{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:06:42Z","timestamp":1773090402147,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T00:00:00Z","timestamp":1690329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T00:00:00Z","timestamp":1690329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00493-y","type":"journal-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T11:01:56Z","timestamp":1690369316000},"page":"53-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A comparison of graph neural networks for malware classification"],"prefix":"10.1007","volume":"20","author":[{"given":"Vrinda","family":"Malhotra","sequence":"first","affiliation":[]},{"given":"Katerina","family":"Potika","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3803-8368","authenticated-orcid":false,"given":"Mark","family":"Stamp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,26]]},"reference":[{"key":"493_CR1","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y.: AndroZoo: collecting millions of Android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories, MSR \u201916, pp. 468\u2013471 (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"493_CR2","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of Android malware in your pocket. In: Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"493_CR3","unstructured":"AV-TEST. Malware statistics and trends report. https:\/\/www.av-test.org\/en\/statistics\/malware\/ (2021)"},{"key":"493_CR4","doi-asserted-by":"crossref","unstructured":"Bl\u00e4sing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S.A., Albayrak, S.: An Android application sandbox system for suspicious software detection. In: 5th International Conference on Malicious and Unwanted Software, pp. 55\u201362 (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"493_CR5","unstructured":"Brownlee, J.: PyTorch tutorial: how to develop deep learning models with Python. https:\/\/machinelearningmastery.com\/pytorch-tutorial-develop-deep-learning-models\/ (2023)"},{"key":"493_CR6","doi-asserted-by":"crossref","unstructured":"Busch, J., Kocheturov, A., Tresp, V., Seidl, T.: NF-GNN: network flow graph neural networks for malware detection and classification. In: 33rd International Conference on Scientific and Statistical Database Management (2021)","DOI":"10.1145\/3468791.3468814"},{"key":"493_CR7","unstructured":"Cai, C., Wang, Y.: A simple yet effective baseline for non-attribute graph classification. https:\/\/arxiv.org\/abs\/1811.03508v1 (2018)"},{"issue":"9","key":"493_CR8","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TKDE.2018.2807452","volume":"30","author":"H Cai","year":"2018","unstructured":"Cai, H., Zheng, V.W., Chang, K.C.-C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616\u20131637 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"493_CR9","unstructured":"Chng, Z.M.: Google colab for machine learning projects. https:\/\/machinelearningmastery.com\/google-colab-for-machine-learning-projects\/ (2022)"},{"key":"493_CR10","doi-asserted-by":"crossref","unstructured":"Cicek, \u00d6., Abdulkadir, A., Lienkamp, S.S., Brox, T., Ronneberger, O.: 3D U-Net: learning dense volumetric segmentation from sparse annotation. In: Medical Image Computing and Computer-Assisted Intervention, MICCAI, pp. 424\u2013432 (2016)","DOI":"10.1007\/978-3-319-46723-8_49"},{"key":"493_CR11","unstructured":"Cosmo, L., Minello, G., Bronstein, M., Rodol\u00e0, E., Rossi, L., Torsello, A.: Graph kernel neural networks. arxiv:2112.07436 (2021)"},{"issue":"1","key":"493_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-015-0261-z","volume":"13","author":"A Damodaran","year":"2017","unstructured":"Damodaran, A., Di Troia, F., Visaggio, C.A., Austin, T.H., Stamp, M.: A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hack. Tech. 13(1), 1\u201312 (2017)","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"493_CR13","unstructured":"Diehl, F.: Edge contraction pooling for graph neural networks. arxiv:1905.10990 (2019)"},{"key":"493_CR14","unstructured":"Freitas, S., Dong, Y.: A large-scale database for graph representation learning. In: Neural Information Processing Systems, NeurIPS (2021)"},{"key":"493_CR15","first-page":"56","volume":"05","author":"E Gandotra","year":"2014","unstructured":"Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 05, 56\u201364 (2014)","journal-title":"J. Inf. Secur."},{"key":"493_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102264","volume":"106","author":"H Gao","year":"2021","unstructured":"Gao, H., Cheng, S., Zhang, W.: GDroid: android malware detection and classification with graph convolutional network. Comput. Secur. 106, 102264 (2021)","journal-title":"Comput. Secur."},{"key":"493_CR17","unstructured":"Gao, H., Ji, S.: Graph U-Nets. In: Chaudhuri, K., Salakhutdinov, R. (eds.), Proceedings of the 36th International Conference on Machine Learning, volume\u00a097 of Proceedings of Machine Learning Research, pp. 2083\u20132092 (2019)"},{"key":"493_CR18","doi-asserted-by":"crossref","unstructured":"G\u00fclmez, S., Sogukpinar, I.: Graph-based malware detection using opcode sequences. In: 9th International Symposium on Digital Forensics and Security, ISDFS, pp. 1\u20135 (2021)","DOI":"10.1109\/ISDFS52919.2021.9486386"},{"key":"493_CR19","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 1025\u20131035 (2017)"},{"key":"493_CR20","doi-asserted-by":"crossref","unstructured":"He, K., Kim, D.-S.: Malware detection with malware images using deep learning techniques. In: 2019 18th IEEE International Conference on Trust, Security And Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science And Engineering, TrustCom\/BigDataSE, pp. 95\u2013102 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00022"},{"key":"493_CR21","doi-asserted-by":"crossref","unstructured":"Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: HinDroid: an intelligent Android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201917, pp. 1507\u20131515 (2017)","DOI":"10.1145\/3097983.3098026"},{"key":"493_CR22","doi-asserted-by":"crossref","unstructured":"Huang, N., Xu, M., Zheng, N., Qiao, T., Choo, K.-K.R.: Deep android malware classification with API-based feature graph. In: 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science and Engineering, TrustCom\/BigDataSE, pp. 296\u2013303 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00047"},{"key":"493_CR23","doi-asserted-by":"crossref","unstructured":"Jerome, Q., Allix, K., State, R., Engel, T.: Using opcode-sequences to detect malicious Android applications. In: 2014 IEEE International Conference on Communications, ICC, pp. 914\u2013919 (2014)","DOI":"10.1109\/ICC.2014.6883436"},{"key":"493_CR24","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.patrec.2021.01.003","volume":"143","author":"L Jia","year":"2021","unstructured":"Jia, L., Ga\u00fcz\u00e8re, B., Honeine, P.: graphkit-learn: a Python library for graph kernels based on linear patterns. Pattern Recogn. Lett. 143, 113\u2013121 (2021)","journal-title":"Pattern Recogn. Lett."},{"key":"493_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2020.103443","volume":"71","author":"AG Kakisim","year":"2020","unstructured":"Kakisim, A.G., Nar, M., Sogukpinar, I.: Metamorphic malware identification using engine-specific patterns based on co-opcode graphs. Comput. Stand. Interfaces 71, 103443 (2020)","journal-title":"Comput. Stand. Interfaces"},{"key":"493_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11416-018-0324-z","volume":"15","author":"RU Khan","year":"2018","unstructured":"Khan, R.U., Zhang, X., Kumar, R.: Analysis of ResNet and GoogleNet models for malware detection. J. Comput. Virol. Hack. Tech. 15, 29\u201337 (2018)","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"493_CR27","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: 5th International Conference on Learning Representations, ICLR (2017)"},{"key":"493_CR28","doi-asserted-by":"crossref","unstructured":"Li, G., Muller, M., Thabet, A., Ghanem, B.: DeepGCNs: can GCNs go as deep as CNNs? In: 2019 IEEE\/CVF International Conference on Computer Vision, ICCV, pp. 9266\u20139275 (2019)","DOI":"10.1109\/ICCV.2019.00936"},{"key":"493_CR29","unstructured":"Li, G., Xiong, C., Thabet, A., Ghanem, B.: DeeperGCN: all you need to train deeper GCNs. arxiv:2006.07739 (2020)"},{"issue":"7","key":"493_CR30","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-an, W., Ye, H.: Significant permission identification for machine-learning-based Android malware detection. IEEE Trans. Ind. Inform. 14(7), 3216\u20133225 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"493_CR31","doi-asserted-by":"crossref","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., Portmann, M.: Graph neural network-based Android malware classification with jumping knowledge. In: 2022 IEEE Conference on Dependable and Secure Computing, DSC, pp. 1\u20139 (2022)","DOI":"10.1109\/DSC54232.2022.9888878"},{"key":"493_CR32","doi-asserted-by":"crossref","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M.R., Portmann, M.: E-GraphSAGE: a graph neural network based intrusion detection system for IoT. In: 2022 IEEE\/IFIP Network Operations and Management Symposium, NOMS, pp. 1\u20139 (2022)","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"493_CR33","unstructured":"MalNet. https:\/\/mal-net.org\/ (2022)"},{"issue":"29","key":"493_CR34","doi-asserted-by":"publisher","first-page":"861","DOI":"10.21105\/joss.00861","volume":"3","author":"L McInnes","year":"2018","unstructured":"McInnes, L., Healy, J., Saul, N., Gro\u00dfberger, L.: UMAP: uniform manifold approximation and projection. J. Open Source Softw. 3(29), 861 (2018)","journal-title":"J. Open Source Softw."},{"key":"493_CR35","doi-asserted-by":"crossref","unstructured":"McLaughlin, N., del Rincon, J.M., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doup\u00e9, A., Ahn, G.J.: Deep Android malware detection. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY \u201917, pp. 301\u2013308 (2017)","DOI":"10.1145\/3029806.3029823"},{"issue":"13","key":"493_CR36","doi-asserted-by":"publisher","first-page":"3645","DOI":"10.3390\/s20133645","volume":"20","author":"W Niu","year":"2020","unstructured":"Niu, W., Cao, R., Zhang, X., Ding, K., Zhang, K., Li, T.: OpCode-level function call graph based Android malware classification using deep learning. Sensors (Basel) 20(13), 3645 (2020)","journal-title":"Sensors (Basel)"},{"key":"493_CR37","doi-asserted-by":"crossref","unstructured":"Noh, H., Hong, S., Han, B.: Learning deconvolution network for semantic segmentation. In: 2015 IEEE International Conference on Computer Vision, ICCV, pp. 1520\u20131528. IEEE Computer Society (2015)","DOI":"10.1109\/ICCV.2015.178"},{"key":"493_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101792","volume":"93","author":"X Pei","year":"2020","unstructured":"Pei, X., Long, Yu., Tian, S.: AMalNet: a deep learning framework based on graph convolutional networks for malware detection. Comput. Secur. 93, 101792 (2020)","journal-title":"Comput. Secur."},{"key":"493_CR39","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.), Medical Image Computing and Computer-Assisted Intervention, MICCAI, pp. 234\u2013241 (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"493_CR40","doi-asserted-by":"crossref","unstructured":"Rozemberczki, B., Sarkar, R.: Characteristic functions on graphs: birds of a feather, from statistical descriptors to parametric models. In: Proceedings of the 29th ACM International Conference on Information and Knowledge Management, CIKM \u201920, pp. 1325\u20131334 (2020)","DOI":"10.1145\/3340531.3411866"},{"issue":"9","key":"493_CR41","first-page":"2539","volume":"12","author":"N Shervashidze","year":"2011","unstructured":"Shervashidze, N., Schweitzer, P., Jan, E., Leeuwen, V., Mehlhorn, K., Borgwardt, K.M.: Weisfeiler\u2013Lehman graph kernels. J. Mach. Learn. Res. 12(9), 2539\u20132561 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"493_CR42","doi-asserted-by":"crossref","unstructured":"Tsitsulin, A., Mottin, D., Karras, P., Bronstein, A., M\u00fcller, E.: NetLSD. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2018)","DOI":"10.1145\/3219819.3219991"},{"key":"493_CR43","doi-asserted-by":"crossref","unstructured":"Tsitsulin, A., Munkhoeva, M., Perozzi, B.: Just SLaQ when you approximate: accurate spectral distances for web-scale graphs. In: Proceedings of The Web Conference 2020 (2020)","DOI":"10.1145\/3366423.3380026"},{"key":"493_CR44","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandran, P.: Deep Android malware detection and classification. In: 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI, pp. 1677\u20131683 (2017)","DOI":"10.1109\/ICACCI.2017.8126084"},{"key":"493_CR45","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11416-007-0074-9","volume":"4","author":"G Wagener","year":"2008","unstructured":"Wagener, G., State, R., Dulaunoy, A.: Malware behaviour analysis. J. Comput. Virol. 4, 279\u2013287 (2008)","journal-title":"J. Comput. Virol."},{"key":"493_CR46","unstructured":"Wu, F., Souza, A., Zhang, T., Fifty, C., Yu, T., Weinberger, K.: Simplifying graph convolutional networks. In: Chaudhuri, K., Salakhutdinov, R. (eds.), Proceedings of the 36th International Conference on Machine Learning, volume\u00a097 of Proceedings of Machine Learning Research, pp. 6861\u20136871 (2019)"},{"issue":"6","key":"493_CR47","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1109\/TIFS.2016.2523912","volume":"11","author":"K Xu","year":"2016","unstructured":"Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252\u20131264 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"493_CR48","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? In: 7th International Conference on Learning Representations, ICLR (2019)"},{"key":"493_CR49","unstructured":"Xu, K., Li, C., Tian, Y., Sonobe, T., Kawarabayashi, K., Jegelka, S.: Representation learning on graphs with jumping knowledge networks. arxiv:1806.03536 (2018)"},{"key":"493_CR50","doi-asserted-by":"crossref","unstructured":"Xu, P., Eckert, C., Zarras, A.: Detecting and categorizing Android malware with graph neural networks. In: Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC \u201921, pp. 409\u2013412 (2021)","DOI":"10.1145\/3412841.3442080"},{"key":"493_CR51","doi-asserted-by":"crossref","unstructured":"Yan, J., Yan, G., Jin, D.: Classifying malware represented as control flow graphs using deep graph convolutional neural network. In: 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN, pp. 52\u201363 (2019)","DOI":"10.1109\/DSN.2019.00020"},{"key":"493_CR52","doi-asserted-by":"crossref","unstructured":"Yerima, S.Y., Sezer, S., McWilliams, G., Muttik, I.: A new Android malware detection approach using Bayesian classification. In: IEEE 27th International Conference on Advanced Information Networking and Applications, AINA, pp. 121\u2013128 (2013)","DOI":"10.1109\/AINA.2013.88"},{"key":"493_CR53","unstructured":"Ying, Z., Bourgeois, D., You, J., Zitnik, M., Leskovec, J.: GNNExplainer: generating explanations for graph neural networks. arxiv:1903.03894 (2019)"},{"key":"493_CR54","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297\u2013300 (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"key":"493_CR55","unstructured":"Yuan, H., Yu, H., Wang, J., Li, K., Ji, S.: On explainability of graph neural networks via subgraph explorations. In: International Conference on Machine Learning, pp. 12241\u201312252 (2021)"},{"key":"493_CR56","doi-asserted-by":"crossref","unstructured":"Zhang, M., Cui, Z., Neumann, M., Chen, Y.: An end-to-end deep learning architecture for graph classification. In: Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, AAAI\u201918\/IAAI\u201918\/EAAI\u201918 (2018)","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"493_CR57","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Cui, G., Shengding, H., Zhang, Z., Yang, C., Liu, Z., Wang, L., Li, C., Sun, M.: Graph neural networks: a review of methods and applications. AI Open 1, 57\u201381 (2020)","journal-title":"AI Open"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00493-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00493-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00493-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T11:22:58Z","timestamp":1708687378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00493-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,26]]},"references-count":57,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["493"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00493-y","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,26]]},"assertion":[{"value":"2 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}