{"id":"https://openalex.org/W4295950991","doi":"https://doi.org/10.1145/3545258.3545278","title":"A novel classification approach for Android malware based on feature fusion and natural language processing","display_name":"A novel classification approach for Android malware based on feature fusion and natural language processing","publication_year":2022,"publication_date":"2022-06-11","ids":{"openalex":"https://openalex.org/W4295950991","doi":"https://doi.org/10.1145/3545258.3545278"},"language":"en","primary_location":{"id":"doi:10.1145/3545258.3545278","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3545258.3545278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063671391","display_name":"Jinfu Chen","orcid":"https://orcid.org/0000-0002-3124-5452"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinfu Chen","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088369860","display_name":"Zian Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zian Zhao","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373723","display_name":"Xiao Chen","orcid":"https://orcid.org/0000-0002-4224-6450"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiao Chen","raw_affiliation_strings":["University of Edinburgh, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090272207","display_name":"Saihua Cai","orcid":"https://orcid.org/0000-0003-0743-1156"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saihua Cai","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085707741","display_name":"Shang Yin","orcid":"https://orcid.org/0000-0002-5099-1370"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shang Yin","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103088867","display_name":"Luo Song","orcid":"https://orcid.org/0009-0001-1330-4391"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luo Song","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5063671391"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":0.1486,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.39878645,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"28","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7985559701919556},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7937202453613281},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6931178569793701},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5525571703910828},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5026719570159912},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.48270225524902344},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46185362339019775},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.43715065717697144},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4347565770149231},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3963526785373688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23364797234535217},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21041515469551086}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7985559701919556},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7937202453613281},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6931178569793701},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5525571703910828},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5026719570159912},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.48270225524902344},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46185362339019775},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.43715065717697144},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4347565770149231},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3963526785373688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23364797234535217},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21041515469551086}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3545258.3545278","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3545258.3545278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/4"}],"awards":[{"id":"https://openalex.org/G8630728841","display_name":null,"funder_award_id":"62172194 and U1836116","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2069660113","https://openalex.org/W2768073432","https://openalex.org/W2792310543","https://openalex.org/W2906631928","https://openalex.org/W2917661079","https://openalex.org/W2955992195","https://openalex.org/W2965757567","https://openalex.org/W3004549544","https://openalex.org/W3031942810","https://openalex.org/W3125601055"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"The":[0,135,166],"growing":[1],"use":[2],"of":[3,78,104,145,152],"Android":[4,91,178],"software":[5,25,35,43,92,106],"has":[6],"made":[7],"mobile":[8,18,39,48],"devices":[9],"the":[10,34,54,58,79,85,109,119,141,170,175,188,202,213,219,234,239],"main":[11],"platform":[12],"for":[13,53,93,226],"information":[14,89,158,176],"services":[15],"such":[16],"as":[17],"social":[19],"media":[20],"and":[21,57,68,74,130,143,147,163,183,211,231],"financial":[22],"services.":[23],"Mobile":[24],"provides":[26],"great":[27],"convenience":[28],"but":[29],"also":[30,148,190],"brings":[31],"challenges":[32],"to":[33,46,71,108,139,200],"community.":[36],"For":[37],"example,":[38],"malware,":[40],"a":[41,192],"malicious":[42],"specifically":[44],"designed":[45,199],"target":[47],"devices,":[49],"creates":[50],"security":[51],"concerns":[52],"business":[55],"network":[56,185],"data":[59],"stored":[60],"on":[61,84,238],"it.":[62],"Therefore,":[63],"it":[64],"is":[65],"becoming":[66],"more":[67,69],"important":[70],"effectively":[72],"identify":[73],"classify":[75],"malware.":[76],"Most":[77],"current":[80],"malware-classification":[81],"methods":[82,99],"rely":[83],"specific":[86,150],"(static/dynamic)":[87],"behaviour":[88],"from":[90,177],"improved":[94,235],"malware-detection":[95],"capability.":[96],"Nevertheless,":[97],"these":[98,114],"cannot":[100],"detect":[101],"new":[102],"types":[103],"fraud":[105],"due":[107],"limited":[110],"generalisability.":[111],"To":[112,206],"address":[113],"issues,":[115],"this":[116],"paper":[117],"proposes":[118],"AMC-FN,":[120],"i.e.":[121,156],"an":[122],"Android-based":[123],"malware":[124],"classification":[125,146,171],"method":[126],"using":[127],"feature":[128,164,195,204],"fusion":[129,196,214],"natural":[131,153],"language":[132,154],"processing":[133],"technologies.":[134],"proposed":[136,240],"AMC-FN":[137,167,241],"aims":[138],"improve":[140,201],"dimension":[142],"performance":[144,236],"some":[149],"functions":[151],"processing,":[155],"mutual":[157],"method,":[159],"n-gram":[160],"word":[161],"segmentation":[162],"mapping.":[165],"framework":[168,189],"improves":[169],"dimensions":[172],"by":[173,218],"leveraging":[174],"APK":[179],"permission,":[180],"API":[181],"calls":[182],"realistic":[184],"traffic.":[186],"Moreover,":[187],"contains":[191],"novel":[193],"multi-level":[194],"algorithm":[197],"(MFFA)":[198],"weighted":[203],"fusion.":[205],"obtain":[207],"better":[208],"fine":[209],"granularity":[210],"generalisability,":[212],"features":[215],"are":[216],"used":[217],"optimized":[220],"SVM":[221],"(Support":[222],"Vector":[223],"Machine)":[224],"classifier":[225],"training.":[227],"Our":[228],"experimental":[229],"measurements":[230],"comparisons":[232],"show":[233],"based":[237],"framework.":[242]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
