{"id":"https://openalex.org/W4410152880","doi":"https://doi.org/10.1109/tdsc.2025.3561944","title":"MalScan: Android Malware Detection Based on Social-Network Centrality Analysis","display_name":"MalScan: Android Malware Detection Based on Social-Network Centrality Analysis","publication_year":2025,"publication_date":"2025-05-07","ids":{"openalex":"https://openalex.org/W4410152880","doi":"https://doi.org/10.1109/tdsc.2025.3561944"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3561944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3561944","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056381213","display_name":"Yueming Wu","orcid":"https://orcid.org/0000-0002-1515-3558"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yueming Wu","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092877303","display_name":"Wenqi Suo","orcid":"https://orcid.org/0000-0002-9984-8348"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenqi Suo","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028101591","display_name":"Siyue Feng","orcid":"https://orcid.org/0000-0002-6694-9126"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siyue Feng","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100613524","display_name":"Wei Yang","orcid":"https://orcid.org/0000-0002-5338-7347"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Yang","raw_affiliation_strings":["University of Texas, Austin, TX, USA","University of Texas at Dallas, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]},{"raw_affiliation_string":"University of Texas at Dallas, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355692","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0001-7300-9215"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5056381213"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":3.1486,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.90918331,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"22","issue":"5","first_page":"5464","last_page":"5479"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7955414652824402},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.770164430141449},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7633885145187378},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6476530432701111},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5638142228126526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49824953079223633},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4216253161430359},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28626784682273865},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.25303149223327637},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22121447324752808}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7955414652824402},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.770164430141449},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7633885145187378},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6476530432701111},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5638142228126526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49824953079223633},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4216253161430359},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28626784682273865},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.25303149223327637},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22121447324752808},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3561944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3561944","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W1943233084","https://openalex.org/W1971937094","https://openalex.org/W1978569633","https://openalex.org/W1984156542","https://openalex.org/W2005662348","https://openalex.org/W2024071684","https://openalex.org/W2026417691","https://openalex.org/W2056944867","https://openalex.org/W2058180826","https://openalex.org/W2060692877","https://openalex.org/W2066636486","https://openalex.org/W2080996291","https://openalex.org/W2087970742","https://openalex.org/W2101599977","https://openalex.org/W2108700604","https://openalex.org/W2122672392","https://openalex.org/W2127723417","https://openalex.org/W2130476447","https://openalex.org/W2130790725","https://openalex.org/W2138621811","https://openalex.org/W2156655865","https://openalex.org/W2156744053","https://openalex.org/W2157635833","https://openalex.org/W2168103835","https://openalex.org/W2288971878","https://openalex.org/W2324464293","https://openalex.org/W2606250847","https://openalex.org/W2744095836","https://openalex.org/W2783327762","https://openalex.org/W2792310543","https://openalex.org/W2794510434","https://openalex.org/W2807671950","https://openalex.org/W2895504842","https://openalex.org/W2902979785","https://openalex.org/W2963954089","https://openalex.org/W2964136807","https://openalex.org/W2966342255","https://openalex.org/W3000239448","https://openalex.org/W3002912819","https://openalex.org/W3004549544","https://openalex.org/W3014829096","https://openalex.org/W3021426193","https://openalex.org/W3093636427","https://openalex.org/W3135255190","https://openalex.org/W3152624640","https://openalex.org/W3160345471","https://openalex.org/W3177605005","https://openalex.org/W4210816515","https://openalex.org/W4220747451","https://openalex.org/W4226294137","https://openalex.org/W4239799938","https://openalex.org/W4242210993","https://openalex.org/W4254466172","https://openalex.org/W4294732679","https://openalex.org/W4365446886","https://openalex.org/W4385336663","https://openalex.org/W4391558398"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Malware":[0],"scanning":[1],"of":[2,43,91,118,128,162,177,198],"an":[3,146,173],"app":[4,164,185],"market":[5,186],"is":[6],"expected":[7],"to":[8,38,86,106,168],"be":[9,21],"scalable":[10],"and":[11,74,100,122,125,139,166,187],"effective.":[12],"However,":[13],"existing":[14],"approaches":[15],"use":[16],"syntax-based":[17],"features":[18,28],"that":[19,131],"can":[20,140],"evaded":[22],"by":[23,33],"transformation":[24],"attacks":[25],"or":[26],"semantic-based":[27],"which":[29,193],"are":[30,104,155],"usually":[31],"extracted":[32,109],"expensive":[34],"program":[35,83],"analysis.":[36],"Therefore,":[37],"address":[39],"the":[40,65,88,92,108,126,160,183,196],"scalability":[41],"challenges":[42],"traditional":[44],"heavyweight":[45],"static":[46],"analysis,":[47],"we":[48,171],"propose":[49],"a":[50,70],"graph-based":[51],"lightweight":[52],"approach":[53],"<italic":[54,61,80,113,132,199],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[55,62,81,114,133,200],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">MalScan</i>":[56,63,115,134,201],"for":[57],"Android":[58,143,163],"malware":[59,144,204],"detection.":[60],"considers":[64],"function":[66],"call":[67],"graph":[68],"as":[69,148,150],"complex":[71],"social":[72],"network":[73],"employs":[75],"centrality":[76],"analysis":[77],"on":[78,116,202],"sensitive":[79],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">application":[82],"interfaces</i>":[84],"(APIs)":[85],"express":[87],"semantic":[89],"characteristics":[90],"graph.":[93],"On":[94],"this":[95],"basis,":[96],"machine":[97],"learning":[98,102],"algorithms":[99,103],"ensemble":[101],"applied":[105],"classify":[107],"features.":[110],"We":[111],"evaluate":[112],"datasets":[117],"104,892":[119],"benign":[120],"apps":[121],"108,640":[123],"malwares,":[124],"results":[127],"experiments":[129],"indicate":[130],"outperforms":[135],"six":[136],"state-of-the-art":[137],"detectors":[138],"quickly":[141],"detect":[142],"with":[145],"f-value":[147],"high":[149],"99%.":[151],"In":[152],"addition,":[153],"there":[154],"also":[156],"significant":[157],"improvements":[158],"in":[159,182],"robustness":[161,167],"evolution":[165],"obfuscation.":[169],"Finally,":[170],"conduct":[172],"exhaustive":[174],"statistical":[175],"study":[176],"over":[178],"one":[179],"million":[180],"applications":[181],"Google-Play":[184],"successfully":[188],"identify":[189],"498":[190],"zero-day":[191],"malware,":[192],"further":[194],"validates":[195],"feasibility":[197],"market-wide":[203],"scanning.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
