{"id":"https://openalex.org/W2604173224","doi":"https://doi.org/10.1177/1550147717703116","title":"Fuzzy\u2013synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets","display_name":"Fuzzy\u2013synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets","publication_year":2017,"publication_date":"2017-04-01","ids":{"openalex":"https://openalex.org/W2604173224","doi":"https://doi.org/10.1177/1550147717703116","mag":"2604173224"},"language":"en","primary_location":{"id":"doi:10.1177/1550147717703116","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147717703116","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147717703116","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147717703116","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102774019","display_name":"Yanping Xu","orcid":"https://orcid.org/0000-0003-3506-6352"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanping Xu","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047996469","display_name":"Chunhua Wu","orcid":"https://orcid.org/0000-0003-0535-6236"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunhua Wu","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076259905","display_name":"Kangfeng Zheng","orcid":"https://orcid.org/0000-0002-1160-5596"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kangfeng Zheng","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103099146","display_name":"Xinxin Niu","orcid":"https://orcid.org/0000-0002-8143-0189"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinxin Niu","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071134614","display_name":"Yixian Yang","orcid":"https://orcid.org/0000-0001-8067-4774"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixian Yang","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102774019"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":0.9751,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.81331088,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"13","issue":"4","first_page":"155014771770311","last_page":"155014771770311"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.9871540069580078},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7127354145050049},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6076822280883789},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6071314811706543},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5312013030052185},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5257749557495117},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5201359391212463},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4516940116882324},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.4486793875694275},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4049695134162903},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13516807556152344},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.13490068912506104}],"concepts":[{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.9871540069580078},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7127354145050049},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6076822280883789},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6071314811706543},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5312013030052185},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5257749557495117},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5201359391212463},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4516940116882324},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.4486793875694275},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4049695134162903},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13516807556152344},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.13490068912506104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1177/1550147717703116","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147717703116","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147717703116","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:13:y:2017:i:4:p:1550147717703116","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1177/1550147717703116","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:5d6b763dcfd54571a83cdccfb9dd3cd4","is_oa":true,"landing_page_url":"https://doaj.org/article/5d6b763dcfd54571a83cdccfb9dd3cd4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 13 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1177/1550147717703116","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147717703116","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147717703116","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1860484090","display_name":null,"funder_award_id":"61602052","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2604173224.pdf","grobid_xml":"https://content.openalex.org/works/W2604173224.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W79549259","https://openalex.org/W907501016","https://openalex.org/W1964241047","https://openalex.org/W1971361999","https://openalex.org/W1982730827","https://openalex.org/W1999318832","https://openalex.org/W2003078486","https://openalex.org/W2010256880","https://openalex.org/W2013238257","https://openalex.org/W2040010062","https://openalex.org/W2072615238","https://openalex.org/W2074888575","https://openalex.org/W2076556084","https://openalex.org/W2080157505","https://openalex.org/W2090061444","https://openalex.org/W2097819183","https://openalex.org/W2103614420","https://openalex.org/W2118978333","https://openalex.org/W2119191234","https://openalex.org/W2137822999","https://openalex.org/W2148143831","https://openalex.org/W2168025622","https://openalex.org/W2279597087","https://openalex.org/W2309755354","https://openalex.org/W2608239929","https://openalex.org/W2911640577","https://openalex.org/W2913371536","https://openalex.org/W4238316456","https://openalex.org/W4240886128","https://openalex.org/W4315746341"],"related_works":["https://openalex.org/W2766503024","https://openalex.org/W2781247653","https://openalex.org/W4206637278","https://openalex.org/W3196098778","https://openalex.org/W3211250490","https://openalex.org/W4360584310","https://openalex.org/W2981515171","https://openalex.org/W80466363","https://openalex.org/W2924282518","https://openalex.org/W3080872054"],"abstract_inverted_index":{"In":[0],"previous":[1],"work,":[2],"imbalanced":[3,29],"datasets":[4,30],"composed":[5],"of":[6,82,90,119],"more":[7,44,99,127,145],"benign":[8],"samples":[9],"(the":[10,17],"majority":[11,35,84,156],"class)":[12,19],"than":[13],"the":[14,34,39,51,72,79,83,91,108,112,122,133,137,155,179,183],"malicious":[15],"one":[16],"minority":[18,40,61,74,92,95,104,113,123,146,161,166,171,180],"have":[20,115],"been":[21],"widely":[22],"adopted":[23],"in":[24,107],"Android":[25],"malware":[26],"detection.":[27],"These":[28],"bias":[31],"learning":[32],"toward":[33],"class,":[36,93],"so":[37],"that":[38,89,143],"class":[41,85,105,124,181],"examples":[42,101,106,114],"are":[43,126,150],"likely":[45,128],"to":[46,88,121,129,154],"be":[47,130],"misclassified.":[48,131],"To":[49],"solve":[50],"problem,":[52],"we":[53],"propose":[54],"a":[55,116],"new":[56,134],"oversampling":[57,62,75,96,162,167,172],"method":[58],"called":[59],"fuzzy\u2013synthetic":[60,94,170],"technique,":[63],"which":[64],"is":[65],"based":[66],"on":[67,177],"fuzzy":[68,109],"set":[69],"theory":[70],"and":[71,125,148,164,182],"synthetic":[73,100,135,160],"technique":[76,97,163,168,173],"method.":[77],"As":[78],"sample":[80],"size":[81],"increases":[86],"relative":[87],"generates":[98],"for":[102],"each":[103],"region,":[110],"where":[111],"low":[117],"degree":[118],"membership":[120],"Using":[132],"examples,":[136,147],"classifiers":[138],"build":[139],"larger":[140],"decision":[141],"regions":[142],"contain":[144],"they":[149],"no":[151],"longer":[152],"biased":[153],"class.":[157],"Compared":[158],"with":[159],"Borderline\u2013synthetic":[165],"methods,":[169],"achieves":[174],"higher":[175],"accuracy":[176],"both":[178],"entire":[184],"datasets.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
