{"id":"https://openalex.org/W3145971023","doi":"https://doi.org/10.1109/tkde.2021.3067658","title":"A Hybrid Deep Network Framework for Android Malware Detection","display_name":"A Hybrid Deep Network Framework for Android Malware Detection","publication_year":2021,"publication_date":"2021-03-26","ids":{"openalex":"https://openalex.org/W3145971023","doi":"https://doi.org/10.1109/tkde.2021.3067658","mag":"3145971023"},"language":"en","primary_location":{"id":"doi:10.1109/tkde.2021.3067658","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2021.3067658","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071855354","display_name":"Huijuan Zhu","orcid":"https://orcid.org/0000-0003-2751-2607"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui-Juan Zhu","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiang Su University, Zhenjiang, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiang Su University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017914641","display_name":"Liangmin Wang","orcid":"https://orcid.org/0000-0003-0048-5979"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang-Min Wang","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiang Su University, Zhenjiang, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiang Su University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060268538","display_name":"Sheng Zhong","orcid":"https://orcid.org/0000-0002-6581-8730"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Zhong","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419154","display_name":"Yang Li","orcid":"https://orcid.org/0009-0000-4789-9517"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Li","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiang Su University, Zhenjiang, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiang Su University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051706630","display_name":"Victor S. Sheng","orcid":"https://orcid.org/0000-0003-4960-174X"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Victor S. Sheng","raw_affiliation_strings":["Department of Computer Science, Texas Tech University, Lubbock, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071855354"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":5.386,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.96584122,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"34","issue":"12","first_page":"5558","last_page":"5570"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8580284118652344},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7593709230422974},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.710316002368927},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.7093912363052368},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.624823272228241},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6068850755691528},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.5314245223999023},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.47940751910209656},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4627177119255066},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4309505224227905},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.4306638240814209},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.38853919506073},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3793709874153137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07669985294342041}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8580284118652344},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7593709230422974},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.710316002368927},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.7093912363052368},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.624823272228241},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6068850755691528},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.5314245223999023},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.47940751910209656},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4627177119255066},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4309505224227905},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.4306638240814209},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38853919506073},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3793709874153137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07669985294342041},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tkde.2021.3067658","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2021.3067658","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G1308233889","display_name":null,"funder_award_id":"U1836116","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2067085294","display_name":null,"funder_award_id":"61802154","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5429374620","display_name":null,"funder_award_id":"U1736216","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W880911330","https://openalex.org/W1522301498","https://openalex.org/W2019607443","https://openalex.org/W2078197322","https://openalex.org/W2101234009","https://openalex.org/W2112796928","https://openalex.org/W2122672392","https://openalex.org/W2308726246","https://openalex.org/W2321627895","https://openalex.org/W2324464293","https://openalex.org/W2344138609","https://openalex.org/W2552464054","https://openalex.org/W2585508806","https://openalex.org/W2587310853","https://openalex.org/W2588382066","https://openalex.org/W2593903992","https://openalex.org/W2599823825","https://openalex.org/W2601621757","https://openalex.org/W2604308885","https://openalex.org/W2607620859","https://openalex.org/W2619304139","https://openalex.org/W2621187857","https://openalex.org/W2699869760","https://openalex.org/W2739340771","https://openalex.org/W2743587135","https://openalex.org/W2781346976","https://openalex.org/W2782290149","https://openalex.org/W2792310543","https://openalex.org/W2795615756","https://openalex.org/W2795845996","https://openalex.org/W2802731096","https://openalex.org/W2811313356","https://openalex.org/W2885070483","https://openalex.org/W2901033482","https://openalex.org/W2909609357","https://openalex.org/W2912610007","https://openalex.org/W2919115771","https://openalex.org/W2939176882","https://openalex.org/W2947576068","https://openalex.org/W2965177634","https://openalex.org/W2982705228","https://openalex.org/W4239510810","https://openalex.org/W4239799938","https://openalex.org/W4244726870","https://openalex.org/W6631190155","https://openalex.org/W6668642437","https://openalex.org/W6675354045","https://openalex.org/W6734574869","https://openalex.org/W6739665369","https://openalex.org/W6751616570"],"related_works":["https://openalex.org/W2983142544","https://openalex.org/W2891059443","https://openalex.org/W4281663961","https://openalex.org/W3208888551","https://openalex.org/W4313561566","https://openalex.org/W3208386644","https://openalex.org/W4389832810","https://openalex.org/W4220682630","https://openalex.org/W3181622257","https://openalex.org/W3163146846"],"abstract_inverted_index":{"Android":[0,259],"is":[1,140],"a":[2,17,88,98,127,145,179],"growing":[3],"target":[4],"for":[5,43],"malicious":[6],"software":[7],"(malware)":[8],"because":[9],"of":[10,30,76,221,234,239],"its":[11],"popularity":[12],"and":[13,25,114,137,163,194,223],"functionality.":[14],"Malware":[15],"poses":[16],"serious":[18],"threat":[19],"to":[20,48,58,110,120,166,177,213,257],"users\u2019":[21],"privacy,":[22],"money,":[23],"equipment":[24],"file":[26],"integrity.":[27],"A":[28],"series":[29],"data-driven":[31],"malware":[32,89,124,180],"detection":[33,90,125,181,241],"methods":[34,79,236,253],"were":[35],"proposed.":[36],"However,":[37],"there":[38],"exist":[39],"two":[40,186],"key":[41],"challenges":[42],"these":[44],"methods:":[45],"(1)":[46],"how":[47,57],"learn":[49],"effective":[50,255],"feature":[51,70,82,101,116,159,204],"representation":[52,83,205],"from":[53,117],"raw":[54],"data;":[55],"(2)":[56],"reduce":[59],"the":[60,63,74,81,118,123,158,201,219,224,232],"dependence":[61],"on":[62,185],"prior":[64],"knowledge":[65],"or":[66,174],"human":[67],"labors":[68],"in":[69,80],"learning.":[71],"Inspired":[72],"by":[73,97,142,161],"success":[75],"deep":[77,129,147],"learning":[78,84,95,102,131,148,206],"community,":[85],"we":[86,156,230],"propose":[87],"framework":[91],"which":[92,199],"starts":[93],"with":[94,237],"rich-features":[96,119],"novel":[99],"unsupervised":[100,203],"algorithm":[103,132],"Merged":[104],"Sparse":[105,207],"Auto-Encoder":[106],"(MSAE).":[107],"In":[108],"order":[109],"extract":[111],"more":[112],"compact":[113],"discriminative":[115],"further":[121,143,217],"boost":[122],"capability,":[126],"hybrid":[128],"network":[130],"Stacked":[133,150],"Hybrid":[134],"Learning":[135],"MSAE":[136,162,210,222],"SDAE":[138],"(SHLMD)":[139],"established":[141],"incorporating":[144],"classical":[146,202,244],"method":[149,227],"Denoising":[151],"Auto-encoders":[152],"(SDAE).":[153],"After":[154],"that,":[155],"feed":[157],"learned":[160],"SHLMD":[164,191,215],"respectively":[165],"classification":[167],"algorithms,":[168],"e.g.,":[169],"Support":[170],"Vector":[171],"Machine":[172],"(SVM)":[173],"K-NearestNeighbor":[175],"(KNN),":[176],"train":[178],"model.":[182],"Evaluation":[183],"results":[184],"real-world":[187],"datasets":[188],"demonstrate":[189],"that":[190,238,250],"achieves":[192],"94.46":[193],"90.57":[195],"percent":[196],"accuracy":[197],"respectively,":[198],"outperforms":[200],"Auto-encoder":[208],"(SAE).":[209],"performs":[211],"similarly":[212],"SAE.":[214],"can":[216],"improve":[218],"performance":[220,233],"supervised":[225],"fine-tuned":[226],"SDAE.":[228],"Besides,":[229],"compare":[231],"our":[235,251],"state-of-the-art":[240],"approaches,":[242],"including":[243],"deep-learning-based":[245],"methods.":[246],"Extensive":[247],"experiments":[248],"show":[249],"proposed":[252],"are":[254],"enough":[256],"detect":[258],"malware.":[260]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":10}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
