{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:46:11Z","timestamp":1774453571882,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031490989","type":"print"},{"value":"9783031490996","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49099-6_10","type":"book-chapter","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T06:02:34Z","timestamp":1702015354000},"page":"159-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["MDLDroid: Multimodal Deep Learning Based Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Narendra","family":"Singh","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,9]]},"reference":[{"key":"10_CR1","unstructured":"Cyber attacks on android devices on the rise 11 July 2018. https:\/\/www.gdatasoftware.com\/blog\/2018\/11\/31255-cyber-attacks-on-android-devices-on-the-rise"},{"key":"10_CR2","unstructured":"Global smartphone shipments by OS 2016\u20132022, statistic. google play protect. android2018 (2018). https:\/\/android-developers.googleblog.com\/2019\/02\/google-play-protect-in-2018-new-updates.html"},{"key":"10_CR3","unstructured":"Operating system market share worldwide. https:\/\/gs.statcounter.com\/os-market-share. Accessed 12 June 2019"},{"key":"10_CR4","unstructured":"Stephanie cuthbertson - director, android - google I\/0 2019 keynote speech. https:\/\/www.youtube.com\/watch?v=lyRPyRKHO8M. Accessed Apr 2020"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: Androzoo: collecting millions of android apps for the research community. In: 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 468\u2013471. IEEE (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"10_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: DL-droid: deep learning based android malware detection using real devices. Comput. Secur. 89, 101663 (2020)","journal-title":"Comput. Secur."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Arora, A., Peddoju, S.K.: Ntpdroid: a hybrid android malware detector using network traffic and system permissions. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 808\u2013813. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00115"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: NDSS, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","first-page":"15498","DOI":"10.1038\/s41598-022-18936-9","volume":"12","author":"M Asam","year":"2022","unstructured":"Asam, M., et al.: IoT malware detection architecture using a novel channel boosted and squeezed CNN. Sci. Rep. 12(1), 15498 (2022)","journal-title":"Sci. Rep."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Avdiienko, V., et al.: Mining apps for abnormal usage of sensitive data. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 426\u2013436. IEEE (2015)","DOI":"10.1109\/ICSE.2015.61"},{"key":"10_CR11","first-page":"2814","volume":"26","author":"P Baldi","year":"2013","unstructured":"Baldi, P., Sadowski, P.J.: Understanding dropout. Adv. Neural. Inf. Process. Syst. 26, 2814\u20132822 (2013)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A Damodaran","year":"2017","unstructured":"Damodaran, A., Troia, F.D., Visaggio, C.A., Austin, T.H., Stamp, M.: A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech. 13, 1\u201312 (2017)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Dash, S.K., et al.: Droidscribe: classifying android malware based on runtime behavior. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 252\u2013261. IEEE (2016)","DOI":"10.1109\/SPW.2016.25"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Fan, M., et al.: Graph embedding based familial analysis of android malware using unsupervised learning. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 771\u2013782. IEEE (2019)","DOI":"10.1109\/ICSE.2019.00085"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 281\u2013294 (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"G\u00fclmez, S., Sogukpinar, I.: Graph-based malware detection using opcode sequences. In: 2021 9th International Symposium on Digital Forensics and Security (ISDFS), pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/ISDFS52919.2021.9486386"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Guo, J., Xu, Y., Xu, W., Zhan, Y., Sun, Y., Guo, S.: Mdenet: multi-modal dual-embedding networks for malware open-set recognition. arXiv preprint arXiv:2305.01245 (2023)","DOI":"10.1109\/TNNLS.2024.3373809"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A., Chen, L., Ye, Y.: Deep4maldroid: a deep learning framework for android malware detection based on linux kernel system call graphs. In: 2016 IEEE\/WIC\/ACM International Conference on Web Intelligence Workshops (WIW), pp. 104\u2013111. IEEE (2016)","DOI":"10.1109\/WIW.2016.040"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A., Chen, L., Ye, Y., Bourlai, T.: Deep neural networks for automatic android malware detection. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 803\u2013810 (2017)","DOI":"10.1145\/3110025.3116211"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Kang, B., Yerima, S.Y., McLaughlin, K., Sezer, S.: N-opcode analysis for android malware classification and categorization. In: 2016 International Conference on Cyber Security and Protection of Digital Services (cyber Security), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/CyberSecPODS.2016.7502343"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Kelkar, S., Kraus, T., Morgan, D., Zhang, J., Dai, R.: Analyzing HTTP-based information exfiltration of malicious android applications. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 1642\u20131645. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00242"},{"issue":"3","key":"10_CR22","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2018","unstructured":"Kim, T., Kang, B., Rho, M., Sezer, S., Im, E.G.: A multimodal deep learning method for android malware detection using various features. IEEE Trans. Inf. Forensics Secur. 14(3), 773\u2013788 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Li, S., Li, Y., Wu, X., Al Otaibi, S., Tian, Z.: Imbalanced malware family classification using multimodal fusion and weight self-learning. IEEE Trans. Intell. Transp. Syst. (2022)","DOI":"10.1109\/TITS.2022.3208891"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Li, W., Ge, J., Dai, G.: Detecting malware for android platform: an SVM-based approach. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 464\u2013469. IEEE (2015)","DOI":"10.1109\/CSCloud.2015.50"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Liang, S., Du, X.: Permission-combination-based scheme for android mobile malware detection. In: 2014 IEEE International Conference on Communications (ICC), pp. 2301\u20132306. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883666"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Liangboonprakong, C., Sornil, O.: Classification of malware families based on n-grams sequential pattern features. In: 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA), pp. 777\u2013782. IEEE (2013)","DOI":"10.1109\/ICIEA.2013.6566472"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"124579","DOI":"10.1109\/ACCESS.2020.3006143","volume":"8","author":"K Liu","year":"2020","unstructured":"Liu, K., Xu, S., Xu, G., Zhang, M., Sun, D., Liu, H.: A review of android malware detection approaches based on machine learning. IEEE Access 8, 124579\u2013124607 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"10_CR28","doi-asserted-by":"publisher","first-page":"974","DOI":"10.3390\/s19040974","volume":"19","author":"X Liu","year":"2019","unstructured":"Liu, X., Du, X., Zhang, X., Zhu, Q., Wang, H., Guizani, M.: Adversarial samples on android malware detection systems for IoT systems. Sensors 19(4), 974 (2019)","journal-title":"Sensors"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Lou, S., Cheng, S., Huang, J., Jiang, F.: TFDroid: android malware detection by topics and sensitive data flows using machine learning techniques. In: 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT), pp. 30\u201336. IEEE (2019)","DOI":"10.1109\/INFOCT.2019.8711179"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.inffus.2018.12.006","volume":"52","author":"A Mart\u00edn","year":"2019","unstructured":"Mart\u00edn, A., Lara-Cabrera, R., Camacho, D.: Android malware detection through hybrid features fusion and ensemble classifiers: the andropytool framework and the omnidroid dataset. Inf. Fusion 52, 128\u2013142 (2019)","journal-title":"Inf. Fusion"},{"key":"10_CR31","volume":"58","author":"S Millar","year":"2021","unstructured":"Millar, S., McLaughlin, N., del Rincon, J.M., Miller, P.: Multi-view deep learning for zero-day android malware detection. J. Inf. Secur. Appl. 58, 102718 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 421\u2013430. IEEE (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Peiravian, N., Zhu, X.: Machine learning for android malware detection using permission and API calls. In: 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pp. 300\u2013305. IEEE (2013)","DOI":"10.1109\/ICTAI.2013.53"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Rahali, A., Lashkari, A.H., Kaur, G., Taheri, L., Gagnon, F., Massicotte, F.: Didroid: android malware classification and characterization using deep image learning. In: 2020 the 10th International Conference on Communication and Network Security, pp. 70\u201382 (2020)","DOI":"10.1145\/3442520.3442522"},{"issue":"3","key":"10_CR35","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11416-006-0027-8","volume":"2","author":"DKS Reddy","year":"2006","unstructured":"Reddy, D.K.S., Pujari, A.K.: N-gram analysis for computer virus detection. J. Comput. Virol. 2(3), 231\u2013239 (2006)","journal-title":"J. Comput. Virol."},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Rosmansyah, Y., Dabarsyah, B., et al.: Malware detection on android smartphones using API class and machine learning. In: 2015 International Conference on Electrical Engineering and Informatics (ICEEI), pp. 294\u2013297. IEEE (2015)","DOI":"10.1109\/ICEEI.2015.7352513"},{"issue":"2","key":"10_CR37","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TIFS.2013.2291066","volume":"9","author":"Z Shan","year":"2013","unstructured":"Shan, Z., Wang, X.: Growing grapes in your computer to defend against malware. IEEE Trans. Inf. Forensics Secur. 9(2), 196\u2013207 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR38","unstructured":"Shen, Y., Stringhini, G.: Attack2vec: leveraging temporal word embeddings to understand the evolution of cyberattacks. In: 28th $$\\{$$USENIX$$\\}$$ Security Symposium $$\\{$$USENIX$$\\}$$ Security 2019), pp. 905\u2013921 (2019)"},{"issue":"5\u20136","key":"10_CR39","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1080\/01691864.2022.2035253","volume":"36","author":"M Suzuki","year":"2022","unstructured":"Suzuki, M., Matsuo, Y.: A survey of multimodal deep generative models. Adv. Robot. 36(5\u20136), 261\u2013278 (2022)","journal-title":"Adv. Robot."},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Vosoughi, S., Vijayaraghavan, P., Roy, D.: Tweet2vec: learning tweet embeddings using character-level CNN-LSTM encoder-decoder. In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, pp. 1041\u20131044 (2016)","DOI":"10.1145\/2911451.2914762"},{"key":"10_CR41","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2018.12.014","volume":"133","author":"S Wang","year":"2019","unstructured":"Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., Jia, Z.: A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133, 15\u201325 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Xu, P., Zhu, X., Clifton, D.A.: Multimodal learning with transformers: a survey. IEEE Trans. Pattern Anal. Mach. Intell. (2023)","DOI":"10.1109\/TPAMI.2023.3275156"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Yang, Z., et al.: i-code: an integrative and composable multimodal learning framework. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, pp. 10880\u201310890 (2023)","DOI":"10.1609\/aaai.v37i9.26290"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Yerima, S.Y., Sezer, S., Muttik, I.: Android malware detection using parallel machine learning classifiers. In: 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, pp. 37\u201342. IEEE (2014)","DOI":"10.1109\/NGMAST.2014.23"},{"issue":"1","key":"10_CR45","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114\u2013123 (2016)","journal-title":"Tsinghua Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49099-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T16:14:42Z","timestamp":1730823282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49099-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031490989","9783031490996"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49099-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Raipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}