{"id":"https://openalex.org/W3027678336","doi":"https://doi.org/10.1109/tnse.2020.2996379","title":"SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection","display_name":"SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection","publication_year":2020,"publication_date":"2020-05-22","ids":{"openalex":"https://openalex.org/W3027678336","doi":"https://doi.org/10.1109/tnse.2020.2996379","mag":"3027678336"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2020.2996379","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2020.2996379","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071855354","display_name":"Huijuan Zhu","orcid":"https://orcid.org/0000-0003-2751-2607"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Huijuan Zhu","raw_affiliation_strings":["Jiang Su University, Zhen Jiang, China"],"affiliations":[{"raw_affiliation_string":"Jiang Su University, Zhen Jiang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018588825","display_name":"Yang Li","orcid":"https://orcid.org/0000-0002-4268-4004"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang Li","raw_affiliation_strings":["Jiang Su University, Zhen Jiang, China"],"affiliations":[{"raw_affiliation_string":"Jiang Su University, Zhen Jiang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665328","display_name":"Ruidong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ruidong Li","raw_affiliation_strings":["National Institute of Information and Communications and Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications and Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100393871","display_name":"Jianqiang Li","orcid":"https://orcid.org/0000-0002-2208-962X"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianqiang Li","raw_affiliation_strings":["College of Computer and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019805735","display_name":"Zhu\u2010Hong You","orcid":"https://orcid.org/0000-0003-1266-2696"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210106108","display_name":"Xinjiang Technical Institute of Physics & Chemistry","ror":"https://ror.org/00x44h034","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210106108"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuhong You","raw_affiliation_strings":["Xinjiang Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Urumqi, China"],"affiliations":[{"raw_affiliation_string":"Xinjiang Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Urumqi, China","institution_ids":["https://openalex.org/I4210106108","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079301418","display_name":"Houbing Song","orcid":"https://orcid.org/0000-0003-2631-9223"},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houbing Song","raw_affiliation_strings":["Department of of Electrical Engineering and Computer Science, Embry-Riddle Aeronautical University, Daytona Beach, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of of Electrical Engineering and Computer Science, Embry-Riddle Aeronautical University, Daytona Beach, FL, USA","institution_ids":["https://openalex.org/I84475105"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5071855354"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.6158,"has_fulltext":false,"cited_by_count":126,"citation_normalized_percentile":{"value":0.99125954,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":"2","first_page":"984","last_page":"994"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9674999713897705,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7899131178855896},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7824419736862183},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7152076363563538},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.537947952747345},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4836808145046234},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4745646119117737},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.45610055327415466},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4521713852882385},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.4372773766517639},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.4290604591369629},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4277569055557251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2601897120475769},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13544857501983643}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7899131178855896},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7824419736862183},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7152076363563538},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.537947952747345},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4836808145046234},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4745646119117737},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.45610055327415466},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4521713852882385},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.4372773766517639},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.4290604591369629},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4277569055557251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2601897120475769},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13544857501983643},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2020.2996379","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2020.2996379","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2067085294","display_name":null,"funder_award_id":"61802154","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4483138611","display_name":null,"funder_award_id":"1956193","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W1534477342","https://openalex.org/W1555148682","https://openalex.org/W1836465849","https://openalex.org/W1865546541","https://openalex.org/W1964892656","https://openalex.org/W1969934268","https://openalex.org/W2002532360","https://openalex.org/W2003360522","https://openalex.org/W2018316318","https://openalex.org/W2029869759","https://openalex.org/W2032623774","https://openalex.org/W2071536101","https://openalex.org/W2078197322","https://openalex.org/W2094381401","https://openalex.org/W2107093743","https://openalex.org/W2119821739","https://openalex.org/W2130523241","https://openalex.org/W2136922672","https://openalex.org/W2138378624","https://openalex.org/W2140529728","https://openalex.org/W2153393809","https://openalex.org/W2153846939","https://openalex.org/W2166743230","https://openalex.org/W2293066912","https://openalex.org/W2305409997","https://openalex.org/W2308726246","https://openalex.org/W2324464293","https://openalex.org/W2471161958","https://openalex.org/W2488579949","https://openalex.org/W2512358362","https://openalex.org/W2517869697","https://openalex.org/W2519606482","https://openalex.org/W2535301535","https://openalex.org/W2551095084","https://openalex.org/W2582409643","https://openalex.org/W2583329118","https://openalex.org/W2584414817","https://openalex.org/W2587310853","https://openalex.org/W2592230399","https://openalex.org/W2594215738","https://openalex.org/W2600788550","https://openalex.org/W2601621757","https://openalex.org/W2605548712","https://openalex.org/W2612186685","https://openalex.org/W2618398196","https://openalex.org/W2771076441","https://openalex.org/W2781346976","https://openalex.org/W2782729947","https://openalex.org/W2789553255","https://openalex.org/W2791541601","https://openalex.org/W2792310543","https://openalex.org/W2795845996","https://openalex.org/W2796367884","https://openalex.org/W2811313356","https://openalex.org/W2898635601","https://openalex.org/W2901033482","https://openalex.org/W2947576068","https://openalex.org/W2949117887","https://openalex.org/W2963208797","https://openalex.org/W2963519230","https://openalex.org/W2964450831","https://openalex.org/W4239510810","https://openalex.org/W4239799938","https://openalex.org/W4244726870","https://openalex.org/W6633204899","https://openalex.org/W6638667902","https://openalex.org/W6668642437","https://openalex.org/W6733302802"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W4294976063","https://openalex.org/W3003485427","https://openalex.org/W2056388267","https://openalex.org/W4210309948","https://openalex.org/W2249350383","https://openalex.org/W2755037920","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W4388923452"],"abstract_inverted_index":{"The":[0,85,158,193],"popularity":[1],"of":[2,17,30,128,155,188],"the":[3,15,28,33,39,92,97,116,121,126,129,134,153,156,179,201,207,210,220],"Android":[4,57,176,229],"platform":[5],"in":[6,14,44,175,186],"smartphones":[7],"and":[8,32,69,76,95,132,168,181,209],"other":[9],"Internet-of-Things":[10],"devices":[11,31],"has":[12],"resulted":[13],"explosive":[16],"malware":[18],"attacks":[19],"against":[20],"it.":[21],"Malware":[22],"presents":[23],"a":[24,50,196],"serious":[25],"threat":[26],"to":[27,55,60,73,100,119,151,227],"security":[29],"services":[34],"they":[35],"provided,":[36],"e.g.":[37],"stealing":[38],"privacy":[40],"sensitive":[41,163,202],"data":[42,203],"stored":[43],"mobile":[45],"devices.":[46],"This":[47],"work":[48],"raises":[49],"stacking":[51],"ensemble":[52,130],"framework":[53],"SEDMDroid":[54,182],"identify":[56,228],"malware.":[58,230],"Specifically,":[59],"ensure":[61],"individual's":[62],"diversity,":[63],"it":[64],"adopts":[65],"random":[66],"feature":[67],"subspaces":[68],"bootstrapping":[70],"samples":[71],"techniques":[72],"generate":[74],"subset,":[75],"runs":[77],"Principal":[78],"Component":[79],"Analysis":[80],"(PCA)":[81],"on":[82,142,170],"each":[83,102],"subset.":[84],"accuracy":[86,185,212],"is":[87,113,213,223],"probed":[88],"by":[89,147],"keeping":[90],"all":[91],"principal":[93],"components":[94],"using":[96],"whole":[98],"dataset":[99],"train":[101],"base":[103],"learner":[104],"Multi-Layer":[105],"Perception":[106],"(MLP).":[107],"Then,":[108],"Support":[109],"Vector":[110],"Machine":[111],"(SVM)":[112],"employed":[114],"as":[115,178,206],"fusion":[117],"classifier":[118],"learn":[120],"implicit":[122],"supplementary":[123],"information":[124,205],"from":[125],"output":[127],"members":[131],"yield":[133],"final":[135],"prediction":[136],"result.":[137],"We":[138],"show":[139],"experimental":[140],"results":[141,217],"two":[143],"separate":[144],"datasets":[145],"collected":[146],"static":[148,191],"analysis":[149],"way":[150,226],"prove":[152],"effectiveness":[154],"SEDMDroid.":[157],"first":[159],"one":[160],"extracts":[161,200],"permission,":[162],"API,":[164],"monitoring":[165],"system":[166],"event":[167],"so":[169],"that":[171,219],"are":[172],"widely":[173],"used":[174],"malwares":[177],"features,":[180,208],"achieves":[183],"89.07%":[184],"term":[187],"these":[189],"multi-level":[190],"features.":[192],"second":[194],"one,":[195],"public":[197],"big":[198],"dataset,":[199],"flow":[204],"average":[211],"94.92%.":[214],"Promising":[215],"experiment":[216],"reveal":[218],"proposed":[221],"method":[222],"an":[224],"effective":[225]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":30},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":26},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":6}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
