{"id":"https://openalex.org/W4404238640","doi":"https://doi.org/10.1109/tsc.2024.3496333","title":"A Novel Knowledge Search Structure for Android Malware Detection","display_name":"A Novel Knowledge Search Structure for Android Malware Detection","publication_year":2024,"publication_date":"2024-11-01","ids":{"openalex":"https://openalex.org/W4404238640","doi":"https://doi.org/10.1109/tsc.2024.3496333"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2024.3496333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2024.3496333","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071855354","display_name":"Huijuan Zhu","orcid":"https://orcid.org/0000-0003-2751-2607"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huijuan Zhu","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","School of Computer Science and Communication Engineering, Jiangsu University, ZhenJiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, ZhenJiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079197556","display_name":"Mengzhen Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengzhen Xia","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","School of Computer Science and Communication Engineering, Jiangsu University, ZhenJiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, ZhenJiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017914641","display_name":"Liangmin Wang","orcid":"https://orcid.org/0000-0003-0048-5979"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangmin Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, NanJing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, NanJing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088881491","display_name":"Zhicheng Xu","orcid":"https://orcid.org/0009-0001-2462-0162"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhicheng Xu","raw_affiliation_strings":["School of Mathematical Sciences, Jiangsu University, Zhenjiang, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051706630","display_name":"Victor S. Sheng","orcid":"https://orcid.org/0000-0003-4960-174X"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Victor S. Sheng","raw_affiliation_strings":["Department of Computer Science, Texas Tech University, Lubbock, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071855354"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22149716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"6","first_page":"3052","last_page":"3064"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9606999754905701,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8409335613250732},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7758868336677551},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7327115535736084},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6004462242126465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3692031502723694},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3316080570220947},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.325893372297287},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2321729063987732}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8409335613250732},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7758868336677551},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7327115535736084},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6004462242126465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3692031502723694},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3316080570220947},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.325893372297287},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2321729063987732}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2024.3496333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2024.3496333","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1997833177","https://openalex.org/W2007857904","https://openalex.org/W2085301524","https://openalex.org/W2407313496","https://openalex.org/W2599823825","https://openalex.org/W2603160474","https://openalex.org/W2746632572","https://openalex.org/W2791675021","https://openalex.org/W2885070483","https://openalex.org/W2890664869","https://openalex.org/W2900275727","https://openalex.org/W2944885779","https://openalex.org/W2947576068","https://openalex.org/W2961820194","https://openalex.org/W2963989339","https://openalex.org/W2969244304","https://openalex.org/W2982705228","https://openalex.org/W2990121995","https://openalex.org/W2990954041","https://openalex.org/W2997676437","https://openalex.org/W2998010923","https://openalex.org/W2998906013","https://openalex.org/W3000239448","https://openalex.org/W3004549544","https://openalex.org/W3006325478","https://openalex.org/W3006711782","https://openalex.org/W3007018545","https://openalex.org/W3007553983","https://openalex.org/W3008923560","https://openalex.org/W3014829096","https://openalex.org/W3016369654","https://openalex.org/W3023529621","https://openalex.org/W3034368386","https://openalex.org/W3089879502","https://openalex.org/W3092079294","https://openalex.org/W3111568621","https://openalex.org/W3133963303","https://openalex.org/W3134215180","https://openalex.org/W3153294612","https://openalex.org/W3160345471","https://openalex.org/W3160974549","https://openalex.org/W3161331107","https://openalex.org/W3165963211","https://openalex.org/W3172909833","https://openalex.org/W3177605005","https://openalex.org/W4205876068","https://openalex.org/W4206705712","https://openalex.org/W4207065299","https://openalex.org/W4210309948","https://openalex.org/W4297387435","https://openalex.org/W4313563606","https://openalex.org/W4381890377","https://openalex.org/W4384129584","https://openalex.org/W6753840322","https://openalex.org/W6866520852"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"While":[0],"the":[1,8,36,91,113,157,172,186],"Android":[2,140,196],"platform":[3],"is":[4,14],"gaining":[5],"explosive":[6],"popularity,":[7],"number":[9],"of":[10,115,122,176,192],"malicious":[11,127],"software":[12],"(malware)":[13],"also":[15],"increasing":[16],"sharply.":[17],"Thus,":[18],"numerous":[19],"malware":[20,116],"detection":[21],"schemes":[22],"based":[23,144],"on":[24,57,145,178],"deep":[25],"learning":[26],"have":[27],"been":[28],"proposed.":[29],"However,":[30],"they":[31],"are":[32,168],"usually":[33,46],"suffering":[34],"from":[35],"cumbersome":[37],"models":[38],"with":[39,61],"complex":[40],"architectures":[41],"and":[42,96,117,135,162,174],"tremendous":[43],"parameters.":[44],"They":[45],"require":[47],"heavy":[48],"computation":[49],"power":[50],"support,":[51],"which":[52,198],"seriously":[53],"limit":[54],"their":[55],"deployment":[56],"actual":[58],"application":[59],"environments":[60],"limited":[62],"resources":[63],"(e.g.,":[64],"mobile":[65],"edge":[66],"devices).":[67],"To":[68],"surmount":[69],"this":[70],"challenge,":[71],"we":[72,110,152],"propose":[73],"a":[74,103],"novel":[75],"Knowledge":[76],"Distillation":[77],"(KD)":[78],"structure\u2014Knowledge":[79],"Search":[80,86],"(KS).":[81],"KS":[82,177],"exploits":[83],"Neural":[84],"Architecture":[85],"(NAS)":[87],"to":[88,126,138,170,194],"adaptively":[89],"bridge":[90],"capability":[92],"gap":[93],"between":[94,160],"teacher":[95],"student":[97],"networks":[98],"in":[99,149],"KD":[100],"by":[101],"introducing":[102],"parallelized":[104],"student-wise":[105],"search":[106],"approach.":[107],"In":[108],"addition,":[109],"carefully":[111],"analyze":[112],"characteristics":[114],"locate":[118],"three":[119],"cost-effective":[120],"types":[121],"features":[123,154],"closely":[124],"related":[125],"attacks,":[128],"namely,":[129],"Application":[130],"Programming":[131],"Interfaces":[132],"(APIs),":[133],"permissions":[134],"vulnerable":[136],"components,":[137],"characterize":[139],"Applications":[141],"(Apps).":[142],"Therefore,":[143],"typical":[146],"samples":[147],"collected":[148],"recent":[150],"years,":[151],"refine":[153],"while":[155],"exploiting":[156],"natural":[158],"relationship":[159],"them,":[161],"construct":[163],"corresponding":[164],"datasets.":[165,180],"Massive":[166],"experiments":[167],"conducted":[169],"investigate":[171],"effectiveness":[173],"sustainability":[175],"these":[179],"Our":[181],"experimental":[182],"results":[183],"show":[184],"that":[185],"proposed":[187],"method":[188],"yields":[189],"an":[190],"accuracy":[191],"97.89%":[193],"detect":[195],"malware,":[197],"performs":[199],"better":[200],"than":[201],"state-of-the-art":[202],"solutions.":[203]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
