{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:58:17Z","timestamp":1763348297572},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s00521-020-05429-x","type":"journal-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T17:02:56Z","timestamp":1604682176000},"page":"11283-11294","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A deep learning system for health care IoT and smartphone malware detection"],"prefix":"10.1007","volume":"34","author":[{"given":"Muhammad","family":"Amin","sequence":"first","affiliation":[]},{"given":"Duri","family":"Shehwar","sequence":"additional","affiliation":[]},{"given":"Abrar","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Teresa","family":"Guarda","sequence":"additional","affiliation":[]},{"given":"Tamleek Ali","family":"Tanveer","sequence":"additional","affiliation":[]},{"given":"Sajid","family":"Anwar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,6]]},"reference":[{"key":"5429_CR1","unstructured":"Android Malware stats techjury. https:\/\/techjury.net\/stats-about\/android-market-share\/. (Accessed 14 Oct 2019)"},{"key":"5429_CR2","unstructured":"Android Malware Stats f-secure. https:\/\/blog.f-secure.com\/another-reason-99-percent-of-mobile-malware-targets-androids\/. (Accessed 14 Oct 2019)"},{"key":"5429_CR3","doi-asserted-by":"crossref","unstructured":"Milosevic J, Sklavos N, Koutsikou K (2016) MalAware: effective and efficient run-time mobile malware detector malware in IoT software and hardware","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.65"},{"key":"5429_CR4","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) DREBIN: effective and explainable detection of android malware in your pocket in NDSS","DOI":"10.14722\/ndss.2014.23247"},{"issue":"9","key":"5429_CR5","doi-asserted-by":"publisher","first-page":"4417","DOI":"10.1007\/s00521-019-04095-y","volume":"32","author":"MI Razzak","year":"2020","unstructured":"Razzak MI, Imran M, Xu G (2020) Big data analytics for preventive medicine. Neural Comput Appl 32(9):4417\u20134451","journal-title":"Neural Comput Appl"},{"key":"5429_CR6","doi-asserted-by":"crossref","unstructured":"La Marra A, Martinelli F, Saracino A, Sheikhalishahi M (2016) MalProfiler: automatic and effective classification of android malicious apps in behavioral classes. In: International symposium on foundations and practice of security, Springer, pp 3\u201319","DOI":"10.1007\/978-3-319-51966-1_1"},{"key":"5429_CR7","doi-asserted-by":"crossref","unstructured":"Bedford A, Garvin S, Desharnais J, Tawbi N, Ajakan H, Audet F, Lebel B (2016) Andrana: quick and accurate malware detection for android. In: International symposium on foundations and practice of security, Springer, pp 20\u201335","DOI":"10.1007\/978-3-319-51966-1_2"},{"key":"5429_CR8","unstructured":"Yang Y, Wei Z, Xu Y, He H, Wang W (xxxx) DroidWard: an effective dynamic analysis method for vetting android applications cluster computing, pp. 1\u201311"},{"key":"5429_CR9","doi-asserted-by":"crossref","unstructured":"Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA (2016) Spotting the malicious moment: characterizing malware behavior using dynamic features. In: 2016 11th international conference on availability, reliability and security (ARES), IEEE, pp 372\u2013381","DOI":"10.1109\/ARES.2016.70"},{"issue":"3","key":"5429_CR10","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1007\/s00521-019-04069-0","volume":"32","author":"A Naseer","year":"2020","unstructured":"Naseer A, Rani M, Naz S, Razzak MI, Imran M, Xu G (2020) Refining Parkinson\u2019s neurological disorder identification through deep transfer learning. Neural Comput Appl 32(3):839\u2013854","journal-title":"Neural Comput Appl"},{"issue":"5","key":"5429_CR11","doi-asserted-by":"publisher","first-page":"1911","DOI":"10.1109\/JBHI.2018.2874033","volume":"23","author":"MI Razzak","year":"2018","unstructured":"Razzak MI, Imran M, Xu G (2018) Efficient brain tumor segmentation with multiscale two-pathway-group conventional neural networks. IEEE J Biomed Health Inf 23(5):1911\u20131919","journal-title":"IEEE J Biomed Health Inf"},{"key":"5429_CR12","doi-asserted-by":"crossref","unstructured":"Razzak MI, Naz S, Zaib A (2018) Deep learning for medical image processing: overview, challenges and the future. In: Classification in BioApps. Springer, Cham, pp 323\u2013350","DOI":"10.1007\/978-3-319-65981-7_12"},{"issue":"2","key":"5429_CR13","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/s00034-019-01246-3","volume":"39","author":"A Rehman","year":"2020","unstructured":"Rehman A, Naz S, Razzak MI, Akram F, Imran M (2020) A deep learning-based framework for automatic brain tumors classification using transfer learning. Circuits Syst Sig Process 39(2):757\u2013775","journal-title":"Circuits Syst Sig Process"},{"key":"5429_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell S (2017) AndroDialysis: analysis of android intent effectiveness in malware detection. Comput Secur 65:121","journal-title":"Comput Secur"},{"key":"5429_CR15","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"issue":"12","key":"5429_CR16","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1167\/16.12.756","volume":"16","author":"M Lescroart","year":"2016","unstructured":"Lescroart M, Agrawal P, Gallant J (2016) Both convolutional neural networks and voxel-wise encoding models of brain activity derived from ConvNets represent boundary-and surface-related features. J Vis 16(12):756","journal-title":"J Vis"},{"key":"5429_CR17","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.future.2020.05.045","volume":"112","author":"I Razzak","year":"2020","unstructured":"Razzak I, Zafar K, Imran M, Xu G (2020) Randomized nonlinear one-class support vector machines with bounded loss function to detect of outliers for large scale IoT data. Fut Gener Comput Syst 112:715\u2013723","journal-title":"Fut Gener Comput Syst"},{"key":"5429_CR18","doi-asserted-by":"crossref","unstructured":"Kosmidis K, Kalloniatis C (2017) Machine learning and images for malware detection and classification. In: Proceedings of the 21st Pan-Hellenic conference on informatics, ACM, p 5","DOI":"10.1145\/3139367.3139400"},{"key":"5429_CR19","doi-asserted-by":"crossref","unstructured":"McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupe A et al (2017) Deep android malware detection. In: Proceedings of the seventh ACM on conference on data and application security and privacy, ACM, pp 301\u2013308","DOI":"10.1145\/3029806.3029823"},{"key":"5429_CR20","unstructured":"chars2vec intuition engineering. https:\/\/hackernoon.com\/chars2vec-character-based-language-model-for-handling-real-world-texts-with-spelling-errors-and-a3e4053a147d. (Accessed 27 Feb 2019)"},{"key":"5429_CR21","unstructured":"chars2vec-code intuition engineering. https:\/\/github.com\/IntuitionEngineeringTeam. (Accessed 27 Feb 2019)"},{"key":"5429_CR22","doi-asserted-by":"crossref","unstructured":"Yerima SY, Sezer S, Muttik I (2014) Android malware detection using parallel machine learning classifiers In: 2014 eighth international conference on next generation mobile apps, services and technologies, IEEE, pp 37\u201342","DOI":"10.1109\/NGMAST.2014.23"},{"key":"5429_CR23","doi-asserted-by":"crossref","unstructured":"Yerima SY, Sezer S, Muttik I (2015) Android malware detection: an eigenspace analysis approach. In: 2015 science and information conference (SAI), IEEE, pp 1236\u20131242","DOI":"10.1109\/SAI.2015.7237302"},{"key":"5429_CR24","unstructured":"Elish KO, Yao D, Ryder BG (2015) On the need of precise inter-app ICC classification for detecting android malware collusions. In: Proceedings of IEEE mobile security technologies (MoST), in conjunction with the IEEE symposium on security and privacy"},{"key":"5429_CR25","unstructured":"Verma S, Muttoo SK, Pal S (2016) MDROID:android based malware detection using MCM classifier"},{"key":"5429_CR26","doi-asserted-by":"crossref","unstructured":"Wang X, Zhu S, Zhou D, Yang Y (2017) Droid-AntiRM: taming control flow anti-analysis to support automated dynamic analysis of android malware. In: Proceedings of the 33rd annual computer security applications conference, ACM, pp 350\u2013361","DOI":"10.1145\/3134600.3134601"},{"key":"5429_CR27","unstructured":"Feng Y, Bastani O, Martins R, Dillig I, Anand S (2017) Automatically learning android malware signatures from few samples In: Proceedings of the 2017 annual network and distributed system security symposium (NDSS), San Diego, California, USA"},{"key":"5429_CR28","doi-asserted-by":"publisher","first-page":"S48","DOI":"10.1016\/j.diin.2018.01.007","volume":"24","author":"EB Karbab","year":"2018","unstructured":"Karbab EB, Debbabi M, Derhab A, Mouheb D (2018) MalDozer: automatic framework for android malware detection using deep learning. Dig Investig 24:S48","journal-title":"Dig Investig"},{"key":"5429_CR29","doi-asserted-by":"crossref","unstructured":"Schmicker R, Breitinger F, Baggili I (2018) AndroParse-an android feature extraction framework and dataset. In: International conference on digital forensics and cyber crime, Springer, pp 66\u201388","DOI":"10.1007\/978-3-030-05487-8_4"},{"key":"5429_CR30","doi-asserted-by":"crossref","unstructured":"Wang J, Jing Q, Gao J (2019) SEdroid: a robust android malware detector using selective ensemble learning. arXiv preprint arXiv:1909.03837","DOI":"10.1109\/WCNC45663.2020.9120537"},{"key":"5429_CR31","doi-asserted-by":"crossref","unstructured":"Graf R, Kaplan LA, King R (2019) Neural network-based technique for android smartphone applications classification. In: 2019 11th international conference on cyber conflict (CyCon), IEEE, vol 900, pp 1\u201317","DOI":"10.23919\/CYCON.2019.8757162"},{"key":"5429_CR32","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.future.2020.02.002","volume":"107","author":"M Alazab","year":"2020","unstructured":"Alazab M, Alazab M, Shalaginov A, Mesleh A, Awajan A (2020) Intelligent mobile malware detection using permission requests and api calls. Fut Gener Comput Syst 107:509","journal-title":"Fut Gener Comput Syst"},{"key":"5429_CR33","first-page":"1","volume":"6","author":"F Mercaldo","year":"2020","unstructured":"Mercaldo F, Santone A (2020) Deep learning for image-based mobile malware detection. J Comput Virol Hack Techniq 6:1\u201315","journal-title":"J Comput Virol Hack Techniq"},{"key":"5429_CR34","unstructured":"Halim Z, Ali O, Khan G (2019) On the efficient representation of datasets as graphs to mine maximal frequent itemsets. IEEE transactions on knowledge and data engineering"},{"key":"5429_CR35","unstructured":"Halim Z, Atif M, Rashid A, Edwin CA (2017) Profiling players using real-world datasets: clustering the data and correlating the results with the big-five personality traits. In: IEEE transactions on affective computing"},{"key":"5429_CR36","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.inffus.2019.06.006","volume":"53","author":"Z Halim","year":"2020","unstructured":"Halim Z, Rehan M (2020) On identification of driving-induced stress using electroencephalogram signals: a framework based on wearable safety-critical scheme and machine learning. Inf Fusion 53:66","journal-title":"Inf Fusion"},{"key":"5429_CR37","unstructured":"1D Convolutional nils ackermann, https:\/\/blog.goodaudience.com\/introduction-to-1d-convolutional-neural-networks-in-keras-for-time-sequences-3a7ff801a2cf. (Accessed 05 Nov 2018)"},{"key":"5429_CR38","unstructured":"Total V (2012) Online: https:\/\/www.virustotal.com\/en"},{"key":"5429_CR39","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh H, Dehghantanha A, Khayami R, Choo KKR (2018) A deep recurrent neural network based approach for Internet of Things malware threat hunting. Fut Gener Comput Syst 85:88","journal-title":"Fut Gener Comput Syst"},{"key":"5429_CR40","unstructured":"Pa YMP, Suzuki S, Yoshioka K, Matsumoto T, Kasama T, Rossow C (2015) IoTPOT: analysing the rise of IoT compromises. In: 9th USENIX workshop on offensive technologies (WOOT 15) USENIX Association, Washington, D.C., https:\/\/www.usenix.org\/conference\/woot15\/workshop-program\/presentation\/pa"},{"key":"5429_CR41","unstructured":"IoTMalware cyberiocs. https:\/\/freeiocs.cyberiocs.pro. (Accessed 04 Oct 2018)"},{"key":"5429_CR42","unstructured":"IoTMalware fei ding. https:\/\/github.com\/ifding\/iot-malware. (Accessed 04 Oct 2018)"},{"issue":"2","key":"5429_CR43","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCSE.2011.37","volume":"13","author":"S Van Der Walt","year":"2011","unstructured":"Van Der Walt S, Colbert SC, Varoquaux G (2011) The NumPy array: a structure for efficient numerical computation. Comput Sci Eng 13(2):22","journal-title":"Comput Sci Eng"},{"key":"5429_CR44","unstructured":"McKinney W (2011) Pandas: a foundational Python library for data analysis and statistics. In: Python for high performance and scientific computing, p 14"},{"key":"5429_CR45","volume-title":"Python and HDF5: unlocking scientific data","author":"A Collette","year":"2013","unstructured":"Collette A (2013) Python and HDF5: unlocking scientific data. O\u2019Reilly Media Inc, New York"},{"issue":"3","key":"5429_CR46","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSE.2007.55","volume":"9","author":"JD Hunter","year":"2007","unstructured":"Hunter JD (2007) Matplotlib: a 2D graphics environment. Comput Sci Eng 9(3):90","journal-title":"Comput Sci Eng"},{"key":"5429_CR47","doi-asserted-by":"crossref","unstructured":"Waskom M (2014) Seaborn","DOI":"10.1155\/2014\/891943"},{"key":"5429_CR48","doi-asserted-by":"crossref","unstructured":"Peng H, Gates C, Sarma B, Li N, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I (2012) Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM conference on computer and communications security, ACM, pp 241\u2013252","DOI":"10.1145\/2382196.2382224"},{"issue":"3","key":"5429_CR49","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/3162625","volume":"26","author":"J Garcia","year":"2018","unstructured":"Garcia J, Hammad M, Malek S (2018) Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Trans Softw Eng Methodol 26(3):11","journal-title":"ACM Trans Softw Eng Methodol"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-05429-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-020-05429-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-05429-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,27]],"date-time":"2022-11-27T02:46:07Z","timestamp":1669517167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-020-05429-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,6]]},"references-count":49,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["5429"],"URL":"https:\/\/doi.org\/10.1007\/s00521-020-05429-x","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,6]]},"assertion":[{"value":"14 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}