{"id":"https://openalex.org/W2994776994","doi":"https://doi.org/10.1145/3368756.3369091","title":"Deep learning for detecting Android malwares","display_name":"Deep learning for detecting Android malwares","publication_year":2019,"publication_date":"2019-10-02","ids":{"openalex":"https://openalex.org/W2994776994","doi":"https://doi.org/10.1145/3368756.3369091","mag":"2994776994"},"language":"en","primary_location":{"id":"doi:10.1145/3368756.3369091","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369091","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Soussi Ilham","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Soussi Ilham","raw_affiliation_strings":["University of Abdelmalek, Essaadi (UAE), Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"University of Abdelmalek, Essaadi (UAE), Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ghadi Abderrahim","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Ghadi Abderrahim","raw_affiliation_strings":["University of Abdelmalek, Essaadi (UAE), Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"University of Abdelmalek, Essaadi (UAE), Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076145757","display_name":"Boudhir Anouar Abdelhakim","orcid":"https://orcid.org/0000-0003-4036-9956"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Boudhir Anouar Abdelhakim","raw_affiliation_strings":["University of Abdelmalek, Essaadi (UAE), Tangier, Morocco"],"affiliations":[{"raw_affiliation_string":"University of Abdelmalek, Essaadi (UAE), Tangier, Morocco","institution_ids":["https://openalex.org/I240042149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I240042149"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15629322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.817969560623169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7745474576950073},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7200977206230164},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6991898417472839},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.680519163608551},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6554075479507446},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6359509229660034},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6229603290557861},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6020291447639465},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5450683832168579},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5026402473449707},{"id":"https://openalex.org/keywords/learning-classifier-system","display_name":"Learning classifier system","score":0.4587235152721405},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23504069447517395},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1678924262523651},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.16700565814971924}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.817969560623169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7745474576950073},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7200977206230164},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6991898417472839},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.680519163608551},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6554075479507446},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6359509229660034},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6229603290557861},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6020291447639465},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5450683832168579},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5026402473449707},{"id":"https://openalex.org/C199190896","wikidata":"https://www.wikidata.org/wiki/Q3509276","display_name":"Learning classifier system","level":3,"score":0.4587235152721405},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23504069447517395},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1678924262523651},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.16700565814971924}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3368756.3369091","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369091","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2143612262","https://openalex.org/W2406349003","https://openalex.org/W2586845402","https://openalex.org/W2618353736","https://openalex.org/W2767895109","https://openalex.org/W2885595934","https://openalex.org/W2897619937","https://openalex.org/W2901023650","https://openalex.org/W2903765771","https://openalex.org/W2905808289","https://openalex.org/W2912577610","https://openalex.org/W2919115771","https://openalex.org/W2932205382","https://openalex.org/W2946452775","https://openalex.org/W4231109964","https://openalex.org/W4297790391"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2895504842","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"The":[0],"revolution":[1],"and":[2,19,31,41,59,106,130],"development":[3],"of":[4,39,79,108,119,128,133],"malwares":[5,40,88],"over":[6],"time":[7],"necessitate":[8],"an":[9,109],"intensive":[10],"researches":[11],"on":[12,100,112,117],"advanced":[13],"techniques":[14,105],"to":[15,27,35,44,123],"secure":[16],"user's":[17],"personal":[18],"critical":[20],"information,":[21],"the":[22,67,72],"most":[23],"challenging":[24],"task":[25],"is":[26,76],"build":[28],"a":[29,77,83,97,124],"strong":[30],"robust":[32],"classifier":[33],"allows":[34],"detect":[36],"different":[37,134],"types":[38],"being":[42],"able":[43],"defeat":[45],"zero-day":[46],"malware":[47,68,131],"attacks.":[48],"Machine":[49],"learning":[50,74,114],"algorithms":[51],"as":[52],"SVM":[53],"(support":[54],"vector":[55],"machine),":[56],"Random":[57],"Forest":[58],"Na\u00efve":[60],"Bayes":[61],"are":[62],"well-known":[63],"choices":[64],"for":[65],"building":[66],"classifier,":[69],"even":[70],"though":[71],"deep":[73,113],"which":[75],"subfield":[78],"machine":[80],"learning,":[81],"has":[82],"portion":[84],"in":[85],"classifying":[86],"android":[87,120],"with":[89],"high":[90],"precision.":[91],"In":[92],"this":[93],"paper":[94],"we":[95],"present":[96],"modest":[98],"study":[99],"difference":[101],"between":[102],"using":[103],"both":[104],"proposition":[107],"approach":[110],"based":[111],"technique":[115],"applied":[116],"Apk":[118],"applications":[121,132],"belong":[122],"heterogeneous":[125],"data":[126],"combined":[127],"benign":[129],"types.":[135]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
