{"id":"https://openalex.org/W4386495209","doi":"https://doi.org/10.1109/tr.2023.3304389","title":"An Empirical Study on Android Malware Characterization by Social Network Analysis","display_name":"An Empirical Study on Android Malware Characterization by Social Network Analysis","publication_year":2023,"publication_date":"2023-09-07","ids":{"openalex":"https://openalex.org/W4386495209","doi":"https://doi.org/10.1109/tr.2023.3304389"},"language":"en","primary_location":{"id":"doi:10.1109/tr.2023.3304389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2023.3304389","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101883736","display_name":"Haojun Zhao","orcid":"https://orcid.org/0000-0003-0848-9528"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haojun Zhao","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056381213","display_name":"Yueming Wu","orcid":"https://orcid.org/0000-0002-1515-3558"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yueming Wu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101883736"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.61,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65800839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"73","issue":"1","first_page":"757","last_page":"770"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8526239395141602},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7280277013778687},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6992155313491821},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6286768317222595},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.5272454619407654},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.47375044226646423},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4610556364059448},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.43236997723579407},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42215657234191895},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.41951534152030945},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3312608599662781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2677401006221771},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22034507989883423},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.19202271103858948},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.17122891545295715},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1376917064189911},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11883386969566345},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08127602934837341}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8526239395141602},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7280277013778687},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6992155313491821},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6286768317222595},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.5272454619407654},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47375044226646423},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4610556364059448},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.43236997723579407},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42215657234191895},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.41951534152030945},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3312608599662781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2677401006221771},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22034507989883423},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.19202271103858948},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.17122891545295715},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1376917064189911},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11883386969566345},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08127602934837341}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tr.2023.3304389","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2023.3304389","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1943233084","https://openalex.org/W1956519559","https://openalex.org/W1984156542","https://openalex.org/W2026417691","https://openalex.org/W2056944867","https://openalex.org/W2058180826","https://openalex.org/W2060692877","https://openalex.org/W2080996291","https://openalex.org/W2087970742","https://openalex.org/W2088479623","https://openalex.org/W2092942461","https://openalex.org/W2122672392","https://openalex.org/W2125725243","https://openalex.org/W2127723417","https://openalex.org/W2130476447","https://openalex.org/W2130790725","https://openalex.org/W2156655865","https://openalex.org/W2156744053","https://openalex.org/W2157635833","https://openalex.org/W2168103835","https://openalex.org/W2324464293","https://openalex.org/W2407313496","https://openalex.org/W2576498804","https://openalex.org/W2606250847","https://openalex.org/W2737578512","https://openalex.org/W2783327762","https://openalex.org/W2792310543","https://openalex.org/W2794510434","https://openalex.org/W2890756461","https://openalex.org/W2895504842","https://openalex.org/W2901033482","https://openalex.org/W2902979785","https://openalex.org/W2904470035","https://openalex.org/W2909609357","https://openalex.org/W2939342150","https://openalex.org/W2949719129","https://openalex.org/W2961099251","https://openalex.org/W2963954089","https://openalex.org/W2964136807","https://openalex.org/W2966342255","https://openalex.org/W2997591727","https://openalex.org/W3000239448","https://openalex.org/W3160345471","https://openalex.org/W3176448712","https://openalex.org/W3177605005","https://openalex.org/W3209736367","https://openalex.org/W4239799938","https://openalex.org/W4242210993","https://openalex.org/W4313036228","https://openalex.org/W6628532452","https://openalex.org/W6712192629"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W4312334973","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W4327939473","https://openalex.org/W2085301524","https://openalex.org/W2591124010","https://openalex.org/W4311848503","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Android":[0,16,85,100],"malware":[1,17,69,86,118,134,178,199],"detection":[2,18,200],"has":[3,12],"always":[4],"been":[5,26],"a":[6,37,45,54,138,205],"hot":[7],"research":[8,109],"field.":[9],"Prior":[10],"work":[11],"validated":[13],"that":[14,162],"graph-based":[15,198],"methods":[19,107],"are":[20,64],"effective,":[21],"and":[22,51,102,153,187],"several":[23],"works":[24],"have":[25],"proposed":[27],"to":[28,59,83,108,124,156],"regard":[29],"the":[30,79,110,126,163,170,184,192],"call":[31],"graph":[32],"of":[33,56,112,128],"an":[34,122],"app":[35],"as":[36,58,148,204],"social":[38,46,61,89,114,130,173,202],"network":[39,47,62,90,115,131,174],"for":[40,150,197],"more":[41,65],"efficient":[42],"classification.":[43,158],"However,":[44],"contains":[48],"many":[49],"properties":[50,63,116,132,147,203],"there":[52],"is":[53,169],"lack":[55],"perception":[57],"which":[60],"useful":[66],"in":[67,74,121,176],"differentiating":[68],"from":[70,179],"benign":[71,180],"apps.":[72,181],"Therefore,":[73],"this":[75],"article,":[76],"we":[77,136,190],"present":[78,191],"first":[80],"empirical":[81],"study":[82,160],"analyze":[84],"by":[87,144],"different":[88],"properties.":[91],"We":[92],"conduct":[93],"extensive":[94],"statistical":[95],"analysis":[96],"on":[97,117,133],"100":[98],"000":[99],"apps":[101],"apply":[103],"three":[104],"feature":[105],"ranking":[106],"ability":[111],"57":[113],"detection.":[119],"Moreover,":[120],"effort":[123],"validate":[125],"effectiveness":[127],"these":[129,146],"detection,":[135],"implement":[137],"tool":[139],"called":[140],"<italic":[141,164],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[142,165],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SNADroid</i>":[143],"using":[145,201],"features":[149,196],"models":[151],"training":[152],"use":[154],"it":[155],"complete":[157],"Our":[159],"reveals":[161],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">average":[166],"triangles":[167],"number</i>":[168],"most":[171,194],"impactful":[172],"property":[175],"distinguishing":[177],"Combined":[182],"with":[183],"experimental":[185],"results":[186],"in-depth":[188],"analysis,":[189],"15":[193],"effective":[195],"guideline.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
