{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T11:41:05Z","timestamp":1769168465216,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819635306","type":"print"},{"value":"9789819635313","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_10","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:11:32Z","timestamp":1741867892000},"page":"187-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Decoding Android Malware with\u00a0a\u00a0Fraction of\u00a0Features: An Attention-Enhanced MLP-SVM Approach"],"prefix":"10.1007","author":[{"given":"Safayat Bin","family":"Hakim","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Adil","sequence":"additional","affiliation":[]},{"given":"Kamal","family":"Acharya","sequence":"additional","affiliation":[]},{"given":"Houbing Herbert","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol.\u00a014, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Batouche, A., Jahankhani, H.: A comprehensive approach to android malware detection using machine learning. Inform. Sec. Technol. Controlling Pandemics, 171\u2013212 (2021)","DOI":"10.1007\/978-3-030-72120-6_7"},{"key":"10_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103676","volume":"139","author":"H Bostani","year":"2024","unstructured":"Bostani, H., Moonsamy, V.: Evadedroid: a practical evasion attack on machine learning for black-box android malware detection. Comput. Sec. 139, 103676 (2024)","journal-title":"Comput. Sec."},{"key":"10_CR4","unstructured":"Canadian Institute for Cybersecurity (CIC): Cccs-cic-andmal-2020. Canadian Institute for Cybersecurity (CIC) Project in Collaboration with Canadian Centre for Cyber Security (CCCS) (May 2020), available online: https:\/\/www.unb.ca\/cic\/datasets\/andmal2020.html Accessed 1 May 2024"},{"key":"10_CR5","unstructured":"Daoudi, N., Allix, K., Bissyand\u00e9, T.F., Klein, J.: A two-steps approach to improve the performance of android malware detectors. arXiv preprint arXiv:2205.08265 (2022)"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Dong, S., et al.: Understanding android obfuscation techniques: a large-scale investigation in the wild. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) SecureComm 2018. LNICSSITE, vol. 254, pp. 172\u2013192. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01701-9_10","DOI":"10.1007\/978-3-030-01701-9_10"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2014","unstructured":"Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutorials 17(2), 998\u20131022 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3162625","volume":"26","author":"J Garcia","year":"2018","unstructured":"Garcia, J., Hammad, M., Malek, S.: Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Trans. Softw. Eng. Methodol. (TOSEM) 26(3), 1\u201329 (2018)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"10_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529","volume":"47","author":"M Gopinath","year":"2023","unstructured":"Gopinath, M., Sethuraman, S.C.: A comprehensive survey on deep learning based malware detection techniques. Comput. Sci. Rev. 47, 100529 (2023)","journal-title":"Comput. Sci. Rev."},{"issue":"9","key":"10_CR10","doi-asserted-by":"publisher","first-page":"5403","DOI":"10.3390\/app13095403","volume":"13","author":"L Hammood","year":"2023","unstructured":"Hammood, L., Do\u011fru, \u0130A., K\u0131l\u0131\u00e7, K.: Machine learning-based adaptive genetic algorithm for android malware detection in auto-driving vehicles. Appl. Sci. 13(9), 5403 (2023)","journal-title":"Appl. Sci."},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.iotcps.2023.03.001","volume":"3","author":"R Islam","year":"2023","unstructured":"Islam, R., Sayed, M.I., Saha, S., Hossain, M.J., Masud, M.A.: Android malware classification using optimum feature selection and ensemble machine learning. Internet of Things Cyber-Phys. Syst. 3, 100\u2013111 (2023)","journal-title":"Internet of Things Cyber-Phys. Syst."},{"issue":"3","key":"10_CR12","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2018","unstructured":"Kim, T., Kang, B., Rho, M., Sezer, S., Im, E.G.: A multimodal deep learning method for android malware detection using various features. IEEE Trans. Inf. Forensics Secur. 14(3), 773\u2013788 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10_CR13","first-page":"617","volume":"10","author":"C Li","year":"2021","unstructured":"Li, C., Zheng, J.: Api call-based malware classification using recurrent neural networks. J. Cyber Sec. Mobility 10(3), 617\u2013640 (2021)","journal-title":"J. Cyber Sec. Mobility"},{"key":"10_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103604","volume":"137","author":"J Li","year":"2024","unstructured":"Li, J., He, J., Li, W., Fang, W., Yang, G., Li, T.: Syndroid: an adaptive enhanced android malware classification method based on ctgan-svm. Comput. Sec. 137, 103604 (2024)","journal-title":"Comput. Sec."},{"issue":"2","key":"10_CR15","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s10462-011-9205-2","volume":"36","author":"Q Liu","year":"2011","unstructured":"Liu, Q., Chen, C., Zhang, Y., Hu, Z.: Feature selection for support vector machines with rbf kernel. Artif. Intell. Rev. 36(2), 99\u2013115 (2011)","journal-title":"Artif. Intell. Rev."},{"key":"10_CR16","unstructured":"Loshchilov, I., Hutter, F.: Sgdr: Stochastic gradient descent with warm restarts. arXiv preprint arXiv:1608.03983 (2016)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Musikawan, P., Kongsorot, Y., You, I., So-In, C.: An enhanced deep learning neural network for the detection and identification of android malware. IEEE Internet of Things J. (2022)","DOI":"10.1109\/JIOT.2022.3194881"},{"issue":"2","key":"10_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313391","volume":"22","author":"L Onwuzurike","year":"2019","unstructured":"Onwuzurike, L., Mariconti, E., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building markov chains of behavioral models (extended version). ACM Trans. Privacy Sec. (TOPS) 22(2), 1\u201334 (2019)","journal-title":"ACM Trans. Privacy Sec. (TOPS)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Peiravian, N., Zhu, X.: Machine learning for android malware detection using permission and api calls. In: 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pp. 300\u2013305. IEEE (2013)","DOI":"10.1109\/ICTAI.2013.53"},{"issue":"6","key":"10_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., Xiang, Y.: A survey of android malware detection with deep neural models. ACM Comput. Surv. (CSUR) 53(6), 1\u201336 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 329\u2013334 (2013)","DOI":"10.1145\/2484313.2484355"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Sayed, M.I., Saha, S., Haque, A.: Deep learning based malapps detection in android powered mobile cyber-physical system. In: 2023 International Conference on Computing, Networking and Communications (ICNC), pp. 443\u2013449. IEEE (2023)","DOI":"10.1109\/ICNC57223.2023.10074208"},{"issue":"11","key":"10_CR23","doi-asserted-by":"publisher","first-page":"2758","DOI":"10.1109\/78.650102","volume":"45","author":"B Scholkopf","year":"1997","unstructured":"Scholkopf, B., et al.: Comparing support vector machines with gaussian kernels to radial basis function classifiers. IEEE Trans. Signal Process. 45(11), 2758\u20132765 (1997)","journal-title":"IEEE Trans. Signal Process."},{"key":"10_CR24","first-page":"152","volume":"332","author":"A Tall\u00f3n-Ballesteros","year":"2020","unstructured":"Tall\u00f3n-Ballesteros, A., Chen, C.: Explainable ai: using shapley value to explain complex anomaly detection ml-based systems. Machine Learn. Artifi. Intell. 332, 152 (2020)","journal-title":"Machine Learn. Artifi. Intell."},{"key":"10_CR25","unstructured":"Turner, A.: How many android users are there? global and us statistics (2024). https:\/\/www.bankmycell.com\/blog\/how-many-android-users-are-there (2024), Accessed 4 Jun 2024"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"39680","DOI":"10.1109\/ACCESS.2021.3063748","volume":"9","author":"LN Vu","year":"2021","unstructured":"Vu, L.N., Jung, S.: Admat: a cnn-on-matrix approach to android malware detection and classification. IEEE Access 9, 39680\u201339694 (2021)","journal-title":"IEEE Access"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"181102","DOI":"10.1109\/ACCESS.2020.3028370","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Liu, Q., Chi, Y.: Review of android malware detection based on deep learning. IEEE Access 8, 181102\u2013181126 (2020)","journal-title":"IEEE Access"},{"key":"10_CR28","unstructured":"Wermke, D.: Security considerations in the open source software ecosystem (2023)"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Wu, Y., Li, X., Zou, D., Yang, W., Zhang, X., Jin, H.: Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 139\u2013150. IEEE (2019)","DOI":"10.1109\/ASE.2019.00023"},{"issue":"1","key":"10_CR30","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114\u2013123 (2016)","journal-title":"Tsinghua Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:11:44Z","timestamp":1741867904000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}