{"id":"https://openalex.org/W3009677746","doi":"https://doi.org/10.1145/3374664.3375746","title":"DANdroid","display_name":"DANdroid","publication_year":2020,"publication_date":"2020-03-13","ids":{"openalex":"https://openalex.org/W3009677746","doi":"https://doi.org/10.1145/3374664.3375746","mag":"3009677746"},"language":"en","primary_location":{"id":"doi:10.1145/3374664.3375746","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://pureadmin.qub.ac.uk/ws/files/194648730/DANdroid_cameraV1.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089028359","display_name":"Stuart Millar","orcid":"https://orcid.org/0000-0002-4258-7853"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Stuart Millar","raw_affiliation_strings":["Queen's University of Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University of Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049691746","display_name":"Niall McLaughlin","orcid":"https://orcid.org/0000-0002-0917-9145"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Niall McLaughlin","raw_affiliation_strings":["Queen's University of Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University of Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014600847","display_name":"Jes\u00fas Mart\u00ednez del Rinc\u00f3n","orcid":"https://orcid.org/0000-0002-9574-4138"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jesus Martinez del Rincon","raw_affiliation_strings":["Queen's University of Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University of Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018008959","display_name":"Paul Miller","orcid":"https://orcid.org/0000-0002-9280-000X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Miller","raw_affiliation_strings":["Queen's University of Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University of Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073603754","display_name":"Ziming Zhao","orcid":"https://orcid.org/0000-0002-4930-5556"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziming Zhao","raw_affiliation_strings":["Rochester Institute of Technology, Henrietta, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Henrietta, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089028359"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":5.1782,"has_fulltext":true,"cited_by_count":57,"citation_normalized_percentile":{"value":0.96433013,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"353","last_page":"364"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.933516800403595},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8172067999839783},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.741783082485199},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6807335615158081},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6754084229469299},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.6342658996582031},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6048562526702881},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5548461675643921},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5255830883979797},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.497287780046463},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4481297731399536},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4419209063053131},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16510745882987976}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.933516800403595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8172067999839783},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.741783082485199},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6807335615158081},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6754084229469299},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.6342658996582031},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6048562526702881},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5548461675643921},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5255830883979797},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.497287780046463},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4481297731399536},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4419209063053131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16510745882987976},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3374664.3375746","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/ac2020b1-58be-416f-9b96-b0ed66f77589","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/ac2020b1-58be-416f-9b96-b0ed66f77589","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/194648730/DANdroid_cameraV1.pdf","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Millar , S , McLaughlin , N , Martinez del Rincon , J , Miller , P &amp; Zhao , Z 2020 , DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection . in Proceeding of the 10th ACM Conference on Data and Application Security and Privacy . Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy , The 10th ACM Conference on Data and Application Security and Privacy , New Orleans , United States , 16/03/2020 . https://doi.org/10.1145/3374664.3375746","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/ac2020b1-58be-416f-9b96-b0ed66f77589","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/ac2020b1-58be-416f-9b96-b0ed66f77589","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/194648730/DANdroid_cameraV1.pdf","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Millar , S , McLaughlin , N , Martinez del Rincon , J , Miller , P &amp; Zhao , Z 2020 , DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection . in Proceeding of the 10th ACM Conference on Data and Application Security and Privacy . Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy , The 10th ACM Conference on Data and Application Security and Privacy , New Orleans , United States , 16/03/2020 . https://doi.org/10.1145/3374664.3375746","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3009677746.pdf"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W79549259","https://openalex.org/W1731081199","https://openalex.org/W1943233084","https://openalex.org/W1990649188","https://openalex.org/W1999728176","https://openalex.org/W2002278076","https://openalex.org/W2089735638","https://openalex.org/W2092942461","https://openalex.org/W2099471712","https://openalex.org/W2122672392","https://openalex.org/W2167003418","https://openalex.org/W2168347639","https://openalex.org/W2313513770","https://openalex.org/W2324464293","https://openalex.org/W2334842536","https://openalex.org/W2403072371","https://openalex.org/W2407059953","https://openalex.org/W2473365483","https://openalex.org/W2507113366","https://openalex.org/W2563273224","https://openalex.org/W2571682498","https://openalex.org/W2577946330","https://openalex.org/W2598119844","https://openalex.org/W2599823825","https://openalex.org/W2603160474","https://openalex.org/W2619422284","https://openalex.org/W2620844046","https://openalex.org/W2727469818","https://openalex.org/W2735043505","https://openalex.org/W2753692828","https://openalex.org/W2768073432","https://openalex.org/W2783327762","https://openalex.org/W2789983203","https://openalex.org/W2791541601","https://openalex.org/W2798813225","https://openalex.org/W2810290439","https://openalex.org/W2849849680","https://openalex.org/W2885070483","https://openalex.org/W2889233250","https://openalex.org/W2895504842","https://openalex.org/W2897230315","https://openalex.org/W2914982603","https://openalex.org/W2962880130","https://openalex.org/W2963777745","https://openalex.org/W2964136807","https://openalex.org/W3098623025","https://openalex.org/W4247037964","https://openalex.org/W4255501773","https://openalex.org/W4297969478","https://openalex.org/W4300607852","https://openalex.org/W4388022088","https://openalex.org/W6637618735"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2024170198","https://openalex.org/W36091977","https://openalex.org/W2800331776","https://openalex.org/W4382794599","https://openalex.org/W3211159634","https://openalex.org/W2903602818","https://openalex.org/W4296272594","https://openalex.org/W2900526031","https://openalex.org/W2003791967"],"abstract_inverted_index":{"We":[0],"present":[1],"DANdroid,":[2],"a":[3,10,38,64,91],"novel":[4],"Android":[5],"malware":[6,60],"detection":[7],"model":[8,108,137],"using":[9],"deep":[11,93],"learning":[12,57,94],"Discriminative":[13],"Adversarial":[14],"Network":[15],"(DAN)":[16],"that":[17,87,144],"classifies":[18],"both":[19,159],"obfuscated":[20,127],"and":[21,43,84,113,128,131,161],"unobfuscated":[22,129],"apps":[23],"as":[24],"either":[25],"malicious":[26,130],"or":[27],"benign.":[28],"Our":[29],"method,":[30],"which":[31],"we":[32,102],"empirically":[33],"demonstrate":[34,103],"is":[35],"robust":[36],"against":[37],"selection":[39],"of":[40,54,67,77,106,125,142],"four":[41,71],"prevalent":[42],"real-world":[44],"obfuscation":[45,72,99,115,156],"techniques,":[46],"makes":[47],"three":[48,78],"contributions.":[49],"Firstly,":[50],"an":[51,122,139],"innovative":[52],"application":[53],"discriminative":[55],"adversarial":[56],"results":[58],"in":[59,90,119,162],"feature":[61,79],"representations":[62],"with":[63,147],"strong":[65],"degree":[66],"resilience":[68],"to":[69,96,109,153],"the":[70,75,104,148,154],"techniques.":[73],"Secondly,":[74],"use":[76],"sets;":[80],"raw":[81],"opcodes,":[82],"permissions":[83],"API":[85],"calls,":[86],"are":[88],"combined":[89],"multi-view":[92,135],"architecture":[95],"increase":[97],"this":[98],"resilience.":[100],"Thirdly,":[101],"potential":[105],"our":[107,134],"generalize":[110],"over":[111],"rare":[112],"future":[114],"methods":[116,157],"not":[117],"seen":[118],"training.":[120],"With":[121],"overall":[123],"dataset":[124],"68,880":[126],"benign":[132],"samples,":[133],"DAN":[136],"achieves":[138],"average":[140],"F-score":[141],"0.973":[143],"compares":[145],"favourably":[146],"state-of-the-art,":[149],"despite":[150],"being":[151],"exposed":[152],"selected":[155],"applied":[158],"individually":[160],"combination.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2020-03-13T00:00:00"}
