{"id":"https://openalex.org/W4214733042","doi":"https://doi.org/10.1587/transinf.2021edp7133","title":"Android Malware Detection Based on Functional Classification","display_name":"Android Malware Detection Based on Functional Classification","publication_year":2022,"publication_date":"2022-02-28","ids":{"openalex":"https://openalex.org/W4214733042","doi":"https://doi.org/10.1587/transinf.2021edp7133"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2021edp7133","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2021edp7133","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E105.D/3/E105.D_2021EDP7133/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E105.D/3/E105.D_2021EDP7133/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065601551","display_name":"Wenhao Fan","orcid":"https://orcid.org/0000-0001-5288-8708"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenhao FAN","raw_affiliation_strings":["School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407381","display_name":"Dong Liu","orcid":"https://orcid.org/0000-0001-9100-2906"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong LIU","raw_affiliation_strings":["School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100676495","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-1286-7141"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan WU","raw_affiliation_strings":["School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102968225","display_name":"Bihua Tang","orcid":"https://orcid.org/0009-0005-3588-0671"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bihua TANG","raw_affiliation_strings":["School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065240396","display_name":"Yuan'an LIU","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan'an LIU","raw_affiliation_strings":["School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, and Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065601551"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.5955,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.62140535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"E105.D","issue":"3","first_page":"656","last_page":"666"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8972938060760498},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8365002870559692},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8356248140335083},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.712762176990509},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.4599207639694214},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4163910448551178},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3992028534412384},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3664321005344391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3062717020511627},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19546163082122803}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8972938060760498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8365002870559692},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8356248140335083},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.712762176990509},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.4599207639694214},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4163910448551178},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3992028534412384},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3664321005344391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3062717020511627},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19546163082122803}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2021edp7133","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2021edp7133","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E105.D/3/E105.D_2021EDP7133/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2021edp7133","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2021edp7133","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E105.D/3/E105.D_2021EDP7133/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8657175235","display_name":null,"funder_award_id":"61821001","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4214733042.pdf","grobid_xml":"https://content.openalex.org/works/W4214733042.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W836876797","https://openalex.org/W1915915253","https://openalex.org/W1943233084","https://openalex.org/W1975146652","https://openalex.org/W2002478203","https://openalex.org/W2007857904","https://openalex.org/W2056388267","https://openalex.org/W2060692877","https://openalex.org/W2101234009","https://openalex.org/W2122672392","https://openalex.org/W2523199434","https://openalex.org/W2574022511","https://openalex.org/W2577976524","https://openalex.org/W2587002069","https://openalex.org/W2598193574","https://openalex.org/W2737578512","https://openalex.org/W2753669113","https://openalex.org/W2782290149","https://openalex.org/W2792310543","https://openalex.org/W2891624050","https://openalex.org/W4244726870"],"related_works":["https://openalex.org/W4249118297","https://openalex.org/W2717179875","https://openalex.org/W2311926078","https://openalex.org/W3199551743","https://openalex.org/W4281384336","https://openalex.org/W3195586271","https://openalex.org/W2782775281","https://openalex.org/W4312234627","https://openalex.org/W2781346976","https://openalex.org/W2899262475"],"abstract_inverted_index":{"Android":[0,18,25,32,45,81,143],"operating":[1],"system":[2],"occupies":[3],"a":[4,40,166],"high":[5,138],"share":[6],"in":[7,68,93,118,174],"the":[8,14,22,29,53,62,69,87,94,115,119,150,158,175,184,193,211],"mobile":[9],"terminal":[10],"market.":[11],"It":[12],"promotes":[13],"rapid":[15],"development":[16],"of":[17,24,31,42,55,125,160,213],"applications":[19],"(apps).":[20],"However,":[21],"emergence":[23],"malware":[26,46,82,112,167,190,195,214],"greatly":[27],"endangers":[28],"security":[30],"smartphone":[33],"users.":[34],"Existing":[35],"research":[36],"works":[37],"have":[38],"proposed":[39],"lot":[41],"methods":[43],"for":[44],"detection,":[47],"but":[48],"they":[49],"did":[50],"not":[51],"make":[52],"utilization":[54],"apps'":[56],"functional":[57,71,88,96,121,134,145,177],"category":[58,72,97],"information":[59],"so":[60,104],"that":[61,205],"strong":[63],"similarity":[64,173],"between":[65],"benign":[66,91,181],"apps":[67,92,182,191],"same":[70,95,120,176],"is":[73,128],"ignored.":[74],"In":[75],"this":[76],"paper,":[77],"we":[78,105,163],"propose":[79],"an":[80,131,142],"detection":[83,116,168],"scheme":[84,127],"based":[85,170],"on":[86,171],"classification.":[89],"The":[90,123,201],"are":[98],"more":[99],"similar":[100],"to":[101,110,129,197],"each":[102],"other,":[103],"can":[106,208],"use":[107,180,189],"less":[108],"features":[109],"detect":[111],"and":[113,188],"improve":[114,210],"accuracy":[117,212],"category.":[122,178],"aim":[124],"our":[126,199,206],"provide":[130],"automatic":[132,161],"application":[133,144],"classification":[135,146],"method":[136,147,169,207],"with":[137],"accuracy.":[139],"We":[140,179],"design":[141,165],"inspired":[148],"by":[149],"hyperlink":[151],"induced":[152],"topic":[153],"search":[154],"(HITS)":[155],"algorithm.":[156],"Using":[157],"results":[159,203],"classification,":[162],"further":[164],"app":[172],"from":[183,192],"Google":[185],"Play":[186],"Store":[187],"Drebin":[194],"set":[196],"evaluate":[198],"scheme.":[200],"experimental":[202],"show":[204],"effectively":[209],"detection.":[215]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
