Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection

Published: 08 May 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Malware detection at scale in the Android realm is often carried out using machine learning techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to yield high detection rates when assessed against well-known datasets. Unfortunately, such datasets may include a large portion of duplicated samples, which may bias recorded experimental results and insights. In this article, we perform extensive experiments to measure the performance gap that occurs when datasets are de-duplicated. Our experimental results reveal that duplication in published datasets has a limited impact on supervised malware classification models. This observation contrasts with the finding of Allamanis on the general case of machine learning bias for big code. Our experiments, however, show that sample duplication more substantially affects unsupervised learning models (e.g., malware family clustering). Nevertheless, we argue that our fellow researchers and practitioners should always take sample duplication into consideration when performing machine-learning-based (via either supervised or unsupervised learning) Android malware detections, no matter how significant the impact might be.

    References

    [1]
    Wikipedia contributors. 2020. Sequential minimal optimization. https://en.wikipedia.org/wiki/Sequential_minimal_optimization
    [2]
    Yousra Aafer, Wenliang Du, and Heng Yin. 2013. Droidapiminer: Mining API-level features for robust malware detection in android. In International Conference on Security and Privacy in Communication Systems. Springer, 86--103.
    [3]
    Mohammed S. Alam and Son T. Vuong. 2013. Random forest classification for detecting Android malware. In 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. IEEE, 663--669.
    [4]
    Miltiadis Allamanis. 2019. The adverse effects of code duplication in machine learning models of code. In Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software. ACM, 143--153.
    [5]
    Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, and Yves Le Traon. 2016. Empirical assessment of machine learning-based malware detectors for Android. Empirical Software Engineering 21, 1 (Feb. 2016), 183--211.
    [6]
    Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. 2016. AndroZoo: Collecting millions of Android apps for the research community. In Proceedings of the 13th International Conference on Mining Software Repositories (MSR’16). ACM, New York, NY, 468--471.
    [7]
    Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, and Giorgio Giacinto. 2015. Clustering android malware families by http traffic. In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE’15). IEEE, 128--135.
    [8]
    Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of Android malware in your pocket. In Proceedings of the Network and Distributed System Security Symposium (NDSS’14), Vol. 14. 23--26.
    [9]
    Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices 49, 6 (2014), 259--269.
    [10]
    Zarni Aung and Win Zaw. 2013. Permission-based android malware detection. International Journal of Scientific & Technology Research 2, 3 (2013), 228--234.
    [11]
    Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden. 2015. Mining apps for abnormal usage of sensitive data. In Proceedings of the 37th International Conference on Software Engineering-Volume 1. IEEE Press, 426--436.
    [12]
    Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda. 2009. Scalable, behavior-based malware clustering. In Proceedings of the Network and Distributed System Security Symposium (NDSS'09), Vol. 9. 8--11.
    [13]
    Daniel Bilar. 2007. Opcodes as predictor for malware. International Journal of Electronic Security and Digital Forensics 1, 2 (2007), 156--168.
    [14]
    Evgeny Burnaev and Dmitry Smolyakov. 2016. One-class SVM with privileged information and its application to malware detection. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW’16). IEEE, 273--280.
    [15]
    Gerardo Canfora, Francesco Mercaldo, and Corrado Aaron Visaggio. 2015. Mobile malware detection using op-code frequency histograms. In 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE’15), Vol. 4. IEEE, 27--38.
    [16]
    Joymallya Chakraborty, Tianpei Xia, Fahmid M. Fahid, and Tim Menzies. 2019. Software engineering for fairness: A case study with hyperparameter optimization. arXiv preprint arXiv:1905.05786 (2019).
    [17]
    Tanmoy Chakraborty, Fabio Pierazzi, and V. S. Subrahmanian. 2017. EC2: Ensemble clustering and classification for predicting android malware families. IEEE Transactions on Dependable and Secure Computing 17, 2 (2017), 262--277.
    [18]
    Luke Deshotels, Vivek Notani, and Arun Lakhotia. 2014. Droidlegacy: Automated familial classification of android malware. In Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014. ACM, 3.
    [19]
    Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, and Jacques Klein. 2018. FraudDroid: Automated ad fraud detection for Android apps. In The 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’18).
    [20]
    Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Zhenzhou Tian, Qinghua Zheng, and Ting Liu. 2018. Android malware familial classification and representative sample selection via frequent subgraph analysis. IEEE Transactions on Information Forensics and Security 13, 8 (2018), 1890--1905.
    [21]
    Ming Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, and Ting Liu. 2019. Graph embedding based familial analysis of android malware using unsupervised learning. In 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE’19). IEEE, 771--782.
    [22]
    Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, and Ting Liu. 2020. Can we trust your explanations? Sanity checks for interpreters in Android malware analysis. arXiv preprint arXiv:2008.05895 (2020).
    [23]
    Ivan Firdausi, Alva Erwin, and Anto Satriyo Nugroho. 2010. Analysis of machine learning techniques used in behavior-based malware detection. In 2010 2nd International Conference on Advances in Computing, Control, and Telecommunication Technologies. IEEE, 201--203.
    [24]
    Wei Fu, Tim Menzies, and Xipeng Shen. 2016. Tuning for software analytics: Is it really necessary?Information and Software Technology 76 (2016), 135--146.
    [25]
    Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, and Jacques Klein. 2019. Should you consider adware as malware in your study? In IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER’19).
    [26]
    Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, and Jacques Klein. 2021. Understanding the evolution of Android app vulnerabilities. IEEE Transactions on Reliability (TRel) 70, 1 (2021), 212--230.
    [27]
    Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, and Jacques Klein. 2020. Borrowing your enemy’s arrows: The case of code reuse in Android via direct inter-app code invocation. In The 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’20).
    [28]
    Joshua Garcia, Mahmoud Hammad, and Sam Malek. 2018. Lightweight, obfuscation-resilient detection and family identification of Android malware. ACM Transactions on Software Engineering and Methodology (TOSEM) 26, 3 (2018), 11.
    [29]
    Benjamin Holland, Tom Deering, Suresh Kothari, Jon Mathews, and Nikhil Ranade. 2015. Security toolbox for detecting novel and sophisticated android malware. In Proceedings of the 37th International Conference on Software Engineering-Volume 2. IEEE Press, 733--736.
    [30]
    Xin Hu, Kang G. Shin, Sandeep Bhatkar, and Kent Griffin. 2013. Mutantx-s: Scalable malware clustering based on static features. In Presented as Part of the 2013 {USENIX} Annual Technical Conference ({USENIX} {ATC}’13). 187--198.
    [31]
    Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, and Fangren Xu. 2019. Dating with scambots: Understanding the ecosystem of fraudulent dating applications. IEEE Transactions on Dependable and Secure Computing (TDSC) (2019).
    [32]
    Médéric Hurier, Guillermo Suarez-Tangil, Santanu Kumar Dash, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein, and Lorenzo Cavallaro. 2017. Euphony: Harmonious unification of cacophonous anti-virus vendor labels for Android malware. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR’17). IEEE, 425--435.
    [33]
    Paul Irolla and Alexandre Dey. 2018. The duplication issue within the drebin dataset. Journal of Computer Virology and Hacking Techniques 14, 3 (2018), 245--249.
    [34]
    Quentin Jerome, Kevin Allix, Radu State, and Thomas Engel. 2014. Using opcode-sequences to detect malicious Android applications. In 2014 IEEE International Conference on Communications (ICC’14). IEEE, 914--919.
    [35]
    ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, and Djedjiga Mouheb. 2018. MalDozer: Automatic framework for android malware detection using deep learning. Digital Investigation 24 (2018), S48--S59.
    [36]
    Pingfan Kong, Li Li, Jun Gao, Kui Liu, Tegawendé F. Bissyandé, and Jacques Klein. 2018. Automated testing of Android apps: A systematic literature review. IEEE Transactions on Reliability 68, 1 (2018), 45--66.
    [37]
    Chenglin Li, Keith Mills, Di Niu, Rui Zhu, Hongwen Zhang, and Husam Kinawi. 2019. Android malware detection based on factorization machine. IEEE Access 7 (2019), 184008--184019.
    [38]
    Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, and Heng Ye. 2018. Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3216--3225.
    [39]
    Li Li. 2017. Mining Androzoo: A retrospect. In The Doctoral Symposium of 33rd International Conference on Software Maintenance and Evolution (ICSME-DS’17).
    [40]
    Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, and Jacques Klein. 2015. Potential component leaks in Android apps: An investigation into a new feature set for malware detection. In The 2015 IEEE International Conference on Software Quality, Reliability & Security (QRS’15).
    [41]
    Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick Mcdaniel. 2015. IccTA: Detecting inter-component privacy leaks in Android apps. In Proceedings of the 37th International Conference on Software Engineering (ICSE’15).
    [42]
    Li Li, Tegawendé F. Bissyandé, and Jacques Klein. 2018. MoonlightBox: Mining Android API histories for uncovering release-time inconsistencies. In The 29th IEEE International Symposium on Software Reliability Engineering (ISSRE’18).
    [43]
    Li Li, Tegawendé F. Bissyandé, and Jacques Klein. 2019. Rebooting research on detecting repackaged Android apps: Literature review and benchmark. IEEE Transactions on Software Engineering (TSE) (2019).
    [44]
    Li Li, Tegawendé F. Bissyandé, Damien Octeau, and Jacques Klein. 2016. DroidRA: Taming reflection to support whole-program analysis of Android apps. In The 2016 International Symposium on Software Testing and Analysis (ISSTA’16).
    [45]
    Li Li, Tegawendé F. Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Yves Le Traon. 2017. Static analysis of Android apps: A systematic literature review. Information and Software Technology 88 (2017), 67--95.
    [46]
    Li Li, Jun Gao, Médéric Hurier, Pingfan Kong, Tegawendé F. Bissyandé, Alexandre Bartel, Jacques Klein, and Yves Le Traon. 2017. AndroZoo++: Collecting millions of Android apps and their metadata for the research community. arXiv preprint arXiv:1709.05281 (2017).
    [47]
    Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, and Yves Le Traon. 2017. On locating malicious code in piggybacked android apps. Journal of Computer Science and Technology 32, 6 (2017), 1108--1124.
    [48]
    Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, and Lorenzo Cavallaro. 2017. Understanding Android app piggybacking: A systematic study of malicious code grafting. IEEE Transactions on Information Forensics & Security (TIFS) 12, 6 (2017), 1269--1284.
    [49]
    Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, and Guoai Xu. 2019. DaPanda: Detecting aggressive push notification in Android apps. In The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE’19).
    [50]
    Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, and Jacques Klein. 2020. MadDroid: Characterising and detecting devious Ad content for Android apps. In The Web Conference 2020 (WWW’20).
    [51]
    Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, and Gianluca Stringhini. 2017. MaMaDroid: Detecting Android malware by building Markov chains of behavioral models. In Network and Distributed Systems Security Symposiym (NDSS’17).
    [52]
    Niall McLaughlin, Jesus Martinez del Rincon, BooJoong Kang, Suleiman Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, et al. 2017. Deep Android malware detection. In Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy. ACM, 301--308.
    [53]
    Stuart Millar, Niall McLaughlin, Jesus Martinez del Rincon, Paul Miller, and Ziming Zhao. 2020. DANdroid: A multi-view discriminative adversarial network for obfuscated Android malware detection. In Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. 353--364.
    [54]
    Annamalai Narayanan, Guozhu Meng, Liu Yang, Jinliang Liu, and Lihui Chen. 2016. Contextual weisfeiler-lehman graph kernel for malware detection. In 2016 International Joint Conference on Neural Networks (IJCNN’16). IEEE, 4701--4708.
    [55]
    Damien Octeau, Somesh Jha, Matthew Dering, Patrick Mcdaniel, Alexandre Bartel, Li Li, Jacques Klein, and Yves Le Traon. 2016. Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis. In Proceedings of the 43th Symposium on Principles of Programming Languages (POPL’16).
    [56]
    Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang, and Heng Yin. 2017. Dark hazard: Learning-based, large-scale discovery of hidden sensitive operations in Android apps. In NDSS.
    [57]
    Naser Peiravian and Xingquan Zhu. 2013. Machine learning for android malware detection using permission and API calls. In 2013 IEEE 25th International Conference on Tools with Artificial Intelligence. IEEE, 300--305.
    [58]
    Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating experimental bias in malware classification across space and time. In 28th USENIX Security Symposium (USENIX Security’19). USENIX Association, Santa Clara, CA, 729--746. https://www.usenix.org/conference/usenixsecurity19/presentation/pendlebury.
    [59]
    Roberto Perdisci and ManChon U. 2012. VAMO: Towards a fully automated malware clustering validity analysis. In Proceedings of the 28th Annual Computer Security Applications Conference. 329--338.
    [60]
    Douglas A. Reynolds. 2009. Gaussian mixture models.Encyclopedia of Biometrics 741 (2009), 659--663.
    [61]
    S. Rasoul Safavian and David Landgrebe. 1991. A survey of decision tree classifier methodology. IEEE Transactions on Systems, Man, and Cybernetics 21, 3 (1991), 660--674.
    [62]
    Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, and Gonzalo Álvarez. 2013. Puma: Permission usage to detect malware in android. In International Joint Conference CISIS12-ICEUTE 12-SOCO 12 Special Sessions. Springer, 289--298.
    [63]
    Marcos Sebastián, Richard Rivera, Platon Kotzias, and Juan Caballero. 2016. Avclass: A tool for massive malware labeling. In International Symposium on Research in Attacks, Intrusions, and Defenses. Springer, 230--253.
    [64]
    Xiaoyu Sun, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Damien Octeau, and John Grundy. 2020. Taming reflection: An essential step towards whole-program analysis of Android apps. ACM Transactions on Software Engineering and Methodology (TOSEM) (2020).
    [65]
    Chakkrit Tantithamthavorn, Ahmed E. Hassan, and Kenichi Matsumoto. 2018. The impact of class rebalancing techniques on the performance and interpretation of defect prediction models. IEEE Transactions on Software Engineering 46, 11 (2018), 1200--1219.
    [66]
    Chakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, and Kenichi Matsumoto. 2016. An empirical comparison of model validation techniques for defect prediction models. IEEE Transactions on Software Engineering 43, 1 (2016), 1--18.
    [67]
    Haoyu Wang, Junjun Si, Hao Li, and Yao Guo. 2019. RmvDroid: Towards a reliable Android malware dataset with app metadata. In Proceedings of the 16th International Conference on Mining Software Repositories. IEEE Press, 404--408.
    [68]
    Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep ground truth analysis of current Android malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA’17). Springer, Bonn, Germany, 252--276.
    [69]
    Zhihua Wen and Vassilios Tzerpos. 2004. An effectiveness measure for software clustering algorithms. In Proceedings of the 12th IEEE International Workshop on Program Comprehension, 2004. IEEE, 194--203.
    [70]
    Songyang Wu, Pan Wang, Xun Li, and Yong Zhang. 2016. Effective detection of android malware based on the usage of data flow APIs and machine learning. Information and Software Technology 75 (2016), 17--25.
    [71]
    Zhiwu Xu, Kerong Ren, Shengchao Qin, and Florin Craciun. 2018. CDGDroid: Android malware detection based on deep learning using CFG and DFG. In International Conference on Formal Engineering Methods. Springer, 177--193.
    [72]
    Wei Yang, Mukul R. Prasad, and Tao Xie. 2018. Enmobile: Entity-based characterization and analysis of mobile malware. In Proceedings of the 40th International Conference on Software Engineering. 384--394.
    [73]
    Xinli Yang, David Lo, Li Li, Xin Xia, Tegawendé F. Bissyandé, and Jacques Klein. 2017. Characterizing malicious Android apps by mining topic-specific data flow signatures. Information and Software Technology 90 (2017), 27--39.
    [74]
    Jian Yu, Miin-Shen Yang, and E. Stanley Lee. 2011. Sample-weighted clustering methods. Computers & Mathematics with Applications 62, 5 (2011), 2200--2208.
    [75]
    Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, and Yibo Xue. 2014. Droid-SEC: Deep learning in android malware detection. In ACM SIGCOMM Computer Communication Review, Vol. 44. ACM, 371--372.
    [76]
    Xu Zhiwu, Kerong Ren, and Fu Song. 2019. Android malware family classification and characterization using CFG and DFG. In 2019 International Symposium on Theoretical Aspects of Software Engineering (TASE’19). IEEE, 49--56.
    [77]
    Yajin Zhou and Xuxian Jiang. 2012. Dissecting android malware: Characterization and evolution. In 2012 IEEE Symposium on Security and Privacy. IEEE, 95--109.

    Cited By

    View all
    • (2024)A Gaussian–Based WGAN–GP Oversampling Approach for Solving the Class Imbalance ProblemInternational Journal of Applied Mathematics and Computer Science10.61822/amcs-2024-002134:2(291-307)Online publication date: 25-Jun-2024
    • (2024)A cautionary tale about properly vetting datasets used in supervised learning predicting metabolic pathway involvementPLOS ONE10.1371/journal.pone.029958319:5(e0299583)Online publication date: 2-May-2024
    • (2024)sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart ContractsACM Transactions on Software Engineering and Methodology10.1145/364184633:5(1-55)Online publication date: 4-Jun-2024
    • Show More Cited By

    Index Terms

    1. On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Software Engineering and Methodology
        ACM Transactions on Software Engineering and Methodology  Volume 30, Issue 3
        Continuous Special Section: AI and SE
        July 2021
        600 pages
        ISSN:1049-331X
        EISSN:1557-7392
        DOI:10.1145/3450566
        • Editor:
        • Mauro Pezzè
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 08 May 2021
        Accepted: 01 January 2021
        Revised: 01 December 2020
        Received: 01 March 2020
        Published in TOSEM Volume 30, Issue 3

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Duplication
        2. android
        3. dataset
        4. machine learning
        5. malware detection

        Qualifiers

        • Research-article
        • Research
        • Refereed

        Funding Sources

        • Discovery Early Career Researcher Award (DECRA)
        • European Union's Horizon 2020 research and innovation program
        • National Natural Science Foundation of China
        • Discovery project
        • Fonds National de la Recherche (FNR), Luxembourg, under project CHARACTERIZE
        • SPARTA project
        • Australian Research Council (ARC) under a Laureate Fellowship

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)102
        • Downloads (Last 6 weeks)7
        Reflects downloads up to

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)A Gaussian–Based WGAN–GP Oversampling Approach for Solving the Class Imbalance ProblemInternational Journal of Applied Mathematics and Computer Science10.61822/amcs-2024-002134:2(291-307)Online publication date: 25-Jun-2024
        • (2024)A cautionary tale about properly vetting datasets used in supervised learning predicting metabolic pathway involvementPLOS ONE10.1371/journal.pone.029958319:5(e0299583)Online publication date: 2-May-2024
        • (2024)sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart ContractsACM Transactions on Software Engineering and Methodology10.1145/364184633:5(1-55)Online publication date: 4-Jun-2024
        • (2024)Intelligent Pattern Recognition Using Equilibrium Optimizer With Deep Learning Model for Android Malware DetectionIEEE Access10.1109/ACCESS.2024.335794412(24516-24524)Online publication date: 2024
        • (2024)Leveraging application permissions and network traffic attributes for Android ransomware detectionJournal of Network and Computer Applications10.1016/j.jnca.2024.103950230(103950)Online publication date: Oct-2024
        • (2024)GSEDroidComputers and Security10.1016/j.cose.2024.103807140:COnline publication date: 1-May-2024
        • (2023)Potential Risks Arising from the Absence of Signature Verification in Miniapp PluginsProceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps10.1145/3605762.3624433(59-64)Online publication date: 26-Nov-2023
        • (2023)Demystifying Hidden Sensitive Operations in Android AppsACM Transactions on Software Engineering and Methodology10.1145/357415832:2(1-30)Online publication date: 29-Mar-2023
        • (2023)Obfuscation-Resilient Android Malware Analysis Based on Complementary FeaturesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330250918(5056-5068)Online publication date: 1-Jan-2023
        • (2023)Cyber Code Intelligence for Android Malware DetectionIEEE Transactions on Cybernetics10.1109/TCYB.2022.316462553:1(617-627)Online publication date: Jan-2023
        • Show More Cited By

        View Options

        Get Access

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media