{"id":"https://openalex.org/W4391251754","doi":"https://doi.org/10.3233/idt-230284","title":"An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources","display_name":"An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources","publication_year":2024,"publication_date":"2024-01-26","ids":{"openalex":"https://openalex.org/W4391251754","doi":"https://doi.org/10.3233/idt-230284"},"language":"en","primary_location":{"id":"doi:10.3233/idt-230284","is_oa":true,"landing_page_url":"https://doi.org/10.3233/idt-230284","pdf_url":"https://content.iospress.com:443/download/intelligent-decision-technologies/idt230284?id=intelligent-decision-technologies%2Fidt230284","source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://content.iospress.com:443/download/intelligent-decision-technologies/idt230284?id=intelligent-decision-technologies%2Fidt230284","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025872251","display_name":"Ahsan Wajahat","orcid":"https://orcid.org/0000-0003-4848-5281"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]},{"id":"https://openalex.org/I4210119514","display_name":"Lasbela University of Agriculture Water and Marine Science","ror":"https://ror.org/0212pqc18","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210119514"]}],"countries":["CN","PK"],"is_corresponding":true,"raw_author_name":"Ahsan Wajahat","raw_affiliation_strings":["Department of Computer Science, Lasbela University of Agriculture Water and Marine Sciences, Lasebla, Pakistan","Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Lasbela University of Agriculture Water and Marine Sciences, Lasebla, Pakistan","institution_ids":["https://openalex.org/I4210119514"]},{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032712488","display_name":"Jingsha He","orcid":"https://orcid.org/0000-0002-8122-8052"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingsha He","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069893644","display_name":"Nafei Zhu","orcid":"https://orcid.org/0000-0003-4036-0724"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nafei Zhu","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055052519","display_name":"Tariq Mahmood","orcid":"https://orcid.org/0000-0002-4299-7756"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]},{"id":"https://openalex.org/I5100685","display_name":"University of Education","ror":"https://ror.org/052z7nw84","country_code":"PK","type":"education","lineage":["https://openalex.org/I5100685"]}],"countries":["PK","SA"],"is_corresponding":false,"raw_author_name":"Tariq Mahmood","raw_affiliation_strings":["Artificial Intelligence and Data Analytics (AIDA) Lab, CCIS Prince Sultan University, Riyadh, Saudi Arabia","Faculty of Information Sciences, University of Education, Vehari, Pakistan"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence and Data Analytics (AIDA) Lab, CCIS Prince Sultan University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"Faculty of Information Sciences, University of Education, Vehari, Pakistan","institution_ids":["https://openalex.org/I5100685"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101491600","display_name":"Ahsan Nazir","orcid":"https://orcid.org/0000-0001-5689-2464"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ahsan Nazir","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074689211","display_name":"Faheem Ullah","orcid":"https://orcid.org/0000-0002-7678-1603"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Faheem Ullah","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086309378","display_name":"Sirajuddin Qureshi","orcid":"https://orcid.org/0000-0002-2775-2734"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sirajuddin Qureshi","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080471386","display_name":"M. O. M. Osman","orcid":"https://orcid.org/0000-0003-0290-8541"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Musa Osman","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5025872251"],"corresponding_institution_ids":["https://openalex.org/I37796252","https://openalex.org/I4210119514"],"apc_list":null,"apc_paid":null,"fwci":3.0474,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91750993,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"18","issue":"1","first_page":"33","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7908077836036682},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7562201023101807},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7526620626449585},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6160133481025696},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5908048152923584},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5757811069488525},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5137497186660767},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4930572211742401},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.42619192600250244},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.41684624552726746},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41080915927886963},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12979558110237122}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7908077836036682},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7562201023101807},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7526620626449585},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6160133481025696},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5908048152923584},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5757811069488525},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5137497186660767},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4930572211742401},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.42619192600250244},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.41684624552726746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41080915927886963},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12979558110237122}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/idt-230284","is_oa":true,"landing_page_url":"https://doi.org/10.3233/idt-230284","pdf_url":"https://content.iospress.com:443/download/intelligent-decision-technologies/idt230284?id=intelligent-decision-technologies%2Fidt230284","source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3233/idt-230284","is_oa":true,"landing_page_url":"https://doi.org/10.3233/idt-230284","pdf_url":"https://content.iospress.com:443/download/intelligent-decision-technologies/idt230284?id=intelligent-decision-technologies%2Fidt230284","source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G421358380","display_name":null,"funder_award_id":"Saudi Arabia","funder_id":"https://openalex.org/F4320327702","funder_display_name":"Prince Sultan University"}],"funders":[{"id":"https://openalex.org/F4320327702","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4391251754.pdf","grobid_xml":"https://content.openalex.org/works/W4391251754.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W79549259","https://openalex.org/W2003276999","https://openalex.org/W2055703785","https://openalex.org/W2060692877","https://openalex.org/W2080157505","https://openalex.org/W2122672392","https://openalex.org/W2127723417","https://openalex.org/W2168103835","https://openalex.org/W2462192250","https://openalex.org/W2575599800","https://openalex.org/W2577540292","https://openalex.org/W2608208725","https://openalex.org/W2732916693","https://openalex.org/W2782290149","https://openalex.org/W2897887243","https://openalex.org/W2919139886","https://openalex.org/W2922526186","https://openalex.org/W2946873049","https://openalex.org/W2955731880","https://openalex.org/W2963204406","https://openalex.org/W2964136807","https://openalex.org/W2996826556","https://openalex.org/W2998074434","https://openalex.org/W3005176213","https://openalex.org/W3036603968","https://openalex.org/W3112311055","https://openalex.org/W3118910683","https://openalex.org/W3134221566","https://openalex.org/W3151633058","https://openalex.org/W3161054997","https://openalex.org/W3162883843","https://openalex.org/W4220987924","https://openalex.org/W4244726870","https://openalex.org/W4255308122","https://openalex.org/W4285059789","https://openalex.org/W4364381814","https://openalex.org/W4384301457","https://openalex.org/W4388419817","https://openalex.org/W6603223915","https://openalex.org/W6651420667","https://openalex.org/W6678217462","https://openalex.org/W6679070709","https://openalex.org/W6684866844","https://openalex.org/W6719212312","https://openalex.org/W6755320119","https://openalex.org/W6773633349","https://openalex.org/W6794409955","https://openalex.org/W6837273777","https://openalex.org/W6848011916"],"related_works":["https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2311926078","https://openalex.org/W3199551743","https://openalex.org/W4281384336","https://openalex.org/W3195586271","https://openalex.org/W2782775281","https://openalex.org/W2781346976","https://openalex.org/W4312234627","https://openalex.org/W2899262475"],"abstract_inverted_index":{"With":[0],"the":[1,4,16,46,64,150,163,192],"rise":[2],"in":[3,15,85,146],"use":[5],"of":[6,18,31,48,72,75,103,204,208,214,224],"Android":[7,37,76,129,227],"smartphones,":[8],"there":[9,79],"has":[10,39,80],"been":[11,81],"a":[12,28,42,82,174,206],"proportional":[13],"surge":[14],"proliferation":[17],"malicious":[19,100],"applications":[20],"(apps).":[21],"As":[22],"mobile":[23,104],"phone":[24],"users":[25,62],"are":[26,56,220],"at":[27],"heightened":[29],"risk":[30],"data":[32],"theft,":[33],"detecting":[34,107,128,149],"malware":[35,228],"on":[36,116,184],"devices":[38],"emerged":[40],"as":[41,53],"pressing":[43],"concern":[44],"within":[45],"realm":[47],"cybersecurity.":[49],"Conventional":[50],"techniques,":[51],"such":[52],"signature-based":[54],"routines,":[55],"no":[57],"longer":[58],"sufficient":[59],"to":[60,96,222],"safeguard":[61],"from":[63],"continually":[65],"evolving":[66],"sophistication":[67],"and":[68,94,98,118,136,143,156,165,195,210,231],"swift":[69],"behavioral":[70,101],"modifications":[71],"novel":[73],"varieties":[74],"malware.":[77,108,130],"Hence,":[78],"significant":[83],"drive":[84],"recent":[86],"times":[87],"towards":[88],"leveraging":[89],"machine":[90],"learning":[91,113],"(ML)":[92],"models":[93,197],"methodologies":[95],"identify":[97],"generalize":[99],"patterns":[102],"apps":[105],"for":[106,127,138,148],"This":[109],"paper":[110],"proposes":[111],"Deep":[112],"(DL)":[114],"based":[115],"new":[117],"highly":[119],"reliable":[120],"classifier,":[121],"deep":[122],"neural":[123],"decision":[124],"forest":[125],"(DNDF)":[126],"Two":[131],"datasets":[132],"were":[133],"used:":[134],"Drebin":[135],"2014":[137],"comparison":[139],"with":[140,153],"previous":[141],"studies,":[142],"TUANDROMD":[144],"collected":[145],"2021":[147],"latest":[151],"threats":[152],"advanced":[154],"obfuscation":[155],"morphing":[157],"techniques.":[158],"We":[159],"have":[160],"also":[161],"calculated":[162],"time-consuming":[164],"computational":[166],"resources":[167],"taken":[168],"by":[169],"our":[170,178],"classifier.":[171],"After":[172],"conducting":[173],"thorough":[175],"performance":[176],"evaluation,":[177],"proposed":[179,193],"approach":[180],"attained":[181],"impressive":[182],"results":[183],"two":[185],"datasets.":[186],"The":[187,216],"empirical":[188],"findings":[189],"reveal":[190],"that":[191],"DBN":[194],"DNDF":[196],"demonstrated":[198],"exceptional":[199],"performance,":[200],"achieving":[201],"an":[202,211],"accuracy":[203],"99%,":[205],"sensitivity":[207],"1,":[209],"AUC":[212],"value":[213],"0.98%.":[215],"metrics":[217],"we":[218],"obtained":[219],"comparable":[221],"those":[223],"state-of-the-art":[225],"ML-based":[226],"detection":[229],"techniques":[230],"several":[232],"commercial":[233],"antivirus":[234],"engines.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
