{"id":"https://openalex.org/W4285791470","doi":"https://doi.org/10.32604/iasc.2023.030527","title":"Investigation of Android Malware Using Deep Learning Approach","display_name":"Investigation of Android Malware Using Deep Learning Approach","publication_year":2022,"publication_date":"2022-07-19","ids":{"openalex":"https://openalex.org/W4285791470","doi":"https://doi.org/10.32604/iasc.2023.030527"},"language":"en","primary_location":{"id":"doi:10.32604/iasc.2023.030527","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.030527","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-2/TSP_IASC_30527/TSP_IASC_30527.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-2/TSP_IASC_30527/TSP_IASC_30527.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028874706","display_name":"V. Joseph Raymond","orcid":null},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]},{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"V. Joseph Raymond","raw_affiliation_strings":["Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, 600119, Tamilnadu, India","School of Computing, SRM Institute of Science and Technology, Chennai, 603203, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, 600119, Tamilnadu, India","institution_ids":["https://openalex.org/I43814544"]},{"raw_affiliation_string":"School of Computing, SRM Institute of Science and Technology, Chennai, 603203, Tamilnadu, India","institution_ids":["https://openalex.org/I145286018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078314931","display_name":"Ritik Raj","orcid":"https://orcid.org/0009-0005-1853-6107"},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. Jeberson Retna Raj","raw_affiliation_strings":["Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, 600119, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, 600119, Tamilnadu, India","institution_ids":["https://openalex.org/I43814544"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028874706"],"corresponding_institution_ids":["https://openalex.org/I145286018","https://openalex.org/I43814544"],"apc_list":null,"apc_paid":null,"fwci":1.3393,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.79546604,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"35","issue":"2","first_page":"2413","last_page":"2429"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8769422173500061},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7881666421890259},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6845589876174927},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6551100015640259},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6403332352638245},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.6242863535881042},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6040326356887817},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.5855774879455566},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5465084314346313},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5334736704826355},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.4152737259864807},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4112697243690491},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.37809890508651733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3762022852897644},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23855021595954895}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8769422173500061},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7881666421890259},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6845589876174927},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6551100015640259},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6403332352638245},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.6242863535881042},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6040326356887817},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.5855774879455566},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5465084314346313},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5334736704826355},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.4152737259864807},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4112697243690491},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.37809890508651733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3762022852897644},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23855021595954895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/iasc.2023.030527","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.030527","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-2/TSP_IASC_30527/TSP_IASC_30527.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/iasc.2023.030527","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.030527","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-2/TSP_IASC_30527/TSP_IASC_30527.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285791470.pdf","grobid_xml":"https://content.openalex.org/works/W4285791470.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W2313513770","https://openalex.org/W2897920791","https://openalex.org/W2995340752","https://openalex.org/W3016507003","https://openalex.org/W3083080466","https://openalex.org/W3092817161","https://openalex.org/W3094190102","https://openalex.org/W3097192014","https://openalex.org/W3111668569","https://openalex.org/W3118382796","https://openalex.org/W3118910683","https://openalex.org/W3120704879","https://openalex.org/W3120945926","https://openalex.org/W3121341762","https://openalex.org/W3125601055","https://openalex.org/W3131352729","https://openalex.org/W3135445647","https://openalex.org/W3144067442","https://openalex.org/W4221089670","https://openalex.org/W4238929873","https://openalex.org/W4242690445","https://openalex.org/W6652176536","https://openalex.org/W6671915489","https://openalex.org/W6753066744","https://openalex.org/W6754546893","https://openalex.org/W6788610398","https://openalex.org/W6795736954"],"related_works":["https://openalex.org/W4225292389","https://openalex.org/W4386716810","https://openalex.org/W3075942746","https://openalex.org/W2985924212","https://openalex.org/W4210772651","https://openalex.org/W4221021152","https://openalex.org/W3184989019","https://openalex.org/W4200493858","https://openalex.org/W4295815887","https://openalex.org/W3168994312"],"abstract_inverted_index":{"In":[0,52,103,188],"recent":[1],"days":[2],"the":[3,49,53,82,100,104,154,219],"usage":[4],"of":[5,48,160,224],"android":[6,32,139],"smartphones":[7],"has":[8],"increased":[9],"extensively":[10],"by":[11,238],"end-users.":[12],"There":[13],"are":[14,108,151,183],"several":[15],"applications":[16,140,225],"in":[17],"different":[18],"categories":[19],"banking/finance,":[20],"social":[21],"engineering,":[22],"education,":[23],"sports":[24],"and":[25,27,76,92,95,127,148,163,179,204,217,226],"fitness,":[26],"many":[28],"more":[29,35],"applications.":[30],"The":[31,79,131,157],"stack":[33],"is":[34,57,69],"vulnerable":[36,60],"compared":[37,213],"to":[38,63,214],"other":[39],"mobile":[40],"platforms":[41],"like":[42,87,141,167],"IOS,":[43],"Windows,":[44],"or":[45,230],"Blackberry":[46],"because":[47],"open-source":[50],"platform.":[51],"Existing":[54],"system,":[55],"malware":[56],"written":[58],"using":[59],"system":[61,119],"calls":[62],"bypass":[64],"signature":[65],"detection":[66,125,223],"important":[67,132],"drawback":[68],"might":[70],"not":[71],"work":[72],"with":[73,84,120,200,208],"zero-day":[74,93],"exploits":[75,94],"stealth":[77],"malware.":[78],"attackers":[80],"target":[81,202],"victim":[83],"various":[85,109,161],"attacks":[86],"adware,":[88],"backdoor,":[89],"spyware,":[90],"ransomware,":[91],"create":[96],"threat":[97,236],"hunts":[98],"on":[99],"day-to-day":[101],"basics.":[102],"existing":[105],"approach,":[106],"there":[107],"traditional":[110],"machine":[111,162],"learning":[112,165,197],"classifiers":[113,166],"for":[114,135,185,222],"building":[115,136],"a":[116,206,209],"decision":[117],"support":[118],"limitations":[121],"such":[122],"as":[123,228,235],"low":[124],"rate":[126,212],"less":[128],"feature":[129],"selection.":[130],"contents":[133],"taken":[134,152],"model":[137,207,237],"from":[138,153],"Intent":[142],"Filter,":[143],"Permission":[144],"Signature,":[145],"API":[146],"Calls,":[147],"System":[149],"commands":[150],"manifest":[155],"file.":[156],"function":[158],"parameters":[159],"deep":[164],"Nave":[168],"Bayes,":[169],"k-Nearest":[170],"Neighbors":[171],"(k-NN),":[172],"Support":[173],"Vector":[174],"Machine":[175],"(SVM),":[176],"Ada":[177],"Boost,":[178],"Multi-Layer":[180],"Perceptron":[181],"(MLP)":[182],"done":[184],"effective":[186],"results.":[187],"our":[189],"proposed":[190],"work,":[191],"we":[192],"have":[193],"used":[194,234],"an":[195],"unsupervised":[196],"multilayer":[198],"perceptron":[199],"multiple":[201],"labels":[203],"built":[205],"better":[210],"accuracy":[211],"logistic":[215],"regression,":[216],"rank":[218],"best":[220],"features":[221],"classify":[227],"malicious":[229],"benign":[231],"can":[232],"be":[233],"online":[239],"antivirus":[240],"scanners.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
