{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T07:01:27Z","timestamp":1762326087740,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07055-7","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T10:31:55Z","timestamp":1740047515000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Smali code-based deep learning model for Android malware detection"],"prefix":"10.1007","volume":"81","author":[{"given":"Abhishek","family":"Anand","sequence":"first","affiliation":[]},{"given":"Jyoti Prakash","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"issue":"1","key":"7055_CR1","doi-asserted-by":"publisher","first-page":"2007327","DOI":"10.1080\/08839514.2021.2007327","volume":"36","author":"L Meijin","year":"2022","unstructured":"Meijin L, Zhiyang F, Junfeng W, Luyu C, Qi Z, Tao Y, Yinwei W, Jiaxuan G (2022) A systematic overview of Android malware detection. Appl Artif Intell 36(1):2007327. https:\/\/doi.org\/10.1080\/08839514.2021.2007327","journal-title":"Appl Artif Intell"},{"key":"7055_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3188583","author":"R Yumlembam","year":"2022","unstructured":"Yumlembam R, Issac B, Jacob SM, Yang L (2022) IoT-based Android malware detection using graph neural network with adversarial defense. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2022.3188583","journal-title":"IEEE Internet Things J"},{"key":"7055_CR3","doi-asserted-by":"publisher","DOI":"10.31209\/2019.100000118","author":"Y Li","year":"2019","unstructured":"Li Y, Xu G, Xian H, Rao L, Shi J (2019) Novel Android malware detection method based on multi-dimensional hybrid features extraction and analysis. Intell Autom Soft Comput. https:\/\/doi.org\/10.31209\/2019.100000118","journal-title":"Intell Autom Soft Comput"},{"key":"7055_CR4","doi-asserted-by":"publisher","first-page":"101663","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee MK, Yerima SY, Sezer S (2020) Dl-droid: deep learning based Android malware detection using real devices. Comput Secur 89:101663. https:\/\/doi.org\/10.1016\/j.cose.2019.101663","journal-title":"Comput Secur"},{"key":"7055_CR5","doi-asserted-by":"publisher","unstructured":"Feng R, Lim JQ, Chen S, Lin S-W, Liu Y (2020) Seqmobile: an efficient sequence-based malware detection system using RNN on mobile devices. In: 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS), IEEE, pp 63\u201372. https:\/\/doi.org\/10.1109\/ICECCS51672.2020.00015","DOI":"10.1109\/ICECCS51672.2020.00015"},{"key":"7055_CR6","doi-asserted-by":"publisher","first-page":"119593","DOI":"10.1016\/j.eswa.2023.119593","volume":"218","author":"H Zhu","year":"2023","unstructured":"Zhu H, Wei H, Wang L, Xu Z, Sheng VS (2023) An effective end-to-end Android malware detection method. Expert Syst Appl 218:119593. https:\/\/doi.org\/10.1016\/j.eswa.2023.119593","journal-title":"Expert Syst Appl"},{"key":"7055_CR7","doi-asserted-by":"publisher","first-page":"10614","DOI":"10.1109\/ACCESS.2020.2965646","volume":"8","author":"Y Fang","year":"2020","unstructured":"Fang Y, Gao Y, Jing F, Zhang L (2020) Android malware familial classification based on dex file section features. IEEE Access 8:10614\u201310627. https:\/\/doi.org\/10.1109\/ACCESS.2020.2965646","journal-title":"IEEE Access"},{"key":"7055_CR8","doi-asserted-by":"publisher","unstructured":"Wang S-W, Zhou G, Lu J-C, Zhang F-J (2019) A novel malware detection and classification method based on capsule network. In: Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26\u201328, 2019, Proceedings, Part I 5, Springer, pp 573\u2013584. https:\/\/doi.org\/10.1007\/978-3-030-24274-9-52","DOI":"10.1007\/978-3-030-24274-9-52"},{"issue":"3","key":"7055_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3162625","volume":"26","author":"J Garcia","year":"2018","unstructured":"Garcia J, Hammad M, Malek S (2018) Lightweight, obfuscation-resilient detection and family identification of Android malware. ACM Trans Softw Eng Methodol 26(3):1\u201329. https:\/\/doi.org\/10.1145\/3162625","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"7055_CR10","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/TIFS.2019.2932228","volume":"15","author":"X Chen","year":"2019","unstructured":"Chen X, Li C, Wang D, Wen S, Zhang J, Nepal S, Xiang Y, Ren K (2019) Android HIV: a study of repackaging malware for evading machine-learning detection. IEEE Trans Inf Forensics Secur 15:987\u20131001. https:\/\/doi.org\/10.1109\/TIFS.2019.2932228","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"7055_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu J, Zhang J, Luo W, Pan L, Nepal S, Xiang Y (2020) A survey of Android malware detection with deep neural models. ACM Comput Surv 53(6):1\u201336. https:\/\/doi.org\/10.1145\/3417978","journal-title":"ACM Comput Surv"},{"issue":"4","key":"7055_CR12","doi-asserted-by":"publisher","first-page":"271","DOI":"10.32604\/csse.2020.35.271","volume":"35","author":"A Kelec","year":"2020","unstructured":"Kelec A, Djuric Z (2020) A proposal for addressing security issues related to dynamic code loading on Android platform. Comput Syst Sci Eng 35(4):271\u2013282. https:\/\/doi.org\/10.32604\/csse.2020.35.271","journal-title":"Comput Syst Sci Eng"},{"issue":"3","key":"7055_CR13","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2018","unstructured":"Kim T, Kang B, Rho M, Sezer S, Im EG (2018) A multimodal deep learning method for Android malware detection using various features. IEEE Trans Inf Forensics Secur 14(3):773\u2013788. https:\/\/doi.org\/10.1109\/TIFS.2018.2866319","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"7055_CR14","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1007\/s11277-019-06540-6","volume":"108","author":"H Naeem","year":"2019","unstructured":"Naeem H (2019) Detection of malicious activities in internet of things environment based on binary visualization and machine intelligence. Wirel Pers Commun 108(4):2609\u20132629. https:\/\/doi.org\/10.1007\/s11277-019-06540-6","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"7055_CR15","first-page":"26","volume":"15","author":"G Sharma","year":"2020","unstructured":"Sharma G, Hiran D (2020) Reverse engineering for potential malware detection: Android APK Smali to Java. J Inf Assur Secur 15(1):26\u201334","journal-title":"J Inf Assur Secur"},{"issue":"2","key":"7055_CR16","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TNSE.2020.2996379","volume":"8","author":"H Zhu","year":"2020","unstructured":"Zhu H, Li Y, Li R, Li J, You Z, Song H (2020) Sedmdroid: an enhanced stacking ensemble framework for android malware detection. IEEE Trans Network Sci Eng 8(2):984\u2013994. https:\/\/doi.org\/10.1109\/TNSE.2020.2996379","journal-title":"IEEE Trans Network Sci Eng"},{"issue":"1","key":"7055_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.48550\/arXiv.2312.01113","volume":"22","author":"PG Balikcioglu","year":"2023","unstructured":"Balikcioglu PG, Sirlanci M, Kucuk OA, Ulukapi B, Turkmen RK, Acarturk C (2023) Malicious code detection in Android: the role of sequence characteristics and disassembling methods. Int J Inf Secur 22(1):107\u2013118. https:\/\/doi.org\/10.48550\/arXiv.2312.01113","journal-title":"Int J Inf Secur"},{"issue":"1","key":"7055_CR18","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s11277-022-09765-0","volume":"126","author":"PS Mahesh","year":"2022","unstructured":"Mahesh PS, Hemalatha S (2022) An efficient Android malware detection using adaptive red fox optimization based CNN. Wirel Pers Commun 126(1):679\u2013700. https:\/\/doi.org\/10.1007\/s11277-022-09765-0","journal-title":"Wirel Pers Commun"},{"key":"7055_CR19","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s10586-017-0944-y","volume":"21","author":"M Nauman","year":"2018","unstructured":"Nauman M, Tanveer TA, Khan S, Syed TA (2018) Deep neural architectures for large scale Android malware analysis. Clust Comput 21:569\u2013588. https:\/\/doi.org\/10.1007\/s10586-017-0944-y","journal-title":"Clust Comput"},{"key":"7055_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/5249190","volume":"2018","author":"J Yan","year":"2018","unstructured":"Yan J, Qi Y, Rao Q (2018) LSTM-based hierarchical denoising network for Android malware detection. Secur Commun Netw 2018:1\u201318. https:\/\/doi.org\/10.1155\/2018\/5249190","journal-title":"Secur Commun Netw"},{"key":"7055_CR21","doi-asserted-by":"publisher","first-page":"21235","DOI":"10.1109\/ACCESS.2019.2896003","volume":"7","author":"Z Ma","year":"2019","unstructured":"Ma Z, Ge H, Liu Y, Zhao M, Ma J (2019) A combination method for Android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7:21235\u201321245. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896003","journal-title":"IEEE Access"},{"issue":"5","key":"7055_CR22","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/TETCI.2019.2910243","volume":"4","author":"AN Jahromi","year":"2020","unstructured":"Jahromi AN, Hashemi S, Dehghantanha A, Parizi RM, Choo K-KR (2020) An enhanced stacked LSTM method with no random initialization for malware threat hunting in safety and time-critical systems. IEEE Trans Emerg Top Comput Intell 4(5):630\u2013640. https:\/\/doi.org\/10.1109\/TETCI.2019.2910243","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"issue":"4","key":"7055_CR23","doi-asserted-by":"publisher","first-page":"2946","DOI":"10.1109\/TNSE.2021.3055762","volume":"8","author":"Y Xu","year":"2021","unstructured":"Xu Y, Yan X, Wu Y, Hu Y, Liang W, Zhang J (2021) Hierarchical bidirectional RNN for safety-enhanced b5g heterogeneous networks. IEEE Trans Netw Sci Eng 8(4):2946\u20132957. https:\/\/doi.org\/10.1109\/TNSE.2021.3055762","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"6","key":"7055_CR24","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.3837\/tiis.2021.06.014","volume":"15","author":"Q Yang","year":"2021","unstructured":"Yang Q, Wang X, Zheng J, Ge W, Bai M, Jiang F (2021) LSTM Android malicious behavior analysis based on feature weighting. KSII Trans Internet Inf Syst 15(6):2188\u20132203. https:\/\/doi.org\/10.3837\/tiis.2021.06.014","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"3","key":"7055_CR25","doi-asserted-by":"publisher","first-page":"482","DOI":"10.3390\/electronics13030482","volume":"13","author":"R Gupta","year":"2024","unstructured":"Gupta R, Sharma K, Garg RK (2024) Innovative approach to android malware detection: prioritizing critical features using rough set theory. Electronics 13(3):482. https:\/\/doi.org\/10.3390\/electronics13030482","journal-title":"Electronics"},{"key":"7055_CR26","doi-asserted-by":"publisher","unstructured":"Sasidharan SK, Thomas C (2021) Memdroid-LSTM based malware detection framework for Android devices. In: IEEE Pune Section International Conference (PuneCon). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/PuneCon52575.2021.9686531","DOI":"10.1109\/PuneCon52575.2021.9686531"},{"issue":"4","key":"7055_CR27","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/s10207-022-00579-6","volume":"21","author":"J Kim","year":"2022","unstructured":"Kim J, Ban Y, Ko E, Cho H, Yi JH (2022) MAPAS: a practical deep learning-based Android malware detection system. Int J Inf Secur 21(4):725\u2013738. https:\/\/doi.org\/10.1007\/s10207-022-00579-6","journal-title":"Int J Inf Secur"},{"key":"7055_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02105-x","author":"OA Alzubi","year":"2023","unstructured":"Alzubi OA, Alzubi JA, Alzubi TM, Singh A (2023) Quantum mayfly optimization with encoder-decoder driven LSTM networks for malware detection and classification model. Mob Netw Appl. https:\/\/doi.org\/10.1007\/s11036-023-02105-x","journal-title":"Mob Netw Appl"},{"issue":"1","key":"7055_CR29","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/s10489-022-03523-2","volume":"53","author":"L Shen","year":"2023","unstructured":"Shen L, Feng J, Chen Z, Sun Z, Liang D, Li H, Wang Y (2023) Self-attention based convolutional-LSTM for Android malware detection using network traffics grayscale image. Appl Intell 53(1):683\u2013705. https:\/\/doi.org\/10.1007\/s10489-022-03523-2","journal-title":"Appl Intell"},{"key":"7055_CR30","doi-asserted-by":"publisher","first-page":"103303","DOI":"10.1016\/j.engappai.2019.103303","volume":"87","author":"R Sartea","year":"2020","unstructured":"Sartea R, Farinelli A, Murari M (2020) Secur-ama: active malware analysis based on Monte Carlo tree search for Android systems. Eng Appl Artif Intell 87:103303. https:\/\/doi.org\/10.1016\/j.engappai.2019.103303","journal-title":"Eng Appl Artif Intell"},{"key":"7055_CR31","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.engappai.2016.12.008","volume":"60","author":"SM Bidoki","year":"2017","unstructured":"Bidoki SM, Jalili S, Tajoddin A (2017) Pbmmd: a novel policy based multi-process malware detection. Eng Appl Artif Intell 60:57\u201370. https:\/\/doi.org\/10.1016\/j.engappai.2016.12.008","journal-title":"Eng Appl Artif Intell"},{"key":"7055_CR32","doi-asserted-by":"publisher","first-page":"105461","DOI":"10.1016\/j.engappai.2022.105461","volume":"116","author":"K Shaukat","year":"2022","unstructured":"Shaukat K, Luo S, Varadharajan V (2022) A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks. Eng Appl Artif Intell 116:105461. https:\/\/doi.org\/10.1016\/j.engappai.2022.105461","journal-title":"Eng Appl Artif Intell"},{"key":"7055_CR33","doi-asserted-by":"publisher","first-page":"69246","DOI":"10.1109\/ACCESS.2019.2919796","volume":"7","author":"H Zhang","year":"2019","unstructured":"Zhang H, Luo S, Zhang Y, Pan L (2019) An efficient Android malware detection system based on method-level behavioral semantic analysis. IEEE Access 7:69246\u201369256. https:\/\/doi.org\/10.1109\/ACCESS.2019.2919796","journal-title":"IEEE Access"},{"key":"7055_CR34","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s11042-017-5104-0","volume":"78","author":"X Xiao","year":"2019","unstructured":"Xiao X, Zhang S, Mercaldo F, Hu G, Sangaiah AK (2019) Android malware detection based on system call sequences and LSTM. Multimed Tools Appl 78:3979\u20133999. https:\/\/doi.org\/10.1007\/s11042-017-5104-0","journal-title":"Multimed Tools Appl"},{"key":"7055_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00699-7","author":"R Wang","year":"2023","unstructured":"Wang R, Gao J, Huang S (2023) AIHGAT: a novel method of malware detection and homology analysis using assembly instruction heterogeneous graph. Int J Inf Secur. https:\/\/doi.org\/10.1007\/s10207-023-00699-7","journal-title":"Int J Inf Secur"},{"issue":"1","key":"7055_CR36","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/TCYB.2022.3164625","volume":"53","author":"J Qiu","year":"2022","unstructured":"Qiu J, Han Q-L, Luo W, Pan L, Nepal S, Zhang J, Xiang Y (2022) Cyber code intelligence for Android malware detection. IEEE Trans Cybern 53(1):617\u2013627. https:\/\/doi.org\/10.1109\/TCYB.2022.3164625","journal-title":"IEEE Trans Cybern"},{"key":"7055_CR37","doi-asserted-by":"publisher","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: effective and explainable detection of Android malware in your pocket. In: Ndss, vol\u00a014, pp 23\u201326. https:\/\/doi.org\/10.14722\/ndss.2014.23247","DOI":"10.14722\/ndss.2014.23247"},{"key":"7055_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"S Mahdavifar","year":"2022","unstructured":"Mahdavifar S, Alhadidi D, Ghorbani AA (2022) Effective and efficient hybrid Android malware classification using pseudo-label stacked auto-encoder. J Netw Syst Manag 30:1\u201334. https:\/\/doi.org\/10.1007\/s10922-021-09634-4","journal-title":"J Netw Syst Manag"},{"key":"7055_CR39","doi-asserted-by":"publisher","unstructured":"Kumar S, Mishra D, Panda B, Shukla SK (2022) AndroOBFS: time-tagged obfuscated Android malware dataset with family information. In: Proceedings of the 19th International Conference on Mining Software Repositories, pp 454\u2013458. https:\/\/doi.org\/10.1145\/3524842.3528493","DOI":"10.1145\/3524842.3528493"},{"key":"7055_CR40","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/J.INFFUS.2018.12.006","volume":"52","author":"A Mart\u00edn","year":"2019","unstructured":"Mart\u00edn A, Lara-Cabrera R, Camacho D (2019) Android malware detection through hybrid features fusion and ensemble classifiers: the andropytool framework and the omnidroid dataset. Inf Fusion 52:128\u2013142. https:\/\/doi.org\/10.1016\/J.INFFUS.2018.12.006","journal-title":"Inf Fusion"},{"key":"7055_CR41","doi-asserted-by":"publisher","unstructured":"Hu H, Liu Y, Zhao Y, Liu Y, Sun X, Tantithamthavorn C, Li L (2023) Detecting temporal inconsistency in biased datasets for android malware detection. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering Workshops (ASEW). IEEE, pp 17\u201323. https:\/\/doi.org\/10.1109\/ASEW60602.2023.00007","DOI":"10.1109\/ASEW60602.2023.00007"},{"issue":"6","key":"7055_CR42","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1109\/TIFS.2018.2879302","volume":"14","author":"H Cai","year":"2018","unstructured":"Cai H, Meng N, Ryder B, Yao D (2018) Droidcat: effective Android malware detection and categorization via app-level profiling. IEEE Trans Inf Forensics Secur 14(6):1455\u20131470. https:\/\/doi.org\/10.1109\/TIFS.2018.2879302","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7055_CR43","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.engappai.2018.06.006","volume":"74","author":"A Mart\u00edn","year":"2018","unstructured":"Mart\u00edn A, Rodr\u00edguez-Fern\u00e1ndez V, Camacho D (2018) Candyman: classifying Android malware families by modelling dynamic traces with Markov chains. Eng Appl Artif Intell 74:121\u2013133. https:\/\/doi.org\/10.1016\/j.engappai.2018.06.006","journal-title":"Eng Appl Artif Intell"},{"key":"7055_CR44","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.1109\/TIFS.2019.2950134","volume":"15","author":"A Arora","year":"2019","unstructured":"Arora A, Peddoju SK, Conti M (2019) Permpair: Android malware detection using permission pairs. IEEE Trans Inf Forensics Secur 15:1968\u20131982. https:\/\/doi.org\/10.1109\/TIFS.2019.2950134","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7055_CR45","doi-asserted-by":"publisher","first-page":"101336","DOI":"10.1016\/j.pmcj.2021.101336","volume":"72","author":"SK Sasidharan","year":"2021","unstructured":"Sasidharan SK, Thomas C (2021) ProDroid-An Android malware detection framework based on profile hidden Markov model. Pervasive Mob Comput 72:101336. https:\/\/doi.org\/10.1016\/j.pmcj.2021.101336","journal-title":"Pervasive Mob Comput"},{"key":"7055_CR46","doi-asserted-by":"publisher","unstructured":"Khalid S, Hussain FB (2022) Evaluating opcodes for detection of obfuscated Android malware. In: 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE, pp 044\u2013049. https:\/\/doi.org\/10.1109\/ICAIIC54071.2022.9722669","DOI":"10.1109\/ICAIIC54071.2022.9722669"},{"issue":"1","key":"7055_CR47","doi-asserted-by":"publisher","first-page":"19534","DOI":"10.1038\/s41598-022-23766-w","volume":"12","author":"H Rafiq","year":"2022","unstructured":"Rafiq H, Aslam N, Aleem M, Issac B, Randhawa RH (2022) Andromalpack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems. Sci Rep 12(1):19534. https:\/\/doi.org\/10.1038\/s41598-022-23766-w","journal-title":"Sci Rep"},{"issue":"23","key":"7055_CR48","doi-asserted-by":"publisher","first-page":"2948","DOI":"10.3390\/electronics10232948","volume":"10","author":"C Rodrigo","year":"2021","unstructured":"Rodrigo C, Pierre S, Beaubrun R, El Khoury F (2021) Brainshield: a hybrid machine learning-based malware detection model for android devices. Electronics 10(23):2948. https:\/\/doi.org\/10.3390\/electronics10232948","journal-title":"Electronics"},{"key":"7055_CR49","doi-asserted-by":"publisher","unstructured":"de\u00a0Oliveira AS, Sassi RJ (2021) Hunting android malware using multimodal deep learning and hybrid analysis data. Sociedade Brasileira de Intelig\u00eancia Computacional. https:\/\/doi.org\/10.21528\/CBIC2021-32","DOI":"10.21528\/CBIC2021-32"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07055-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07055-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07055-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T10:31:58Z","timestamp":1740047518000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07055-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":49,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["7055"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07055-7","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"12 February 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"522"}}