{"id":"https://openalex.org/W4407029455","doi":"https://doi.org/10.1145/3715909","title":"Beyond Decision: Android Malware Description Generation through Profiling Malicious Behavior Trajectory","display_name":"Beyond Decision: Android Malware Description Generation through Profiling Malicious Behavior Trajectory","publication_year":2025,"publication_date":"2025-01-31","ids":{"openalex":"https://openalex.org/W4407029455","doi":"https://doi.org/10.1145/3715909"},"language":"en","primary_location":{"id":"doi:10.1145/3715909","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3715909","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/sis_research/10351","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chunlian Wu","orcid":"https://orcid.org/0009-0008-8584-3360"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunlian Wu","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0009-0008-8584-3360","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100658276","display_name":"Sen Chen","orcid":"https://orcid.org/0000-0001-9477-4100"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sen Chen","raw_affiliation_strings":["College of Cryptology and Cyber Science, Nankai University, China"],"raw_orcid":"https://orcid.org/0000-0001-9477-4100","affiliations":[{"raw_affiliation_string":"College of Cryptology and Cyber Science, Nankai University, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiaming Li","orcid":"https://orcid.org/0009-0004-5421-962X"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaming Li","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0009-0004-5421-962X","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116102789","display_name":"Renchao Chai","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renchao Chai","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, China"],"raw_orcid":"https://orcid.org/0009-0005-0782-7734","affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102012317","display_name":"Lingling Fan","orcid":"https://orcid.org/0000-0002-2428-9297"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingling Fan","raw_affiliation_strings":["College of Cryptology and Cyber Science, Nankai University, China"],"raw_orcid":"https://orcid.org/0000-0002-2428-9297","affiliations":[{"raw_affiliation_string":"College of Cryptology and Cyber Science, Nankai University, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084396416","display_name":"Xiaofei Xie","orcid":"https://orcid.org/0000-0002-1288-6502"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Xiaofei Xie","raw_affiliation_strings":["Singapore Management University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-1288-6502","affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032257261","display_name":"Ruitao Feng","orcid":"https://orcid.org/0000-0001-9080-6865"},"institutions":[{"id":"https://openalex.org/I66809481","display_name":"Southern Cross University","ror":"https://ror.org/001xkv632","country_code":"AU","type":"education","lineage":["https://openalex.org/I66809481"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ruitao Feng","raw_affiliation_strings":["Southern Cross University, Australia"],"raw_orcid":"https://orcid.org/0000-0001-9080-6865","affiliations":[{"raw_affiliation_string":"Southern Cross University, Australia","institution_ids":["https://openalex.org/I66809481"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01412993,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8388199806213379},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8100667595863342},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5554875135421753},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5384101867675781},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42834222316741943},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39457955956459045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27076542377471924}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8388199806213379},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8100667595863342},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5554875135421753},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5384101867675781},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42834222316741943},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39457955956459045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27076542377471924},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3715909","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3715909","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-11352","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/10351","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1145/3715909","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-11352","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/10351","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1145/3715909","raw_type":"Journal Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W121173099","https://openalex.org/W2014390890","https://openalex.org/W2017025011","https://openalex.org/W2122672392","https://openalex.org/W2313513770","https://openalex.org/W2324464293","https://openalex.org/W2399891510","https://openalex.org/W2407059953","https://openalex.org/W2489553161","https://openalex.org/W2591830932","https://openalex.org/W2803054784","https://openalex.org/W2804329017","https://openalex.org/W2885070483","https://openalex.org/W2896042305","https://openalex.org/W2911282308","https://openalex.org/W2912952939","https://openalex.org/W2913107170","https://openalex.org/W2914874661","https://openalex.org/W2963461515","https://openalex.org/W2964221236","https://openalex.org/W2965177634","https://openalex.org/W3000239448","https://openalex.org/W3023529621","https://openalex.org/W3036847733","https://openalex.org/W3048482737","https://openalex.org/W3083155189","https://openalex.org/W3089189066","https://openalex.org/W3104141960","https://openalex.org/W3133963303","https://openalex.org/W3138819813","https://openalex.org/W3209736367","https://openalex.org/W4210816515","https://openalex.org/W4232172926","https://openalex.org/W4239598062","https://openalex.org/W4241131507","https://openalex.org/W4248746314","https://openalex.org/W4281638412","https://openalex.org/W4288093083","https://openalex.org/W4297927038","https://openalex.org/W4306154842","https://openalex.org/W4312543924","https://openalex.org/W4315746341","https://openalex.org/W4385755457","https://openalex.org/W6929402943"],"related_works":["https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Malware":[0],"family":[1],"labels":[2],"and":[3,48,98,110,121,158,162,186,190,201,218,231,248],"key":[4],"features":[5],"used":[6],"for":[7,71],"the":[8,38,41,116,128,135,187,205,225],"decision-making":[9],"of":[10,17,20,40,77,118,153,192],"Android":[11,119,170,212],"malware":[12,61,70,130,178,182,213,250],"detection":[13],"models":[14],"fall":[15],"short":[16],"precise":[18],"comprehension":[19],"malicious":[21,42],"behaviors":[22],"due":[23],"to":[24,58,85,106],"their":[25],"coarse":[26],"granularity.":[27],"To":[28],"solve":[29],"these":[30],"problems,":[31],"in":[32,140,169,246],"this":[33],"paper,":[34],"we":[35],"first":[36],"introduce":[37],"concept":[39],"behavior":[43],"trajectory":[44],"(":[45,91],"MBT":[46,193],")":[47],"propose":[49],"an":[50],"innovative":[51],"approach":[52],"called":[53],"ProMal":[54,56,141,174],".":[55],"aims":[57],"automatically":[59,101],"generate":[60],"descriptions":[62,183,220,241],"with":[63],"fine":[64],"granularity":[65],"through":[66,81,235],"extracted":[67],"MBTs":[68,78,125,147,151,168,209],"from":[69,211],"users.":[72],"Specifically,":[73],"a":[74,87,176,236,243],"labeled":[75],"dataset":[76,179],"is":[79,96,138],"constructed":[80],"substantial":[82],"human":[83],"efforts":[84],"build":[86],"behavioral":[88],"knowledge":[89,136],"graph":[90,137],"BxKG":[92,95,197],").":[93],"The":[94,239],"scalable":[97],"can":[99,144,221],"be":[100,222],"updated":[102],"using":[103,224],"two":[104],"strategies":[105],"ensure":[107],"its":[108,154],"completeness":[109],"timeliness:":[111],"1)":[112],"taking":[113],"into":[114],"consideration":[115],"evolution":[117],"SDKs,":[120],"2)":[122],"mining":[123],"new":[124,146],"by":[126],"leveraging":[127],"widely-used":[129],"datasets.":[131],"We":[132,172],"highlight":[133],"that":[134],"essential":[139],",":[142],"which":[143],"reason":[145],"based":[148,195],"on":[149,175,196],"existing":[150],"because":[152],"structured":[155],"data":[156],"representation":[157],"semantic":[159],"relation":[160],"modeling,":[161],"thus":[163],"helps":[164],"effectively":[165],"extract":[166],"real":[167],"malware.":[171],"evaluated":[173],"recent":[177],"where":[180],"researcher-crafted":[181],"are":[184,233],"available,":[185],"Precision,":[188],"Recall,":[189],"F1-Score":[191],"identification":[194],"reached":[198],"96.97%,":[199],"91.43%,":[200],"0.94,":[202],"respectively,":[203],"outperforming":[204],"state-of-the-art":[206],"approaches.":[207],"Taking":[208],"identified":[210],"as":[214],"inputs,":[215],"precise,":[216],"fine-grained,":[217],"human-readable":[219],"generated":[223,240],"large":[226],"language":[227],"model,":[228],"whose":[229],"readability":[230],"usability":[232],"verified":[234],"user":[237],"study.":[238],"play":[242],"significant":[244],"role":[245],"interpreting":[247],"comprehending":[249],"behaviors.":[251]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
