{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T06:16:00Z","timestamp":1771568160318,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T00:00:00Z","timestamp":1742169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T00:00:00Z","timestamp":1742169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10489-025-06417-1","type":"journal-article","created":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T02:53:27Z","timestamp":1742180007000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A reinforcement learning malware detection model based on heterogeneous information network path representation"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5863-1003","authenticated-orcid":false,"given":"Kang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Lizhi","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,17]]},"reference":[{"key":"6417_CR1","unstructured":"Statcounter (2023) Mobile operating system market share worldwide. In: https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide, pp. 1\u20132"},{"key":"6417_CR2","unstructured":"DAVID C (2023) Android mobile market statistics. In: https:\/\/www.Businessofapps.com\/data\/android-statistics\/, pp. 1\u20132"},{"key":"6417_CR3","first-page":"1011","volume-title":"Seventh International Conference on Computational Intelligence and Security","author":"T Isohara","year":"2011","unstructured":"Isohara T, Takemori K (2011) Kubota A (2011) Kernel-based behavior analysis for android malware detection. In: Wang Y, Cheung Y, Guo P, Wei Y (eds) Seventh International Conference on Computational Intelligence and Security. CIS 2011, Sanya, Hainan, China, December 3\u20134, pp 1011\u20131015"},{"issue":"2","key":"6417_CR4","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s11416-009-0137-1","volume":"6","author":"S Kramer","year":"2010","unstructured":"Kramer S, Bradfield JC (2010) A general definition of malware. J Comput Virol 6(2):105\u2013114","journal-title":"J Comput Virol"},{"issue":"2","key":"6417_CR5","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s11042-013-1410-3","volume":"68","author":"AC Kim","year":"2014","unstructured":"Kim AC, Kim S, Park WH, Lee DH (2014) Fraud and financial crime detection model using malware forensics. Multim. Tools Appl. 68(2):479\u2013496","journal-title":"Multim. Tools Appl."},{"key":"6417_CR6","doi-asserted-by":"crossref","unstructured":"Sami A, Yadegari B, Rahimi H, Peiravian N, Hashemi S, Hamzeh A (2010) Malware detection based on mining API calls. In: Shin, S.Y., Ossowski, S., Schumacher, M., Palakal, M.J., Hung, C. (eds.) Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1020\u20131025","DOI":"10.1145\/1774088.1774303"},{"issue":"18","key":"6417_CR7","doi-asserted-by":"publisher","first-page":"15165","DOI":"10.1007\/s00521-021-06755-4","volume":"34","author":"S Seraj","year":"2022","unstructured":"Seraj S, Khodambashi S, Pavlidis M, Polatidis N (2022) Hamdroid: permission-based harmful android anti-malware detection using neural networks. Neural Comput Appl 34(18):15165\u201315174","journal-title":"Neural Comput Appl"},{"key":"6417_CR8","doi-asserted-by":"crossref","unstructured":"Ilham S, Ghadi A, Abdelhakim AB (2018) Permission based malware detection in android devices. In: Proceedings of the 3rd International Conference on Smart City Applications, SCA 2018, Tetouan, Morocco, October 10-11, 2018, pp. 1\u20136","DOI":"10.1145\/3286606.3286860"},{"key":"6417_CR9","doi-asserted-by":"crossref","unstructured":"Uppal D, Sinha R, Mehra V, Jain V (2014) Malware detection and classification based on extraction of API sequences. In: 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, Delhi, India, September 24-27, 2014, pp. 2337\u20132342","DOI":"10.1109\/ICACCI.2014.6968547"},{"issue":"2","key":"6417_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s11416-010-0141-5","volume":"7","author":"MK Shankarapani","year":"2011","unstructured":"Shankarapani MK, Ramamoorthy S, Movva RS, Mukkamala S (2011) Malware detection using assembly and API call sequences. J Comput Virol 7(2):107\u2013119","journal-title":"J Comput Virol"},{"issue":"2","key":"6417_CR11","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00500-019-03940-5","volume":"24","author":"A Pektas","year":"2020","unstructured":"Pektas A, Acarman T (2020) Deep learning for effective android malware detection using API call graph embeddings. Soft Comput 24(2):1027\u20131043","journal-title":"Soft Comput"},{"key":"6417_CR12","doi-asserted-by":"crossref","unstructured":"Zhou H, Zhang W, Wei F, Chen Y (2017) Analysis of android malware family characteristic based on isomorphism of sensitive API call graph. In: Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017, pp. 319\u2013327","DOI":"10.1109\/DSC.2017.77"},{"key":"6417_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102872","volume":"122","author":"C Li","year":"2022","unstructured":"Li C, Cheng Z, Zhu H, Wang L, Lv Q, Wang Y, Li N, Sun D (2022) Dmalnet: Dynamic malware analysis based on API feature engineering and graph learning. Comput Secur 122:102872","journal-title":"Comput Secur"},{"key":"6417_CR14","doi-asserted-by":"crossref","unstructured":"Hou S, Ye Y, Song Y, Abdulhayoglu M (2017) Hindroid: An intelligent android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017, pp. 1507\u20131515","DOI":"10.1145\/3097983.3098026"},{"key":"6417_CR15","unstructured":"Hei Y, Yang R, Peng H, Wang L, Xu X, Liu J, Liu H, Xu J, Sun L (2021) HAWK: rapid android malware detection through heterogeneous graph attention networks. arXiv:2108.07548"},{"issue":"2","key":"6417_CR16","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/TBDATA.2022.3177455","volume":"9","author":"X Wang","year":"2023","unstructured":"Wang X, Bo D, Shi C, Fan S, Ye Y, Yu PS (2023) A survey on heterogeneous graph embedding: Methods, techniques, applications and sources. IEEE Trans. Big Data 9(2):415\u2013436","journal-title":"IEEE Trans. Big Data"},{"issue":"10","key":"6417_CR17","doi-asserted-by":"publisher","first-page":"4854","DOI":"10.1109\/TKDE.2020.3045924","volume":"34","author":"CJ Yang","year":"2022","unstructured":"Yang CJ, Xiao Y, Zhang Y, Sun Y, Han J (2022) Heterogeneous network representation learning: A unified framework with survey and benchmark. IEEE Trans Knowl Data Eng 34(10):4854\u20134873","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"6417_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.future.2019.07.070","volume":"102","author":"M Amin","year":"2020","unstructured":"Amin M, Tanveer TA, Tehseen M, Khan M, Khan FA, Anwar S (2020) Static malware detection and attribution in android byte-code through an end-to-end deep system. Future Gener. Comput. Syst. 102:112\u2013126","journal-title":"Future Gener. Comput. Syst."},{"key":"6417_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.05.026","volume":"535","author":"S Jeon","year":"2020","unstructured":"Jeon S, Moon J (2020) Malware-detection method with a convolutional recurrent neural network using opcode sequences. Inf Sci 535:1\u201315","journal-title":"Inf Sci"},{"issue":"4","key":"6417_CR20","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s11416-008-0108-y","volume":"5","author":"Y Ye","year":"2009","unstructured":"Ye Y, Chen L, Wang D, Li T, Jiang Q, Zhao M (2009) SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. J Comput Virol 5(4):283\u2013293","journal-title":"J Comput Virol"},{"key":"6417_CR21","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.1109\/TIFS.2019.2950134","volume":"15","author":"A Arora","year":"2020","unstructured":"Arora A, Peddoju SK, Conti M (2020) Permpair: Android malware detection using permission pairs. IEEE Trans Inf Forensics Secur 15:1968\u20131982","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"6417_CR22","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2018) Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Ind. Informatics 14(7):3216\u20133225","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"6417_CR23","doi-asserted-by":"crossref","unstructured":"You I, Yim K (2010) Malware obfuscation techniques: A brief survey. In: Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In Conjunction with the 3PGCIC-2010 International Conference), pp. 297\u2013300","DOI":"10.1109\/BWCCA.2010.85"},{"key":"6417_CR24","doi-asserted-by":"publisher","first-page":"659101","DOI":"10.1155\/2015\/659101","volume":"11","author":"Y Ki","year":"2015","unstructured":"Ki Y, Kim E, Kim HK (2015) A novel approach to detect malware based on API call sequence analysis. Int. J. Distributed Sens. Networks 11:659101\u201316591019","journal-title":"Int. J. Distributed Sens. Networks"},{"key":"6417_CR25","doi-asserted-by":"crossref","unstructured":"Gascon H, Yamaguchi F, Arp D, Rieck K (2013) Structural detection of android malware using embedded call graphs. In: Sadeghi, A., Nelson, B., Dimitrakakis, C., Shi, E. (eds.) AISec\u201913, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 45\u201354","DOI":"10.1145\/2517312.2517315"},{"key":"6417_CR26","doi-asserted-by":"crossref","unstructured":"Hassen M, Chan PK (2017) Scalable function call graph-based malware classification. In: Ahn, G., Pretschner, A., Ghinita, G. (eds.) Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 239\u2013248","DOI":"10.1145\/3029806.3029824"},{"key":"6417_CR27","doi-asserted-by":"crossref","unstructured":"Hu X, Chiueh T, Shin KG (2009) Large-scale malware indexing using function-call graphs. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 611\u2013620","DOI":"10.1145\/1653662.1653736"},{"key":"6417_CR28","doi-asserted-by":"crossref","unstructured":"Chen Z, Kang H, Yin S, Kim S (2017) Automatic ransomware detection and analysis based on dynamic API calls flow graph. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, RACS 2017, Krakow, Poland, September 20-23, 2017, pp. 196\u2013201","DOI":"10.1145\/3129676.3129704"},{"issue":"2","key":"6417_CR29","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00500-019-03940-5","volume":"24","author":"A Pektas","year":"2020","unstructured":"Pektas A, Acarman T (2020) Deep learning for effective android malware detection using API call graph embeddings. Soft Comput 24(2):1027\u20131043","journal-title":"Soft Comput"},{"key":"6417_CR30","doi-asserted-by":"crossref","unstructured":"Bruschi D, Martignoni L, Monga M (2006) Detecting self-mutating malware using control-flow graph matching. In: B\u00fcschkes, R., Laskov, P. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings. Lecture Notes in Computer Science, vol. 4064, pp. 129\u2013143","DOI":"10.1007\/11790754_8"},{"key":"6417_CR31","doi-asserted-by":"crossref","unstructured":"Yan J, Yan G, Jin D (2019) Classifying malware represented as control flow graphs using deep graph convolutional neural network. In: 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland, OR, USA, June 24-27, 2019, pp. 52\u201363","DOI":"10.1109\/DSN.2019.00020"},{"issue":"6","key":"6417_CR32","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","volume":"34","author":"K Arulkumaran","year":"2017","unstructured":"Arulkumaran K, Deisenroth MP, Brundage M, Bharath AA (2017) Deep reinforcement learning: A brief survey. IEEE Signal Process Mag 34(6):26\u201338","journal-title":"IEEE Signal Process Mag"},{"key":"6417_CR33","doi-asserted-by":"crossref","unstructured":"Mousavi SS, Schukat M, Howley E (2018) Deep reinforcement learning: An overview. arXiv:1806.08894","DOI":"10.1007\/978-3-319-56991-8_32"},{"key":"6417_CR34","doi-asserted-by":"crossref","unstructured":"Wu C, Shi J, Yang Y, Li W (2018) Enhancing machine learning based malware detection model by reinforcement learning. In: Proceedings of the 8th International Conference on Communication and Network Security, ICCNS 2018, Qingdao, China, November 02-04, 2018, pp. 74\u201378","DOI":"10.1145\/3290480.3290494"},{"key":"6417_CR35","doi-asserted-by":"publisher","first-page":"176177","DOI":"10.1109\/ACCESS.2019.2957429","volume":"7","author":"Z Fang","year":"2019","unstructured":"Fang Z, Wang J, Geng J, Kan X (2019) Feature selection for malware detection based on reinforcement learning. IEEE Access 7:176177\u2013176187","journal-title":"IEEE Access"},{"key":"6417_CR36","doi-asserted-by":"crossref","unstructured":"Wang Y, Stokes JW, Marinescu M (2020) Actor critic deep reinforcement learning for neural malware control. In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020, pp. 1005\u20131012","DOI":"10.1609\/aaai.v34i01.5449"},{"key":"6417_CR37","doi-asserted-by":"crossref","unstructured":"Ebrahimi R, Pacheco J, Hu J, Chen H (2024) Learning contextualized action representations in sequential decision making for adversarial malware optimization. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2024.3477272"},{"key":"6417_CR38","doi-asserted-by":"crossref","unstructured":"Al-Fawa\u2019reh M, Abu-Khalaf J, Szewczyk P, Kang JJ (2023) Malbot-drl: Malware botnet detection using deep reinforcement learning in iot networks. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2023.3324053"},{"key":"6417_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102869","volume":"121","author":"F Zhong","year":"2022","unstructured":"Zhong F, Hu P, Zhang G, Li H, Cheng X (2022) Reinforcement learning based adversarial malware example generation against black-box detectors. Comput Secur 121:102869","journal-title":"Comput Secur"},{"key":"6417_CR40","doi-asserted-by":"publisher","first-page":"8500","DOI":"10.1109\/TIFS.2024.3453047","volume":"19","author":"B Tian","year":"2024","unstructured":"Tian B, Jiang J, He Z, Yuan X, Dong L, Sun C (2024) Functionality-verification attack framework based on reinforcement learning against static malware detectors. IEEE Trans Inf Forensics Secur 19:8500\u20138514","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6417_CR41","unstructured":"Anderson HS, Kharkar A, Filar B, Evans D, Roth P (2018) Learning to evade static PE machine learning malware models via reinforcement learning. arXiv:1801.08917"},{"key":"6417_CR42","doi-asserted-by":"crossref","unstructured":"Castro RL, Franz S, Rodosek GD (2021) AIMED-RL: exploring adversarial malware examples with reinforcement learning. In: Dong, Y., Kourtellis, N., Hammer, B., Lozano, J.A. (eds.) Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track - European Conference, ECML PKDD 2021, Bilbao, Spain, September 13-17, 2021, Proceedings, Part IV. Lecture Notes in Computer Science, vol. 12978, pp. 37\u201352","DOI":"10.1007\/978-3-030-86514-6_3"},{"key":"6417_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102869","volume":"121","author":"F Zhong","year":"2022","unstructured":"Zhong F, Hu P, Zhang G, Li H, Cheng X (2022) Reinforcement learning based adversarial malware example generation against black-box detectors. Comput Secur 121:102869","journal-title":"Comput Secur"},{"key":"6417_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103126","volume":"128","author":"Y Wu","year":"2023","unstructured":"Wu Y, Li M, Zeng Q, Yang T, Wang J, Fang Z, Cheng L (2023) Droidrl: Feature selection for android malware detection with reinforcement learning. Comput Secur 128:103126","journal-title":"Comput Secur"},{"issue":"2","key":"6417_CR45","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TDSC.2022.3153844","volume":"20","author":"L Zhang","year":"2023","unstructured":"Zhang L, Liu P, Choi Y, Chen P (2023) Semantics-preserving reinforcement learning attack against graph neural networks for malware detection. IEEE Trans. Dependable Secur. Comput. 20(2):1390\u20131402","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"6417_CR46","doi-asserted-by":"crossref","unstructured":"Zapzalka D, Salem S, Mohaisen D (2024) Semantics-preserving node injection attacks against gnn-based acfg malware classifiers. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2024.3409410"},{"issue":"2","key":"6417_CR47","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/3313391","volume":"22","author":"L Onwuzurike","year":"2019","unstructured":"Onwuzurike L, Mariconti E, Andriotis P, Cristofaro ED, Ross GJ, Stringhini G (2019) Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. 22(2):14\u201311434","journal-title":"ACM Trans. Priv. Secur."},{"key":"6417_CR48","doi-asserted-by":"crossref","unstructured":"Gong L, Li Z, Qian F, Zhang Z, Chen QA, Qian Z, Lin H (2020) Liu Y (2020) Experiences of landing machine learning onto market-scale mobile malware detection. In: Bilas A, Magoutis K, Markatos EP, Kostic D, Seltzer MI (eds) EuroSys \u201920: Fifteenth EuroSys Conference 2020. Heraklion, Greece, April 27\u201330, pp 2\u20131214","DOI":"10.1145\/3342195.3387530"},{"key":"6417_CR49","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TASE.2018.00015","volume-title":"2018 International Symposium on Theoretical Aspects of Software Engineering","author":"N Xie","year":"2018","unstructured":"Xie N, Zeng F, Qin X, Zhang Y, Zhou M (2018) Lv C (2018) Repassdroid: Automatic detection of android malware based on essential permissions and semantic features of sensitive apis. In: Pang J, Zhang C, He J, Weng J (eds) 2018 International Symposium on Theoretical Aspects of Software Engineering. TASE 2018, Guangzhou, China, August 29\u201331, pp 52\u201359"},{"key":"6417_CR50","doi-asserted-by":"crossref","unstructured":"Otterlo M, Wiering MA (2012) Reinforcement learning and markov decision processes. In: Wiering, M.A., Otterlo, M. (eds.) Reinforcement Learning. Adaptation, Learning, and Optimization, vol. 12, pp. 3\u201342","DOI":"10.1007\/978-3-642-27645-3_1"},{"key":"6417_CR51","doi-asserted-by":"crossref","unstructured":"Hasselt H, Guez A, Silver D (2016) Deep reinforcement learning with double q-learning. In: Schuurmans, D., Wellman, M.P. (eds.) Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, USA, pp. 2094\u20132100","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"6417_CR52","doi-asserted-by":"crossref","unstructured":"Tang J, Qu M, Wang M, Zhang M, Yan J, Mei Q (2015) LINE: large-scale information network embedding. In: Gangemi, A., Leonardi, S., Panconesi, A. (eds.) Proceedings of the 24th International Conference on World Wide Web, WWW 2015, Florence, Italy, May 18-22, 2015, pp. 1067\u20131077","DOI":"10.1145\/2736277.2741093"},{"key":"6417_CR53","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. In: Guyon, I., Luxburg, U., Bengio, S., Wallach, H.M., Fergus, R., Vishwanathan, S.V.N., Garnett, R. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA, pp. 5998\u20136008"},{"key":"6417_CR54","doi-asserted-by":"crossref","unstructured":"Hou Y, Liu L, Wei Q, Xu X, Chen C (2017) A novel DDPG method with prioritized experience replay. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017, Banff, AB, Canada, October 5-8, 2017, pp. 316\u2013321","DOI":"10.1109\/SMC.2017.8122622"},{"key":"6417_CR55","doi-asserted-by":"crossref","unstructured":"Lashkari AH, Kadir AFA, Taheri L, Ghorbani AA (2018) Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology, ICCST 2018, Montreal, QC, Canada, October 22-25, 2018, pp. 1\u20137","DOI":"10.1109\/CCST.2018.8585560"},{"key":"6417_CR56","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1016\/j.future.2020.10.008","volume":"115","author":"SI Imtiaz","year":"2021","unstructured":"Imtiaz SI, Rehman S, Javed AR, Jalil Z, Liu X, Alnumay WS (2021) Deepamd: Detection and identification of android malware using high-efficient deep artificial neural network. Future Gener. Comput. Syst. 115:844\u2013856","journal-title":"Future Gener. Comput. Syst."},{"key":"6417_CR57","first-page":"1","volume-title":"2019 International Carnahan Conference on Security Technology","author":"L Taheri","year":"2019","unstructured":"Taheri L, Kadir AFA (2019) Lashkari AH (2019) Extensible android malware detection and family classification using network-flows and api-calls. In: Thomas GL, John M (eds) 2019 International Carnahan Conference on Security Technology. ICCST 2019, Chennai, India, October 1\u20133, pp 1\u20138"},{"issue":"3 &4","key":"6417_CR58","doi-asserted-by":"publisher","first-page":"2141001","DOI":"10.1142\/S2424922X21410011","volume":"13","author":"D\u00d6 Sahin","year":"2021","unstructured":"Sahin D\u00d6, Akleylek S, Kili\u00e7 E (2021) On the effect of k values and distance metrics in KNN algorithm for android malware detection. Adv. Data Sci. Adapt. Anal. 13(3 &4):2141001\u20131214100120","journal-title":"Adv. Data Sci. Adapt. Anal."},{"key":"6417_CR59","doi-asserted-by":"crossref","unstructured":"Zulkifli A, Hamid IRA, Shah WM, Abdullah Z (2018) Android malware detection based on network traffic using decision tree algorithm. In: Ghazali, R., Deris, M.M., Nawi, N.M., Abawajy, J.H. (eds.) Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining (SCDM 2018), Johor, Malaysia, February 06-07, 2018. Advances in Intelligent Systems and Computing, vol. 700, pp. 485\u2013494","DOI":"10.1007\/978-3-319-72550-5_46"},{"key":"6417_CR60","doi-asserted-by":"crossref","unstructured":"Alam MS, Vuong ST (2013) Random forest classification for detecting android malware. In: 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), Beijing, China, August 20-23, 2013, pp. 663\u2013669","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"6417_CR61","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Krishnapuram B, Shah M, Smola AJ, Aggarwal CC, Shen D, Rastogi R. (eds.) Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016, pp. 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"key":"6417_CR62","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1145\/2623330.2623732","volume-title":"The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"B Perozzi","year":"2014","unstructured":"Perozzi B, Al-Rfou R (2014) Skiena S (2014) Deepwalk: online learning of social representations. In: Macskassy SA, Perlich C, Leskovec J, Wang W, Ghani R (eds) The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201914, New York, NY, USA - August 24\u201327, pp 701\u2013710"},{"key":"6417_CR63","unstructured":"Velickovic P, Cucurull G, Casanova A, Romero A, Li\u00f2 P, Bengio Y (2017) Graph attention networks. arXiv:1710.10903"},{"key":"6417_CR64","doi-asserted-by":"crossref","unstructured":"Gao H, Cheng S, Zhang W (2021) Gdroid: Android malware detection and classification with graph convolutional network. Comput Secur 106:102264","DOI":"10.1016\/j.cose.2021.102264"},{"key":"6417_CR65","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1145\/3308558.3313562","volume-title":"The World Wide Web Conference","author":"X Wang","year":"2019","unstructured":"Wang X, Ji H, Shi C, Wang B, Ye Y, Cui P (2019) Yu PS (2019) Heterogeneous graph attention network. In: Liu L, White RW, Mantrach A, Silvestri F, McAuley JJ, Baeza-Yates R, Zia L (eds) The World Wide Web Conference. WWW 2019, San Francisco, CA, USA, May 13\u201317, pp 2022\u20132032"},{"key":"6417_CR66","doi-asserted-by":"crossref","unstructured":"Yang Z, Yang D, Dyer C, He X, Smola AJ, Hovy EH (2016) Hierarchical attention networks for document classification. In: Knight K, Nenkova A, Rambow O. (eds.) NAACL HLT 2016, The 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego California, USA, June 12-17, 2016, pp. 1480\u20131489","DOI":"10.18653\/v1\/N16-1174"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06417-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06417-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06417-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T19:32:40Z","timestamp":1758310360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06417-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,17]]},"references-count":66,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["6417"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06417-1","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,17]]},"assertion":[{"value":"26 February 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"This study did not involve human or animal subjects, and thus, no ethical approval was required. The study protocol adhered to the guidelines established by the journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and informed consent for data used"}}],"article-number":"538"}}