{"id":"https://openalex.org/W3036833724","doi":"https://doi.org/10.1109/wcnc45663.2020.9120537","title":"SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning","display_name":"SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3036833724","doi":"https://doi.org/10.1109/wcnc45663.2020.9120537","mag":"3036833724"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc45663.2020.9120537","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc45663.2020.9120537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046184004","display_name":"Ji Wang","orcid":"https://orcid.org/0000-0002-4199-2793"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ji Wang","raw_affiliation_strings":["School of Software and Microelectronics, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108057522","display_name":"Qi Jing","orcid":"https://orcid.org/0009-0001-1302-607X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Jing","raw_affiliation_strings":["School of Software and Microelectronics, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076420180","display_name":"Jianbo Gao","orcid":"https://orcid.org/0000-0002-5391-8152"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbo Gao","raw_affiliation_strings":["School of Electronics Engineering and Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007798135","display_name":"Xuanwei Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuanwei Qiu","raw_affiliation_strings":["School of Software and Microelectronics, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046184004"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":2.36441085,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.89518991,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8443536162376404},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8316158056259155},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.8056510090827942},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.741077721118927},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6813796758651733},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.590787947177887},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5522310137748718},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.44918546080589294},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4183931052684784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19820356369018555},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13090845942497253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8443536162376404},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8316158056259155},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.8056510090827942},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.741077721118927},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6813796758651733},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.590787947177887},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5522310137748718},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.44918546080589294},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4183931052684784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19820356369018555},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13090845942497253},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc45663.2020.9120537","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc45663.2020.9120537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1943233084","https://openalex.org/W2018316318","https://openalex.org/W2077278164","https://openalex.org/W2100128988","https://openalex.org/W2111977474","https://openalex.org/W2118277375","https://openalex.org/W2164544703","https://openalex.org/W2586845402","https://openalex.org/W2599823825","https://openalex.org/W2732916693","https://openalex.org/W2751702350","https://openalex.org/W2765271136","https://openalex.org/W2777119424","https://openalex.org/W2964292098","https://openalex.org/W3023540311","https://openalex.org/W6676818943","https://openalex.org/W6684636516","https://openalex.org/W6733068961"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"For":[0],"the":[1,36,45,55,58,78,84,109,122,126,133,139,151],"dramatic":[2],"increase":[3],"of":[4,10,38,47,60,111,125,132],"Android":[5,24,90],"malware":[6,25,91],"and":[7,40,129],"low":[8],"efficiency":[9],"manual":[11],"check":[12,64],"process,":[13],"deep":[14],"learning":[15],"methods":[16],"started":[17],"to":[18,100,108,119],"be":[19,66],"an":[20,102],"auxiliary":[21],"means":[22],"for":[23],"detection":[26,92],"these":[27,30],"years.":[28],"However,":[29],"models":[31],"are":[32],"highly":[33],"dependent":[34],"on":[35,95],"quality":[37,46,59,110],"datasets,":[39],"perform":[41],"unsatisfactory":[42],"results":[43,136],"when":[44],"training":[48],"data":[49],"is":[50],"not":[51,105],"good":[52],"enough.":[53],"In":[54],"real":[56],"world,":[57],"datasets":[61],"without":[62],"manually":[63],"cannot":[65],"guaranteed,":[67],"even":[68],"Google":[69],"Play":[70],"may":[71],"contain":[72],"malicious":[73],"applications,":[74],"which":[75],"will":[76],"cause":[77],"trained":[79],"model":[80,115],"failure.":[81],"To":[82],"address":[83],"challenge,":[85],"we":[86],"propose":[87],"a":[88,143],"robust":[89,145],"approach":[93,141],"based":[94],"selective":[96],"ensemble":[97],"learning,":[98],"trying":[99],"provide":[101],"effective":[103],"solution":[104],"that":[106,138],"limited":[107],"datasets.":[112],"The":[113],"proposed":[114,140],"utilizes":[116],"genetic":[117],"algorithm":[118],"help":[120],"find":[121],"best":[123],"combination":[124],"component":[127],"learners":[128],"improve":[130],"robustness":[131],"model.":[134],"Our":[135],"show":[137],"achieves":[142],"more":[144],"performance":[146],"than":[147],"other":[148],"approaches":[149],"in":[150],"same":[152],"area.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-02-20T08:17:22.645390","created_date":"2025-10-10T00:00:00"}
