{"id":"https://openalex.org/W4384301457","doi":"https://doi.org/10.3233/jifs-231969","title":"An adaptive semi-supervised deep learning-based framework for the detection of Android malware","display_name":"An adaptive semi-supervised deep learning-based framework for the detection of Android malware","publication_year":2023,"publication_date":"2023-07-14","ids":{"openalex":"https://openalex.org/W4384301457","doi":"https://doi.org/10.3233/jifs-231969"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-231969","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-231969","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025872251","display_name":"Ahsan Wajahat","orcid":"https://orcid.org/0000-0003-4848-5281"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]},{"id":"https://openalex.org/I4210119514","display_name":"Lasbela University of Agriculture Water and Marine Science","ror":"https://ror.org/0212pqc18","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210119514"]}],"countries":["CN","PK"],"is_corresponding":true,"raw_author_name":"Ahsan Wajahat","raw_affiliation_strings":["Department of Computer Science, Lasbela University of Agriculture Water and Marine Sciences, Lasebla, Pakistan","Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Lasbela University of Agriculture Water and Marine Sciences, Lasebla, Pakistan","institution_ids":["https://openalex.org/I4210119514"]},{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032712488","display_name":"Jingsha He","orcid":"https://orcid.org/0000-0002-8122-8052"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingsha He","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069893644","display_name":"Nafei Zhu","orcid":"https://orcid.org/0000-0003-4036-0724"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nafei Zhu","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055052519","display_name":"Tariq Mahmood","orcid":"https://orcid.org/0000-0002-4299-7756"},"institutions":[{"id":"https://openalex.org/I5100685","display_name":"University of Education","ror":"https://ror.org/052z7nw84","country_code":"PK","type":"education","lineage":["https://openalex.org/I5100685"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Tariq Mahmood","raw_affiliation_strings":["Faculty of Information Sciences, University of Education, Vehari Campus, Vehari, Pakistan"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Sciences, University of Education, Vehari Campus, Vehari, Pakistan","institution_ids":["https://openalex.org/I5100685"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101491600","display_name":"Ahsan Nazir","orcid":"https://orcid.org/0000-0001-5689-2464"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ahsan Nazir","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051139581","display_name":"Muhammad Salman Pathan","orcid":"https://orcid.org/0000-0002-0210-3121"},"institutions":[{"id":"https://openalex.org/I157286207","display_name":"National University of Ireland, Maynooth","ror":"https://ror.org/048nfjm95","country_code":"IE","type":"education","lineage":["https://openalex.org/I157286207"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Muhammad Salman Pathan","raw_affiliation_strings":["Department of Computer Sciences Maynooth University, Ireland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences Maynooth University, Ireland","institution_ids":["https://openalex.org/I157286207"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086309378","display_name":"Sirajuddin Qureshi","orcid":"https://orcid.org/0000-0002-2775-2734"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sirajuddin Qureshi","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101765155","display_name":"Faheem Ullah","orcid":"https://orcid.org/0000-0001-8476-1218"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Faheem Ullah","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5025872251"],"corresponding_institution_ids":["https://openalex.org/I37796252","https://openalex.org/I4210119514"],"apc_list":null,"apc_paid":null,"fwci":1.98,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87100768,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"45","issue":"3","first_page":"5141","last_page":"5157"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.855003833770752},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8340272903442383},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7848409414291382},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.726042628288269},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6700432300567627},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5916169881820679},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5859088897705078},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5360434651374817},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5113174915313721},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.438917875289917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2190486192703247},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11064666509628296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.855003833770752},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8340272903442383},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7848409414291382},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.726042628288269},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6700432300567627},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5916169881820679},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5859088897705078},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5360434651374817},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5113174915313721},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.438917875289917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2190486192703247},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11064666509628296}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-231969","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-231969","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1999728176","https://openalex.org/W2026875669","https://openalex.org/W2080157505","https://openalex.org/W2087970742","https://openalex.org/W2122672392","https://openalex.org/W2363800358","https://openalex.org/W2601621757","https://openalex.org/W2611461819","https://openalex.org/W2753669113","https://openalex.org/W2789527575","https://openalex.org/W2792310543","https://openalex.org/W2900275727","https://openalex.org/W2912135847","https://openalex.org/W2944830571","https://openalex.org/W2946873049","https://openalex.org/W2955731880","https://openalex.org/W2963204406","https://openalex.org/W3004549544","https://openalex.org/W3017679144","https://openalex.org/W3039088822","https://openalex.org/W3095224071","https://openalex.org/W3112311055","https://openalex.org/W3118910683","https://openalex.org/W3134221566","https://openalex.org/W3135916744","https://openalex.org/W3151633058","https://openalex.org/W3191903242","https://openalex.org/W3213404529","https://openalex.org/W4220987924","https://openalex.org/W4312334973","https://openalex.org/W4321365588","https://openalex.org/W4323539141","https://openalex.org/W4367046386","https://openalex.org/W4367595786","https://openalex.org/W6678217462","https://openalex.org/W6748992170","https://openalex.org/W6791690078","https://openalex.org/W6903798829"],"related_works":["https://openalex.org/W4249118297","https://openalex.org/W2717179875","https://openalex.org/W2311926078","https://openalex.org/W3199551743","https://openalex.org/W4281384336","https://openalex.org/W3195586271","https://openalex.org/W2782775281","https://openalex.org/W4312234627","https://openalex.org/W2781346976","https://openalex.org/W2899262475"],"abstract_inverted_index":{"Positive":[0],"developments":[1],"in":[2,10,223],"smartphone":[3],"usage":[4],"have":[5,48,75],"led":[6],"to":[7,30,57,79,138,171],"an":[8,202,211],"increase":[9],"malicious":[11,85,225],"attacks,":[12],"particularly":[13],"targeting":[14],"Android":[15,18,66,100,153,234],"mobile":[16,45,73],"devices.":[17],"has":[19],"been":[20,49],"a":[21,90,116,206,229],"primary":[22],"target":[23],"for":[24,44,83,96,121,232],"malware":[25,46,74,101,235],"exploiting":[26],"security":[27],"vulnerabilities":[28],"due":[29],"the":[31,69,129,163,175,182,193],"presence":[32],"of":[33,65,72,177,204,208,213],"critical":[34],"applications,":[35],"such":[36],"as":[37],"banking":[38],"applications.":[39],"Several":[40],"machine":[41,118,220],"learning-based":[42,94,119,221],"models":[43],"detection":[47],"developed":[50],"recently,":[51],"but":[52],"significant":[53],"research":[54],"is":[55],"needed":[56],"achieve":[58],"optimal":[59],"efficiency":[60],"and":[61,68,98,108,142,145,159,173,187,210,227],"performance.":[62],"The":[63,134,148,189,215],"proliferation":[64],"devices":[67],"increasing":[70],"threat":[71],"made":[76],"it":[77],"imperative":[78],"develop":[80],"effective":[81],"methods":[82],"detecting":[84,97,224],"apps.":[86],"This":[87],"study":[88],"proposes":[89],"robust":[91],"hybrid":[92,195],"deep":[93],"approach":[95],"predicting":[99],"that":[102],"integrates":[103],"Convolutional":[104],"Neural":[105],"Networks":[106],"(CNN)":[107],"Long":[109],"Short-Term":[110],"Memory":[111],"(LSTM).":[112],"It":[113,155],"also":[114],"presents":[115],"creative":[117,179],"strategy":[120,136],"dealing":[122],"with":[123,201],"unbalanced":[124],"datasets,":[125],"which":[126],"can":[127],"mislead":[128],"training":[130],"algorithm":[131],"during":[132],"classification.":[133],"proposed":[135,149,216],"helps":[137],"improve":[139],"method":[140],"performance":[141,200],"mitigate":[143],"over-":[144],"under-fitting":[146],"concerns.":[147],"model":[150,197,217],"effectively":[151],"detects":[152],"malware.":[154],"extracts":[156],"both":[157],"temporal":[158],"spatial":[160],"features":[161],"from":[162],"dataset.":[164],"A":[165],"well-known":[166],"Drebin":[167],"dataset":[168],"was":[169],"used":[170],"train":[172],"evaluate":[174],"efficacy":[176],"all":[178],"frameworks":[180],"regarding":[181],"accuracy,":[183],"sensitivity,":[184],"MAE,":[185],"RMSE,":[186],"AUC.":[188],"empirical":[190],"finding":[191],"proclaims":[192],"projected":[194],"ConvLSTM":[196],"achieved":[198],"remarkable":[199],"accuracy":[203],"0.99,":[205,209],"sensitivity":[207],"AUC":[212],"0.99.":[214],"outperforms":[218],"standard":[219],"algorithms":[222],"apps":[226],"provides":[228],"promising":[230],"framework":[231],"real-time":[233],"detection.":[236]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
