id":"https://openalex.org/keywords/margin-classifier","display_name":"Margin classifier","score":0.4125927984714508},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38479429483413696},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07004764676094055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7742425203323364},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.713378369808197},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7012152075767517},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.68218594789505},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6656723022460938},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5381951928138733},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.42887169122695923},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.418912798166275},{"id":"https://openalex.org/C173102733","wikidata":"https://www.wikidata.org/wiki/Q6760396","display_name":"Margin classifier","level":3,"score":0.4125927984714508},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38479429483413696},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07004764676094055}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tcyb.2017.2777960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2017.2777960","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:29993965","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/29993965","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null},{"id":"pmh:oai:www.dora.dmu.ac.uk:2086/15152","is_oa":false,"landing_page_url":"http://hdl.handle.net/2086/15152","pdf_url":null,"source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/e7b23483-fd35-49ec-94e5-84c284ac2441","is_oa":false,"landing_page_url":"https://pure.qub.ac.uk/en/publications/e7b23483-fd35-49ec-94e5-84c284ac2441","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yerima , S Y &amp; Sezer , S 2018 , ' DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection ' , IEEE Transactions on Cybernetics , vol. 49 , no. 2 , pp. 453 . https://doi.org/10.1109/TCYB.2017.2777960","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3083000804","display_name":"CSIT 2","funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W6736853","https://openalex.org/W28412257","https://openalex.org/W90790289","https://openalex.org/W1499707862","https://openalex.org/W1508584952","https://openalex.org/W1645816215","https://openalex.org/W1647869403","https://openalex.org/W1930624869","https://openalex.org/W1943233084","https://openalex.org/W1975146652","https://openalex.org/W1999728176","https://openalex.org/W2007857904","https://openalex.org/W2010256880","https://openalex.org/W2015790908","https://openalex.org/W2024071684","https://openalex.org/W2026875669","https://openalex.org/W2085301524","https://openalex.org/W2087970742","https://openalex.org/W2090534521","https://openalex.org/W2112076978","https://openalex.org/W2113242816","https://openalex.org/W2120520366","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2131554365","https://openalex.org/W2133990480","https://openalex.org/W2158874007","https://openalex.org/W2168347639","https://openalex.org/W2212330840","https://openalex.org/W2227887088","https://openalex.org/W2298229910","https://openalex.org/W2363800358","https://openalex.org/W2469122001","https://openalex.org/W2478708596","https://openalex.org/W2560624365","https://openalex.org/W2562169874","https://openalex.org/W2568897335","https://openalex.org/W2574022511","https://openalex.org/W2577155794","https://openalex.org/W2577976524","https://openalex.org/W2587002069","https://openalex.org/W2591102410","https://openalex.org/W2598119844","https://openalex.org/W2598193574","https://openalex.org/W2601621757","https://openalex.org/W2611461819","https://openalex.org/W2614354826","https://openalex.org/W2618621776","https://openalex.org/W2741895717","https://openalex.org/W2911964244","https://openalex.org/W3098623025","https://openalex.org/W3100344990","https://openalex.org/W4230040612","https://openalex.org/W4300607852","https://openalex.org/W6629640212","https://openalex.org/W6640462745","https://openalex.org/W6676769703"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Android":[0,35,117],"malware":[1,36,118],"has":[2,25],"continued":[3],"to":[4,13,33,97,128],"grow":[5],"in":[6,29,95,171,189],"volume":[7],"and":[8,19,79],"complexity":[9],"posing":[10],"significant":[11],"threats":[12],"the":[14,20,92,130,140,147,160,172],"security":[15],"of":[16,57,84,132,149,163],"mobile":[17],"devices":[18],"services":[21],"they":[22],"enable.":[23],"This":[24],"prompted":[26],"increasing":[27],"interest":[28],"employing":[30],"machine":[31,58],"learning":[32,59,151],"improve":[34],"detection.":[37,119],"In":[38],"this":[39],"paper,":[40],"we":[41,137,157],"present":[42,121],"a":[43,50,69,76,82,99,168,179,186],"novel":[44],"classifier":[45,181],"fusion":[46,148,182],"approach":[47,170,188],"based":[48],"on":[49,87,124],"multilevel":[51,104],"architecture":[52],"that":[53,139,159,184],"enables":[54],"effective":[55],"combination":[56],"algorithms":[60,86,152],"for":[61,116,153],"improved":[62,113,154],"accuracy.":[63,155],"The":[64,102],"framework":[65],"(called":[66],"DroidFusion),":[67],"generates":[68],"model":[70,106],"by":[71],"training":[72],"base":[73],"classifiers":[74],"at":[75,91],"lower":[77],"level":[78,94],"then":[80,108],"applies":[81],"set":[83],"ranking-based":[85],"their":[88],"predictive":[89],"accuracies":[90],"higher":[93,173,191],"order":[96],"derive":[98],"final":[100],"classifier.":[101],"induced":[103],"DroidFusion":[105,141],"can":[107,143,175],"be":[109],"utilized":[110],"as":[111],"an":[112],"accuracy":[114,162],"predictor":[115],"We":[120],"experimental":[122],"results":[123],"four":[125],"separate":[126],"datasets":[127],"demonstrate":[129,138],"effectiveness":[131],"our":[133],"proposed":[134],"approach.":[135],"Furthermore,":[136],"method":[142,183],"also":[144],"effectively":[145],"enable":[146],"ensemble":[150],"Finally,":[156],"show":[158],"prediction":[161],"DroidFusion,":[164],"despite":[165],"only":[166],"utilizing":[167],"computational":[169],"level,":[174],"outperform":[176],"stacked":[177],"generalization,":[178],"well-known":[180],"employs":[185],"meta-classifier":[187],"its":[190],"level.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":27},{"year":2023,"cited_by_count":45},{"year":2022,"cited_by_count":28},{"year":2021,"cited_by_count":24},{"year":2020,"cited_by_count":30},{"year":2019,"cited_by_count":16},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
