{"id":"https://openalex.org/W4226034576","doi":"https://doi.org/10.1109/tcyb.2022.3164625","title":"Cyber Code Intelligence for Android Malware Detection","display_name":"Cyber Code Intelligence for Android Malware Detection","publication_year":2022,"publication_date":"2022-04-27","ids":{"openalex":"https://openalex.org/W4226034576","doi":"https://doi.org/10.1109/tcyb.2022.3164625"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2022.3164625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2022.3164625","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069053712","display_name":"Junyang Qiu","orcid":"https://orcid.org/0000-0001-8288-6180"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Junyang Qiu","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083874423","display_name":"Qing\u2010Long Han","orcid":"https://orcid.org/0000-0002-7207-0716"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Qing-Long Han","raw_affiliation_strings":["School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090419741","display_name":"Wei Luo","orcid":"https://orcid.org/0000-0002-4711-7543"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wei Luo","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045991464","display_name":"Lei Pan","orcid":"https://orcid.org/0000-0002-4691-8330"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Pan","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044019139","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-2189-7801"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5069053712"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":7.8939,"has_fulltext":false,"cited_by_count":58,"citation_normalized_percentile":{"value":0.98324581,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"53","issue":"1","first_page":"617","last_page":"627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.9113866090774536},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8820946216583252},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8098764419555664},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7691031098365784},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7263091802597046},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.7123897075653076},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5792402625083923},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.533551037311554},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5022923946380615},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4209696352481842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30868232250213623},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11576676368713379}],"concepts":[{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.9113866090774536},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8820946216583252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8098764419555664},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7691031098365784},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7263091802597046},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.7123897075653076},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5792402625083923},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.533551037311554},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5022923946380615},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4209696352481842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30868232250213623},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11576676368713379}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcyb.2022.3164625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2022.3164625","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1943233084","https://openalex.org/W2085700758","https://openalex.org/W2095705004","https://openalex.org/W2104839588","https://openalex.org/W2122672392","https://openalex.org/W2127723417","https://openalex.org/W2168103835","https://openalex.org/W2187089797","https://openalex.org/W2403995870","https://openalex.org/W2490191290","https://openalex.org/W2514847810","https://openalex.org/W2606250847","https://openalex.org/W2620844046","https://openalex.org/W2744097819","https://openalex.org/W2753669113","https://openalex.org/W2782290149","https://openalex.org/W2783327762","https://openalex.org/W2790664081","https://openalex.org/W2792310543","https://openalex.org/W2800912855","https://openalex.org/W2809965384","https://openalex.org/W2897812226","https://openalex.org/W2905097561","https://openalex.org/W2912135847","https://openalex.org/W2947576068","https://openalex.org/W2955308964","https://openalex.org/W2963204406","https://openalex.org/W2963954089","https://openalex.org/W2964136807","https://openalex.org/W2966342255","https://openalex.org/W2972659368","https://openalex.org/W2989930814","https://openalex.org/W3011968954","https://openalex.org/W3014829096","https://openalex.org/W3033777149","https://openalex.org/W3042888165","https://openalex.org/W3112311055","https://openalex.org/W3129608404","https://openalex.org/W3145971023","https://openalex.org/W3161331107","https://openalex.org/W3184914355","https://openalex.org/W3187047132","https://openalex.org/W3200780444","https://openalex.org/W6674330103","https://openalex.org/W6741450815","https://openalex.org/W6743618022"],"related_works":["https://openalex.org/W4382794599","https://openalex.org/W2903602818","https://openalex.org/W36091977","https://openalex.org/W4308353525","https://openalex.org/W3200508744","https://openalex.org/W4225094272","https://openalex.org/W2026973889","https://openalex.org/W4226034576","https://openalex.org/W4319659935","https://openalex.org/W4312234627"],"abstract_inverted_index":{"Evolving":[0],"Android":[1,61,178,240],"malware":[2,28,51,56,62,74,84,114,121,161,179,241],"poses":[3],"a":[4,45,95,109,156,164,186],"severe":[5],"security":[6],"threat":[7],"to":[8,20,48,104,132,175,202],"mobile":[9],"users,":[10],"and":[11,64,86,119,145,173,206,228],"machine-learning":[12],"(ML)-based":[13],"defense":[14],"techniques":[15],"attract":[16],"active":[17],"research.":[18],"Due":[19],"the":[21,33,54,69,73,80,106,123,153,199,204,209,216],"lack":[22],"of":[23,72,79,82,89,108,155,166,168,208],"knowledge,":[24],"many":[25],"zero-day":[26,83],"families\u2019":[27],"may":[29],"remain":[30],"undetected":[31],"until":[32],"classifier":[34],"gains":[35],"specialized":[36],"knowledge.":[37],"The":[38,126,212],"most":[39],"existing":[40],"ML-based":[41,60],"methods":[42,66],"will":[43],"take":[44],"long":[46],"time":[47],"learn":[49,105,152],"new":[50,96,127,187,200,210,217],"families":[52,85,115,162],"in":[53,77],"latest":[55],"family":[57],"landscape.":[58],"Existing":[59],"detection":[63],"classification":[65],"struggle":[67],"with":[68,122,180,189,242],"fast":[70],"evolution":[71],"landscape,":[75],"particularly":[76],"terms":[78],"emergence":[81],"limited":[87],"representation":[88,107,154],"single-view":[90],"features.":[91,149],"In":[92],"this":[93],"article,":[94],"multiview":[97,134],"feature":[98,169],"intelligence":[99],"(MFI)":[100],"framework":[101,128],"is":[102],"developed":[103],"targeted":[110,157,243],"capability":[111,158],"from":[112,159],"known":[113,160],"for":[116],"recognizing":[117],"unknown":[118,177,239],"evolving":[120],"same":[124],"capability.":[125,183,193],"performs":[129],"reverse":[130],"engineering":[131],"extract":[133],"heterogeneous":[135],"features,":[136,140,144],"including":[137],"semantic":[138],"string":[139],"API":[141],"call":[142],"graph":[143],"smali":[146],"opcode":[147],"sequential":[148],"It":[150],"can":[151],"through":[163],"series":[165],"processes":[167],"analysis,":[170],"selection,":[171],"aggregation,":[172],"encoding,":[174],"detect":[176],"shared":[181],"target":[182],"We":[184],"create":[185],"dataset":[188,201],"ground-truth":[190],"information":[191],"regarding":[192],"Many":[194],"experiments":[195],"are":[196],"conducted":[197],"on":[198],"evaluate":[203],"performance":[205],"effectiveness":[207],"method.":[211],"results":[213],"demonstrate":[214],"that":[215],"method":[218],"outperforms":[219],"three":[220],"state-of-the-art":[221],"methods,":[222],"including:":[223],"1)":[224],"Drebin;":[225],"2)":[226],"MaMaDroid;":[227],"3)":[229],"<inline-formula":[230],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[231],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[232],"<tex-math":[233],"notation=\"LaTeX\">$N$":[234],"</tex-math></inline-formula>":[235],"-opcode,":[236],"when":[237],"detecting":[238],"capabilities.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
