{"id":"https://openalex.org/W2792310543","doi":"https://doi.org/10.1109/tii.2017.2789219","title":"Significant Permission Identification for Machine-Learning-Based Android Malware Detection","display_name":"Significant Permission Identification for Machine-Learning-Based Android Malware Detection","publication_year":2018,"publication_date":"2018-01-12","ids":{"openalex":"https://openalex.org/W2792310543","doi":"https://doi.org/10.1109/tii.2017.2789219","mag":"2792310543"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2017.2789219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2017.2789219","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100364819","display_name":"Jin Li","orcid":"https://orcid.org/0000-0003-0385-8793"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jin Li","raw_affiliation_strings":["School of Computer Science and Educational Software, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Educational Software, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015105117","display_name":"Lichao Sun","orcid":"https://orcid.org/0000-0003-1539-7939"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lichao Sun","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Chicago, Chicago, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Chicago, Chicago, USA","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042277127","display_name":"Qiben Yan","orcid":"https://orcid.org/0000-0001-6272-7668"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiben Yan","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nebraska\u2013Lincoln, Lincoln, NE, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nebraska\u2013Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438040","display_name":"Zhiqiang Li","orcid":"https://orcid.org/0000-0001-5999-3658"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiqiang Li","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nebraska\u2013Lincoln, Lincoln, NE, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nebraska\u2013Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038574274","display_name":"Witawas Srisa\u2010an","orcid":"https://orcid.org/0000-0003-0021-5696"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Witawas Srisa-an","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nebraska\u2013Lincoln, Lincoln, NE, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nebraska\u2013Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069606493","display_name":"Heng Ye","orcid":"https://orcid.org/0000-0002-6560-9883"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Ye","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100364819"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":52.5589,"has_fulltext":false,"cited_by_count":603,"citation_normalized_percentile":{"value":0.9996094,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"14","issue":"7","first_page":"3216","last_page":"3225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8695441484451294},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8319947123527527},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7920088768005371},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7428498268127441},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5952597856521606},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5918227434158325},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5181044936180115},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.4960196912288666},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.48390230536460876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41572558879852295},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2024863064289093}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8695441484451294},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8319947123527527},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7920088768005371},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7428498268127441},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5952597856521606},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5918227434158325},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5181044936180115},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.4960196912288666},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.48390230536460876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41572558879852295},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2024863064289093},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2017.2789219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2017.2789219","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[{"id":"https://openalex.org/G1242409134","display_name":null,"funder_award_id":"FA8750-14-2-0053","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5499492334","display_name":null,"funder_award_id":"61472091","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320336607","display_name":"Natural Science Foundation of Guangdong Province for Distinguished Young Scholars","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W121173099","https://openalex.org/W1484413656","https://openalex.org/W1856835768","https://openalex.org/W2041276426","https://openalex.org/W2060692877","https://openalex.org/W2087970742","https://openalex.org/W2114275288","https://openalex.org/W2118978333","https://openalex.org/W2122646361","https://openalex.org/W2122672392","https://openalex.org/W2133990480","https://openalex.org/W2158874007","https://openalex.org/W2184590024","https://openalex.org/W2312446965","https://openalex.org/W2334842536","https://openalex.org/W2344743250","https://openalex.org/W2510535264","https://openalex.org/W2597998853","https://openalex.org/W2604462068","https://openalex.org/W2609225916","https://openalex.org/W2626320814","https://openalex.org/W2752901856","https://openalex.org/W2768073432","https://openalex.org/W2768773469","https://openalex.org/W2963674136","https://openalex.org/W2964187630","https://openalex.org/W4242210993","https://openalex.org/W6628750762","https://openalex.org/W6745419587"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2538622067","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4210309948","https://openalex.org/W3211901564","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W4388923452"],"abstract_inverted_index":{"The":[0,192],"alarming":[1],"growth":[2],"rate":[3],"of":[4,76,109,113,124,158,177,211,241,257],"malicious":[5,26,146],"apps":[6,77],"has":[7],"become":[8],"a":[9,24,43,73,79,91,185,197],"serious":[10,38],"issue":[11],"that":[12,23,48,137,166,188,195,234],"sets":[13],"back":[14],"the":[15,70,103,107,128,133,175,204,220,226,231,260],"prosperous":[16],"mobile":[17],"ecosystem.":[18],"A":[19],"recent":[20],"report":[21],"indicates":[22],"new":[25],"app":[27],"for":[28,72],"Android":[29,110,118],"is":[30,201,251],"introduced":[31],"every":[32],"10":[33],"s.":[34],"To":[35],"combat":[36],"this":[37,83],"malware":[39,45,54,57,92,159,258,265],"campaign,":[40],"we":[41,85,120,206],"need":[42],"scalable":[44],"detection":[46,58,71,93],"approach":[47,187,228],"can":[49,138,207],"effectively":[50],"and":[51,65,115,145,160,215,262],"efficiently":[52],"identify":[53,132],"apps.":[55,147,162],"Numerous":[56],"tools":[59],"have":[60],"been":[61],"developed,":[62],"including":[63],"system-level":[64],"network-level":[66],"approaches.":[67],"However,":[68],"scaling":[69],"large":[74],"bundle":[75],"remains":[78],"challenging":[80],"task.":[81],"In":[82],"paper,":[84],"introduce":[86],"Significant":[87],"Permission":[88],"IDentification":[89],"(SigPID),":[90],"system":[94],"based":[95],"on":[96],"permission":[97,129],"usage":[98],"analysis":[99,232],"to":[100,131,154],"cope":[101],"with":[102],"rapid":[104],"increase":[105],"in":[106,141,259],"number":[108],"malware.":[111],"Instead":[112],"extracting":[114],"analyzing":[116],"all":[117,190,243],"permissions,":[119,183],"develop":[121],"three":[122],"levels":[123],"pruning":[125],"by":[126,225,254],"mining":[127],"data":[130],"most":[134],"significant":[135],"permissions":[136,169],"be":[139],"effective":[140,253],"distinguishing":[142],"between":[143],"benign":[144,161],"SigPID":[148,250],"then":[149,173],"utilizes":[150],"machine-learning-based":[151],"classification":[152],"methods":[153],"classify":[155],"different":[156],"families":[157],"Our":[163],"evaluation":[164],"finds":[165],"only":[167,181],"22":[168,182],"are":[170,218,235],"significant.":[171],"We":[172],"compare":[174],"performance":[176],"our":[178],"approach,":[179],"using":[180,242],"against":[184,246],"baseline":[186,227],"analyzes":[189],"permissions.":[191,244],"results":[193],"indicate":[194],"when":[196],"support":[198],"vector":[199],"machine":[200],"used":[202],"as":[203,222],"classifier,":[205],"achieve":[208],"over":[209],"90%":[210],"precision,":[212],"recall,":[213],"accuracy,":[214],"F-measure,":[216],"which":[217],"about":[219],"same":[221],"those":[223,240],"produced":[224],"while":[229],"incurring":[230],"times":[233,237],"4-32":[236],"less":[238],"than":[239],"Compared":[245],"other":[247],"state-of-the-art":[248],"approaches,":[249],"more":[252],"detecting":[255],"93.62%":[256],"dataset":[261],"91.4%":[263],"unknown/new":[264],"samples.":[266]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":45},{"year":2024,"cited_by_count":61},{"year":2023,"cited_by_count":81},{"year":2022,"cited_by_count":90},{"year":2021,"cited_by_count":95},{"year":2020,"cited_by_count":104},{"year":2019,"cited_by_count":61},{"year":2018,"cited_by_count":56},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
