{"id":"https://openalex.org/W2968904481","doi":"https://doi.org/10.1145/3340422.3343639","title":"Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions","display_name":"Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2968904481","doi":"https://doi.org/10.1145/3340422.3343639","mag":"2968904481"},"language":"en","primary_location":{"id":"doi:10.1145/3340422.3343639","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340422.3343639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Asian Internet Engineering Conference on   - AINTEC '19","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009512977","display_name":"Lov Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210101034","display_name":"Birla Institute of Technology and Science - Hyderabad Campus","ror":"https://ror.org/014ctt859","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101034","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Lov Kumar","raw_affiliation_strings":["BITS Pilani Hyderabad, Campus, India"],"affiliations":[{"raw_affiliation_string":"BITS Pilani Hyderabad, Campus, India","institution_ids":["https://openalex.org/I4210101034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063245652","display_name":"Chittaranjan Hota","orcid":"https://orcid.org/0000-0002-6031-6408"},"institutions":[{"id":"https://openalex.org/I4210101034","display_name":"Birla Institute of Technology and Science - Hyderabad Campus","ror":"https://ror.org/014ctt859","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101034","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Chinmay Hota","raw_affiliation_strings":["BITS Pilani Hyderabad, Campus, India"],"affiliations":[{"raw_affiliation_string":"BITS Pilani Hyderabad, Campus, India","institution_ids":["https://openalex.org/I4210101034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068846958","display_name":"Arvind Mahindru","orcid":"https://orcid.org/0000-0002-2129-4509"},"institutions":[{"id":"https://openalex.org/I1341847395","display_name":"DAV University","ror":"https://ror.org/04aenjr55","country_code":"IN","type":"education","lineage":["https://openalex.org/I1341847395"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arvind Mahindru","raw_affiliation_strings":["DAV University, India"],"affiliations":[{"raw_affiliation_string":"DAV University, India","institution_ids":["https://openalex.org/I1341847395"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040291435","display_name":"Lalita Bhanu Murthy Neti","orcid":"https://orcid.org/0000-0002-9187-1869"},"institutions":[{"id":"https://openalex.org/I4210101034","display_name":"Birla Institute of Technology and Science - Hyderabad Campus","ror":"https://ror.org/014ctt859","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101034","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Lalita Bhanu Murthy Neti","raw_affiliation_strings":["BITS Pilani Hyderabad, Campus, India"],"affiliations":[{"raw_affiliation_string":"BITS Pilani Hyderabad, Campus, India","institution_ids":["https://openalex.org/I4210101034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009512977"],"corresponding_institution_ids":["https://openalex.org/I4210101034"],"apc_list":null,"apc_paid":null,"fwci":0.4976,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.63139806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8112539052963257},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7201741933822632},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6920853853225708},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6254557371139526},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6123486161231995},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5382117629051208},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.4995131492614746},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.48373961448669434},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4569973349571228},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45126935839653015},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18878915905952454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8112539052963257},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7201741933822632},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6920853853225708},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6254557371139526},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6123486161231995},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5382117629051208},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.4995131492614746},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.48373961448669434},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4569973349571228},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45126935839653015},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18878915905952454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3340422.3343639","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340422.3343639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Asian Internet Engineering Conference on   - AINTEC '19","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1504573138","https://openalex.org/W2047345132","https://openalex.org/W2074222960","https://openalex.org/W2111072639","https://openalex.org/W2125011234","https://openalex.org/W2158864412","https://openalex.org/W2159369248","https://openalex.org/W2241337554","https://openalex.org/W2275058769","https://openalex.org/W2568897335","https://openalex.org/W2569537748","https://openalex.org/W2599823825","https://openalex.org/W2606020393","https://openalex.org/W2776558668","https://openalex.org/W2891118559","https://openalex.org/W2901295241","https://openalex.org/W2963777745","https://openalex.org/W6600406895","https://openalex.org/W6601700763","https://openalex.org/W6603229553","https://openalex.org/W6603349762","https://openalex.org/W6608148874","https://openalex.org/W6812702289","https://openalex.org/W6824849174"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2395100307","https://openalex.org/W3195312353","https://openalex.org/W4308353525","https://openalex.org/W3200508744","https://openalex.org/W4383468964","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W3195586271","https://openalex.org/W4312234627"],"abstract_inverted_index":{"Android":[0],"is":[1,28],"currently":[2],"the":[3,15,22,56,74,108,130,153,181],"most":[4,134],"popular":[5],"smartphone":[6],"platform":[7],"which":[8],"occupied":[9],"88%":[10],"of":[11,17,24,45,68,96,155,170,176,184,188],"global":[12],"sale":[13],"by":[14],"end":[16],"2nd":[18],"quarter":[19],"2018.":[20],"With":[21],"popularity":[23],"these":[25],"applications,":[26],"it":[27],"also":[29,127,150],"inviting":[30],"cybercriminals":[31,46],"to":[32,47,54,77,106,193],"develop":[33,48,107],"malware":[34,70,113,194],"application":[35],"for":[36,101,110,159,166],"accessing":[37],"important":[38],"information":[39],"from":[40,89],"smartphones.":[41],"The":[42,174],"major":[43],"objective":[44],"Malware":[49],"apps":[50,53,71],"or":[51],"Malicious":[52],"threaten":[55],"organization":[57],"privacy":[58,61],"data,":[59,62],"user":[60,76],"and":[63,81,145,162,178,190,195],"device":[64,82],"integrity.":[65,83],"Early":[66],"identification":[67],"such":[69],"can":[72],"help":[73],"android":[75,112],"save":[78],"private":[79],"data":[80,105,156,161,185],"In":[84],"this":[85],"study,":[86],"features":[87],"extracted":[88],"intermediate":[90],"code":[91],"representations":[92],"obtained":[93],"using":[94,119,133],"decompilation":[95],"APK":[97],"file":[98],"are":[99,117],"used":[100,136],"providing":[102],"requisite":[103],"input":[104],"models":[109,116],"predicting":[111,182],"applications.":[114,197],"These":[115],"trained":[118,132],"extreme":[120],"learning":[121],"with":[122,129],"multiple":[123],"kernel":[124],"functions":[125],"ans":[126],"compared":[128],"model":[131],"frequently":[135],"classifiers":[137],"like":[138],"linear":[139],"regression,":[140,144],"decision":[141],"tree,":[142],"polynomial":[143],"logistic":[146],"regression.":[147],"This":[148],"paper":[149],"focuses":[151],"on":[152],"effectiveness":[154],"sampling":[157],"techniques":[158],"balancing":[160],"feature":[163],"selection":[164],"methods":[165],"selecting":[167],"right":[168],"sets":[169,187],"significant":[171],"uncorrelated":[172],"metrics.":[173],"high-value":[175],"accuracy":[177],"AUC":[179],"confirm":[180],"capability":[183],"sampling,":[186],"metrics,":[189],"training":[191],"algorithms":[192],"normal":[196]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
