{"id":"https://openalex.org/W4416458228","doi":"https://doi.org/10.3390/fi17120532","title":"A Resilient Deep Learning Framework for Mobile Malware Detection: From Architecture to Deployment","display_name":"A Resilient Deep Learning Framework for Mobile Malware Detection: From Architecture to Deployment","publication_year":2025,"publication_date":"2025-11-21","ids":{"openalex":"https://openalex.org/W4416458228","doi":"https://doi.org/10.3390/fi17120532"},"language":"en","primary_location":{"id":"doi:10.3390/fi17120532","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120532","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/fi17120532","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018786449","display_name":"Aysha Alfaw","orcid":"https://orcid.org/0000-0002-1490-2633"},"institutions":[{"id":"https://openalex.org/I106663880","display_name":"University of Bahrain","ror":"https://ror.org/0317ekv86","country_code":"BH","type":"education","lineage":["https://openalex.org/I106663880"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Aysha Alfaw","raw_affiliation_strings":["College of Information Technology, University of Bahrain, Sakhir P.O. Box 32038, Bahrain"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, University of Bahrain, Sakhir P.O. Box 32038, Bahrain","institution_ids":["https://openalex.org/I106663880"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080193996","display_name":"Mohsen Rouached","orcid":"https://orcid.org/0009-0004-8635-5239"},"institutions":[{"id":"https://openalex.org/I106663880","display_name":"University of Bahrain","ror":"https://ror.org/0317ekv86","country_code":"BH","type":"education","lineage":["https://openalex.org/I106663880"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Mohsen Rouached","raw_affiliation_strings":["College of Information Technology, University of Bahrain, Sakhir P.O. Box 32038, Bahrain"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, University of Bahrain, Sakhir P.O. Box 32038, Bahrain","institution_ids":["https://openalex.org/I106663880"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066427180","display_name":"Aymen Akremi","orcid":"https://orcid.org/0000-0002-1781-2908"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Aymen Akremi","raw_affiliation_strings":["College of Computing, Umm Al-Qura University (UQU), Makkah 21955, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computing, Umm Al-Qura University (UQU), Makkah 21955, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066427180"],"corresponding_institution_ids":["https://openalex.org/I199693650"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46433632,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"12","first_page":"532","last_page":"532"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8159999847412109},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7537000179290771},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7265999913215637},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5928999781608582},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5824999809265137},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.576200008392334},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5378000140190125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9057000279426575},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8159999847412109},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7537000179290771},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7265999913215637},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6589000225067139},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6190999746322632},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5928999781608582},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5824999809265137},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.576200008392334},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5378000140190125},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5239999890327454},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4726000130176544},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3614000082015991},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.33469998836517334},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2953999936580658},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.2815999984741211},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2612000107765198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2533000111579895}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi17120532","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120532","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:61c702c69b6844b388688dab1fe40f19","is_oa":true,"landing_page_url":"https://doaj.org/article/61c702c69b6844b388688dab1fe40f19","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 12, p 532 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi17120532","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120532","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1893133781","https://openalex.org/W1982130477","https://openalex.org/W2080157505","https://openalex.org/W2122672392","https://openalex.org/W2295502246","https://openalex.org/W2342408547","https://openalex.org/W2407313496","https://openalex.org/W2462192250","https://openalex.org/W2727121960","https://openalex.org/W2733765803","https://openalex.org/W2782290149","https://openalex.org/W2849849680","https://openalex.org/W2885195348","https://openalex.org/W2900633536","https://openalex.org/W2906631928","https://openalex.org/W2911087020","https://openalex.org/W2911925130","https://openalex.org/W2963204406","https://openalex.org/W2966399854","https://openalex.org/W2980801698","https://openalex.org/W2984666763","https://openalex.org/W2986232939","https://openalex.org/W2998074434","https://openalex.org/W3033918741","https://openalex.org/W3083703328","https://openalex.org/W3090586341","https://openalex.org/W3118343432","https://openalex.org/W3130016194","https://openalex.org/W3133555681","https://openalex.org/W3134221566","https://openalex.org/W3135174262","https://openalex.org/W3163053370","https://openalex.org/W3170851865","https://openalex.org/W3179008990","https://openalex.org/W4200043090","https://openalex.org/W4206737206","https://openalex.org/W4210359901","https://openalex.org/W4234971943","https://openalex.org/W4292491372","https://openalex.org/W4293083491","https://openalex.org/W4293559785","https://openalex.org/W4308000139","https://openalex.org/W4313427720","https://openalex.org/W4318275390","https://openalex.org/W4320179452","https://openalex.org/W4324142623","https://openalex.org/W4365139766","https://openalex.org/W4367681844","https://openalex.org/W4404962716","https://openalex.org/W4407301013","https://openalex.org/W4407318323","https://openalex.org/W4408773019","https://openalex.org/W4409412321","https://openalex.org/W4409653774"],"related_works":[],"abstract_inverted_index":{"Mobile":[0],"devices":[1],"are":[2,28],"frequent":[3],"targets":[4],"of":[5,12,99,108,147,162,173],"malware":[6,44,141,167],"due":[7],"to":[8,54,77],"the":[9,66,95,111,117,122,160,171],"large":[10],"volume":[11],"sensitive":[13],"personal,":[14],"financial,":[15],"and":[16,24,49,57,73,87,151,169],"corporate":[17],"data":[18],"they":[19],"process.":[20],"Traditional":[21],"static,":[22],"dynamic,":[23],"hybrid":[25],"analysis":[26],"methods":[27],"increasingly":[29],"insufficient":[30],"against":[31],"evolving":[32],"threats.":[33],"This":[34],"paper":[35],"proposes":[36],"a":[37,50],"resilient":[38,175],"deep":[39,80,163],"learning":[40,81,164],"framework":[41,129],"for":[42,70,125,165],"Android":[43,67,118,134],"detection,":[45],"integrating":[46],"multiple":[47],"models":[48],"CPU-aware":[51],"selection":[52],"algorithm":[53],"balance":[55],"accuracy":[56,98,107],"efficiency":[58],"on":[59,101,116,178],"mobile":[60,166],"devices.":[61,180],"Two":[62],"benchmark":[63],"datasets":[64],"(i.e.,":[65],"Malware":[68],"Dataset":[69],"Machine":[71],"Learning":[72],"CIC-InvesAndMal2019)":[74],"were":[75],"used":[76],"evaluate":[78],"five":[79],"models:":[82],"DNN,":[83],"CNN,":[84],"RNN,":[85],"LSTM,":[86],"CNN-LSTM.":[88],"The":[89,128],"results":[90],"show":[91],"that":[92],"CNN-LSTM":[93],"achieves":[94],"highest":[96],"detection":[97,142,168,176],"97.4%":[100],"CIC-InvesAndMal2019,":[102],"while":[103],"CNN":[104],"delivers":[105],"strong":[106],"98.07%,":[109],"with":[110,143],"lowest":[112],"CPU":[113],"usage":[114,153],"(5.2%)":[115],"Dataset,":[119],"making":[120],"it":[121],"most":[123],"practical":[124],"on-device":[126],"deployment.":[127],"is":[130],"implemented":[131],"as":[132],"an":[133,144],"application":[135],"using":[136],"TensorFlow":[137],"Lite,":[138],"providing":[139],"near-real-time":[140],"inference":[145],"time":[146],"under":[148],"150":[149],"ms":[150],"memory":[152],"below":[154],"50":[155],"MB.":[156],"These":[157],"findings":[158],"confirm":[159],"effectiveness":[161],"demonstrate":[170],"feasibility":[172],"deploying":[174],"systems":[177],"resource-constrained":[179]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
