{"id":"https://openalex.org/W3194029267","doi":"https://doi.org/10.1155/2021/9964224","title":"Learning-Based Detection for Malicious Android Application Using Code Vectorization","display_name":"Learning-Based Detection for Malicious Android Application Using Code Vectorization","publication_year":2021,"publication_date":"2021-08-19","ids":{"openalex":"https://openalex.org/W3194029267","doi":"https://doi.org/10.1155/2021/9964224","mag":"3194029267"},"language":"en","primary_location":{"id":"doi:10.1155/2021/9964224","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9964224","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9964224.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/9964224.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104261586","display_name":"Lin Liu","orcid":"https://orcid.org/0000-0003-0830-2639"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Liu","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Beijing, China","College of Electronics, Sichuan University, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"College of Electronics, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100339146","display_name":"Ren Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Ren","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Beijing, China","College of Electronics, Sichuan University, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"College of Electronics, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066862201","display_name":"Feng Xie","orcid":"https://orcid.org/0000-0003-3944-236X"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Xie","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008233900","display_name":"Shengwei Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengwei Yi","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103188654","display_name":"Junkai Yi","orcid":"https://orcid.org/0000-0003-4771-250X"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junkai Yi","raw_affiliation_strings":["Beijing Information Science and Technology University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing Information Science and Technology University, Beijing, China","institution_ids":["https://openalex.org/I78675632"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089704563","display_name":"Peng Jia","orcid":"https://orcid.org/0000-0002-0455-8779"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Jia","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0002-0455-8779","affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5089704563"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1544,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44206296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8229645490646362},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.699343204498291},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6474562883377075},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5243903994560242},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.30718913674354553}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8229645490646362},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.699343204498291},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6474562883377075},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5243903994560242},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.30718913674354553}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/9964224","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9964224","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9964224.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ec14b05c39464cef8b15424276401862","is_oa":true,"landing_page_url":"https://doaj.org/article/ec14b05c39464cef8b15424276401862","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/9964224","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9964224","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9964224.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"},{"display_name":"Reduced inequalities","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3194029267.pdf","grobid_xml":"https://content.openalex.org/works/W3194029267.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W1532142362","https://openalex.org/W1545528966","https://openalex.org/W1947535385","https://openalex.org/W1978762841","https://openalex.org/W1997833177","https://openalex.org/W2046185165","https://openalex.org/W2264016719","https://openalex.org/W2284289336","https://openalex.org/W2298292381","https://openalex.org/W2313513770","https://openalex.org/W2324464293","https://openalex.org/W2531296565","https://openalex.org/W2557513839","https://openalex.org/W2559490865","https://openalex.org/W2563797838","https://openalex.org/W2599823825","https://openalex.org/W2620763085","https://openalex.org/W2753669113","https://openalex.org/W2768949784","https://openalex.org/W2778638786","https://openalex.org/W2789247308","https://openalex.org/W2800912855","https://openalex.org/W2801704782","https://openalex.org/W2885070483","https://openalex.org/W2887544206","https://openalex.org/W2900275727","https://openalex.org/W2904559506","https://openalex.org/W2917661079","https://openalex.org/W2934843808","https://openalex.org/W2963680240","https://openalex.org/W2979461903","https://openalex.org/W2982642222","https://openalex.org/W2988335058","https://openalex.org/W3161054997","https://openalex.org/W6632618879","https://openalex.org/W6695662000"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W4312334973","https://openalex.org/W2560361988","https://openalex.org/W1963923654","https://openalex.org/W1974604873","https://openalex.org/W2507113366","https://openalex.org/W4327939473","https://openalex.org/W2085301524","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"The":[0,123],"malicious":[1,40,48,97,107,143,155,234],"APK":[2,178],"(Android":[3],"Application":[4],"Package)":[5],"makers":[6],"use":[7,129],"some":[8],"techniques":[9],"such":[10],"as":[11],"code":[12,15,171,182],"obfuscation":[13],"and":[14,30,34,73,88,100,185,193],"encryption":[16],"to":[17,37,128,134],"avoid":[18],"existing":[19,160],"detection":[20,29,66,81,110,151,216,232],"methods,":[21],"which":[22,70,92,114,145,223],"poses":[23],"new":[24,47,96,154],"challenges":[25],"for":[26,50,149,191],"accurate":[27],"virus":[28],"makes":[31],"it":[32],"more":[33,35,147],"difficult":[36],"detect":[38,95],"the":[39,76,118,130,139,142,150,153,159,165,169,173,187,206,209,214,225,231],"code.":[41],"A":[42],"report":[43],"indicates":[44],"that":[45,205],"a":[46,63,106,198,220],"app":[49],"Android":[51,98,108,156,174],"is":[52,68,112,115,146],"created":[53],"every":[54],"10":[55],"seconds.":[56],"To":[57],"combat":[58],"this":[59,104,228],"serious":[60],"malware":[61,65,77,215],"activity,":[62],"scalable":[64],"approach":[67],"needed,":[69],"can":[71,212],"effectively":[72],"efficiently":[74],"identify":[75],"apps.":[78],"Common":[79],"static":[80,166],"methods":[82],"often":[83],"rely":[84],"on":[85,219],"Hash":[86],"matching":[87],"analysis":[89],"of":[90,141,152,172,227,233],"viruses,":[91],"cannot":[93],"quickly":[94],"applications":[99,157],"their":[101],"variants.":[102],"In":[103],"paper,":[105],"application":[109,175],"method":[111,163,229],"proposed,":[113],"implemented":[116],"by":[117,176],"deep":[119,188],"network":[120,190],"fusion":[121],"model.":[122],"hybrid":[124,210],"model":[125,133,211],"only":[126],"needs":[127],"sample":[131],"training":[132],"achieve":[135],"high":[136],"accuracy":[137],"in":[138,168,230],"identification":[140],"applications,":[144],"suitable":[148],"than":[158],"methods.":[161],"This":[162],"extracts":[164],"features":[167],"core":[170],"decompiling":[177],"files,":[179],"then":[180],"performs":[181],"vectorization":[183],"processing,":[184],"uses":[186],"learning":[189],"classification":[192],"discrimination.":[194],"Our":[195],"experiments":[196],"with":[197],"data":[199],"set":[200],"containing":[201],"10,170":[202],"apps":[203],"show":[204],"decisions":[207],"from":[208],"increase":[213],"rate":[217],"significantly":[218],"real":[221],"device,":[222],"verifies":[224],"superiority":[226],"codes.":[235]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
