{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:28:18Z","timestamp":1761812898687,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081230","type":"print"},{"value":"9783032081247","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_23","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:22Z","timestamp":1761812602000},"page":"388-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HGANN-Mal: A Hypergraph Attention Neural Network Approach for\u00a0Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Mohammad Reza","family":"Norouzian","sequence":"first","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Branson, K., Belongie, S.: Higher order learning with graphs. In: Proceedings of the 23rd International Conference on Machine Learning (2006)","DOI":"10.1145\/1143844.1143847"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3290353","volume":"3","author":"U Alon","year":"2019","unstructured":"Alon, U., et al.: Code2vec: learning distributed representations of code. Proc. ACM Program. Lang. 3, 1\u201329 (2019)","journal-title":"Proc. ACM Program. Lang."},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Amer, E.: A dynamic windows malware detection and prediction method based on contextual understanding of api call sequence. Comput. Secur. (2020)","DOI":"10.1016\/j.cose.2020.101760"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Arora, A.A.E.A.: Permpair: android malware detection using permission pairs. IEEE Trans. Inf. Forensics Secur. (2020)","DOI":"10.1109\/TIFS.2019.2950134"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Arp, D., et\u00a0al.: Drebin: effective and explainable detection of android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Bai, S., Zhang, F., Torr, P.H.S.: Hypergraph convolution and hypergraph attention. Pattern Recogn. 110 (2021)","DOI":"10.1016\/j.patcog.2020.107637"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Banerjee, C., et\u00a0al.: An empirical study on generalizations of the relu activation function. In: Proceedings of the 2019 ACM Southeast Conference (2019)","DOI":"10.1145\/3299815.3314450"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Bilot, T., El\u00a0Madhoun, N., Al\u00a0Agha, K., Zouaoui, A.: A survey on malware detection with graph representation learning. ACM Comput. Surv. 56(11) (2024)","DOI":"10.1145\/3664649"},{"key":"23_CR9","unstructured":"Clevert, D.A., Unterthiner, T., Hochreiter, S.: Fast and accurate deep network learning by exponential linear units (elus). arXiv preprint arXiv:1511.07289 (2015)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Cui, H., et\u00a0al.: On positional and structural node features for graph neural networks on non-attributed graphs. In: 31st ACM International Conference on Information & Knowledge Management (2022)","DOI":"10.1145\/3511808.3557661"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Feng, Y., You, H., Zhang, Z., Ji, R., Gao, Y.: Hypergraph neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence (2019)","DOI":"10.1609\/aaai.v33i01.33013558"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Feng, Y., et\u00a0al.: Apposcopy: semantics-based detection of android malware through static analysis. In: 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry 35\u201341 (1977)","DOI":"10.2307\/3033543"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Gao, Y., et\u00a0al.: Hgnn+: general hypergraph neural networks. IEEE Trans. Pattern Anal. Mach. Intell. (2023)","DOI":"10.1109\/TPAMI.2022.3182052"},{"issue":"5","key":"23_CR15","first-page":"2548","volume":"44","author":"Y Gao","year":"2020","unstructured":"Gao, Y., Zhang, Z., Lin, H., Zhao, X., Du, S., Zou, C.: Hypergraph learning: methods and practices. IEEE Trans. Pattern Anal. Mach. Intell. 44(5), 2548\u20132566 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Gascon, H., et\u00a0al.: Structural detection of android malware using embedded call graphs. In: 2013 ACM Workshop on Artificial Intelligence and Security (2013)","DOI":"10.1145\/2517312.2517315"},{"key":"23_CR17","unstructured":"Google: The android show: I\/o edition (May 2025). https:\/\/blog.google\/products\/android\/the-android-show-io-2025\/. Accessed 11 June 2025"},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"374","DOI":"10.3390\/s25020374","volume":"25","author":"W Guo","year":"2025","unstructured":"Guo, W., et al.: Malhapgnn: an enhanced call graph-based malware detection framework using hierarchical attention pooling graph neural network. Sensors 25(2), 374 (2025)","journal-title":"Sensors"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Kang, B., Yerima, S.Y., Sezer, S., McLaughlin, K.: N-gram opcode analysis for android malware detection. arXiv preprint arXiv:1612.01445 (2016)","DOI":"10.22619\/IJCSA.2016.100111"},{"issue":"3","key":"23_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3613964","volume":"3","author":"B Khan","year":"2025","unstructured":"Khan, B., Wu, J., Yang, J., Ma, X.: Heterogeneous hypergraph neural network for social recommendation using attention network. ACM Trans. Recomm. Syst. 3(3), 1\u201322 (2025)","journal-title":"ACM Trans. Recomm. Syst."},{"key":"23_CR21","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"issue":"6","key":"23_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3363574","volume":"13","author":"JB Lee","year":"2019","unstructured":"Lee, J.B., Rossi, R.A., Kim, S., Ahmed, N.K., Koh, E.: Attention models in graphs: a survey. ACM Trans. Knowl. Discov. Data (TKDD) 13(6), 1\u201325 (2019)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"23_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102872","volume":"122","author":"C Li","year":"2022","unstructured":"Li, C., et al.: Dmalnet: dynamic malware analysis based on api feature engineering and graph learning. Comput. Secur. 122, 102872 (2022)","journal-title":"Comput. Secur."},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Lu, X.A.E.A.: Sndgcn: robust android malware detection based on subgraph network and denoising gcn network. Expert Syst. Appl. (2024)","DOI":"10.1016\/j.eswa.2024.123922"},{"key":"23_CR25","unstructured":"Maas, A.L., Hannun, A.Y., Ng, A.Y., et\u00a0al.: Rectifier nonlinearities improve neural network acoustic models. In: Proceedings of the ICML, vol.\u00a030, p.\u00a03. Atlanta, GA (2013)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Mahdavifar, S., et\u00a0al.: Dynamic android malware category classification using semi-supervised deep learning. In: The 18th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC) (2020)","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Mahdavifar, S., et\u00a0al.: Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder. J. Netw. Syst. Manag. (2022)","DOI":"10.1007\/s10922-021-09634-4"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (2007)","DOI":"10.1109\/ACSAC.2007.4413008"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A multi-view context-aware approach to android malware detection and malicious code localization. Empir. Softw. Eng. 23(3) (2018)","DOI":"10.1007\/s10664-017-9539-8"},{"issue":"13","key":"23_CR30","doi-asserted-by":"publisher","first-page":"3645","DOI":"10.3390\/s20133645","volume":"20","author":"W Niu","year":"2020","unstructured":"Niu, W., Cao, R., Zhang, X., Ding, K., Zhang, K., Li, T.: Opcode-level function call graph based android malware classification using deep learning. Sensors 20(13), 3645 (2020)","journal-title":"Sensors"},{"key":"23_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-030-91356-4_14","volume-title":"Information Security","author":"MR Norouzian","year":"2021","unstructured":"Norouzian, M.R., Xu, P., Eckert, C., Zarras, A.: Hybroid: toward android malware detection and categorization with program code and network traffic. In: Liu, J.K., Katsikas, S., Meng, W., Susilo, W., Intan, R. (eds.) ISC 2021. LNCS, vol. 13118, pp. 259\u2013278. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91356-4_14"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Onwuzurike, L., et\u00a0al.: Mamadroid: detecting android malware by building markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. (TOPS) (2019)","DOI":"10.1145\/3313391"},{"issue":"11","key":"23_CR33","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1016\/j.infsof.2012.05.003","volume":"54","author":"\u00c9 Payet","year":"2012","unstructured":"Payet, \u00c9., Spoto, F.: Static analysis of android programs. Inf. Softw. Technol. 54(11), 1192\u20131201 (2012)","journal-title":"Inf. Softw. Technol."},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Qian, X., Zheng, X., He, Y., Yang, S., Cavallaro, L.: Lamd: context-driven android malware detection and classification with llms. arXiv preprint arXiv:2502.13055 (2025)","DOI":"10.1109\/SPW67851.2025.00017"},{"issue":"1","key":"23_CR35","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/TCYB.2022.3164625","volume":"53","author":"J Qiu","year":"2022","unstructured":"Qiu, J., et al.: Cyber code intelligence for android malware detection. IEEE Trans. Cybern. 53(1), 617\u2013627 (2022)","journal-title":"IEEE Trans. Cybern."},{"key":"23_CR36","unstructured":"Shokouhinejad, H., et\u00a0al.: Recent advances in malware detection: graph learning and explainability. arXiv preprint arXiv:2502.10556 (2025)"},{"key":"23_CR37","volume":"80","author":"D Soi","year":"2024","unstructured":"Soi, D., Sanna, A., Maiorca, D., Giacinto, G.: Enhancing android malware detection explainability through function call graph apis. J. Inf. Secur. Appl. 80, 103691 (2024)","journal-title":"J. Inf. Secur. Appl."},{"issue":"Suppl 2","key":"23_CR38","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.1007\/s10462-023-10577-2","volume":"56","author":"C Sun","year":"2023","unstructured":"Sun, C., Li, C., Lin, X., Zheng, T., Meng, F., Rui, X., Wang, Z.: Attention-based graph neural networks: a survey. Artif. Intell. Rev. 56(Suppl 2), 2263\u20132310 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"23_CR39","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li , P., Bengio, Y.: Graph attention networks. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"23_CR40","doi-asserted-by":"crossref","unstructured":"Wu, D.J., et\u00a0al.: Droidmat: android malware detection through manifest and api calls tracing. In: Seventh Asia Joint Conference on Information Security (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"23_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107185","volume":"227","author":"L Wu","year":"2021","unstructured":"Wu, L., Wang, D., Song, K., Feng, S., Zhang, Y., Yu, G.: Dual-view hypergraph neural networks for attributed graph learning. Knowl.-Based Syst. 227, 107185 (2021)","journal-title":"Knowl.-Based Syst."},{"issue":"5","key":"23_CR42","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1002\/ett.3016","volume":"27","author":"X Xiao","year":"2016","unstructured":"Xiao, X., Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27(5), 675\u2013684 (2016)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: BWCCA (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"issue":"10","key":"23_CR44","doi-asserted-by":"publisher","first-page":"8432","DOI":"10.1109\/JIOT.2022.3188583","volume":"10","author":"R Yumlembam","year":"2022","unstructured":"Yumlembam, R., Issac, B., Jacob, S.M., Yang, L.: Iot-based android malware detection using graph neural network with adversarial defense. IEEE Internet Things J. 10(10), 8432\u20138444 (2022)","journal-title":"IEEE Internet Things J."},{"key":"23_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, D., et al.: Android malware detection based on hypergraph neural networks. Appl. Sci. 13(23) (2023)","DOI":"10.3390\/app132312629"},{"key":"23_CR46","doi-asserted-by":"crossref","unstructured":"Zheng, J., et\u00a0al.: Maskdroid: robust android malware detection with masked graph representations. In: 39th IEEE\/ACM ASE 2024 (2024)","DOI":"10.1145\/3691620.3695008"},{"key":"23_CR47","doi-asserted-by":"crossref","unstructured":"Zhou, D., Huang, J., Sch\u00f6lkopf, B.: Learning with hypergraphs: clustering, classification, and embedding. Adv. Neural Inf. Process. Syst. (2006)","DOI":"10.7551\/mitpress\/7503.003.0205"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:35Z","timestamp":1761812615000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}