{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:51:28Z","timestamp":1774540288984,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12083-021-01244-w","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T09:02:57Z","timestamp":1631610177000},"page":"163-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection"],"prefix":"10.1007","volume":"15","author":[{"given":"Duc V.","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6184-1469","authenticated-orcid":false,"given":"Giang L.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thang T.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Anh H.","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Giang T.","family":"Pham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"key":"1244_CR1","unstructured":"Clement J (2020) Volume of detected mobile malware packages as of q1. https:\/\/www.statista.com\/statistics\/653680\/volume-of-detected-mobile-malware-packages\/,\u00a02020. Online; accessed 30 June 2020"},{"key":"1244_CR2","doi-asserted-by":"crossref","unstructured":"Nguyen TN, Zeadally S (2020) Mobile crowd-sensing applications: Data redundancies, challenges, and solutions. ACM Transactions on Internet Technology","DOI":"10.1145\/3431502"},{"key":"1244_CR3","unstructured":"O\u2019Dea S (2020) Global smartphone unit shipments by operating system 2016-2023. https:\/\/www.statista.com\/statistics\/309448\/global-smartphone-shipments-forecast-operating-system\/. Online; accessed 30 June 2020"},{"issue":"4","key":"1244_CR4","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1166\/jctn.2020.8937","volume":"17","author":"A Beroual","year":"2020","unstructured":"Beroual A, Al-Shaikhli IF (2020) A survey on android malwares and defense techniques. Journal of Computational and Theoretical Nanoscience 17(4):1557\u20131565","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"key":"1244_CR5","doi-asserted-by":"crossref","unstructured":"Qiu J, Zhang J, Luo W, Pan L, Nepal S, Xiang Y (2020) A survey of android malware detection with deep neural models. ACM Comput Surv\u00a053(6)","DOI":"10.1145\/3417978"},{"issue":"2","key":"1244_CR6","doi-asserted-by":"publisher","first-page":"225","DOI":"10.2174\/1872212114999200710143847","volume":"15","author":"M Dhalaria","year":"2021","unstructured":"Dhalaria M, Gandotra E (2021) Android malware detection techniques: A literature review. Recent Patents on Engineering 15(2):225\u2013245","journal-title":"Recent Patents on Engineering"},{"key":"1244_CR7","doi-asserted-by":"crossref","unstructured":"Xie N, Wang X, Wang W, Liu J (2019) Fingerprinting android malware families. Front Comp Sci\u00a013(3):637\u2013646","DOI":"10.1007\/s11704-017-6493-y"},{"key":"1244_CR8","doi-asserted-by":"crossref","unstructured":"Ghasempour A, Sani NFM, Abari OJ (2020) Permission extraction framework for android malware detection. Int J Adv Comput Sci Appl\u00a011(11)","DOI":"10.14569\/IJACSA.2020.0111159"},{"key":"1244_CR9","doi-asserted-by":"crossref","unstructured":"Wang C, Xu Q, Lin X, Liu S (2019) Research on data mining of permissions mode for android malware detection. Clust Comput\u00a022(6):13337\u201313350","DOI":"10.1007\/s10586-018-1904-x"},{"issue":"8","key":"1244_CR10","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.1109\/TIFS.2018.2806891","volume":"13","author":"M Fan","year":"2018","unstructured":"Fan M, Liu J, Luo X, Chen K, Tian Z, Zheng Q, Liu T (2018) Android malware familial classification and representative sample selection via frequent subgraph analysis. IEEE Transactions on Information Forensics and Security 13(8):1890\u20131905","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1244_CR11","doi-asserted-by":"crossref","unstructured":"Arp D, Spreitzenbarth M, H\u00fcbner M, Gascon H, Rieck K (2014) Drebin: Effective and explainable detection of android malware in your pocket","DOI":"10.14722\/ndss.2014.23247"},{"key":"1244_CR12","unstructured":"Fan R-E, Chang K-W, Hsieh C-J, Wang X-R, Lin C-J (2008) Liblinear: A library for large linear classification. J Mach Learn Res\u00a09:1871\u20131874"},{"key":"1244_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2017.04.041","volume":"75","author":"X Wang","year":"2017","unstructured":"Wang X, Wang W, He Y, Liu J, Han Z, Zhang X (2017) Characterizing android apps behavior for effective detection of malapps at large scale. Future Generation Computer Systems 75:30\u201345","journal-title":"Future Generation Computer Systems"},{"key":"1244_CR14","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yang Y, Wang X (2018) A novel android malware detection approach based on convolutional neural network. In Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018, page 144\u2013149, New York, NY, USA. Association for Computing Machinery","DOI":"10.1145\/3199478.3199492"},{"key":"1244_CR15","doi-asserted-by":"publisher","first-page":"S48","DOI":"10.1016\/j.diin.2018.01.007","volume":"24","author":"EB Karbab","year":"2018","unstructured":"Karbab EB, Debbabi M, Derhab A, Mouheb D (2018) Maldozer: Automatic framework for android malware detection using deep learning. Digital Investigation 24:S48\u2013S59","journal-title":"Digital Investigation"},{"issue":"3","key":"1244_CR16","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2019","unstructured":"Kim T, Kang B, Rho M, Sezer S, Im EG (2019) A multimodal deep learning method for android malware detection using various features. IEEE Transactions on Information Forensics and Security 14(3):773\u2013788","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1244_CR17","doi-asserted-by":"crossref","unstructured":"Vu D-L, Nguyen T-K, Nguyen TV, Nguyen TN, Massacci F, Phung PH (2020) Hit4mal: Hybrid image transformation for malware classification. Trans Emerg Telecommun Technol\u00a031(11):e3789","DOI":"10.1002\/ett.3789"},{"key":"1244_CR18","doi-asserted-by":"crossref","unstructured":"Blasing T, Batyuk L, Schmidt AD, Camtepe SA, Albayrak S (2010) An android application sandbox system for suspicious software detection. In 2010 5th International Conference on Malicious and Unwanted Software\u00a055\u201362","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"1244_CR19","unstructured":"Yan LK, Yin H (2012) Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX Conference on Security Symposium, Security\u201912 29, USA. USENIX Association"},{"key":"1244_CR20","unstructured":"Enck W, Gilbert P, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2010) Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI \u201910, page 393\u2013407, USA. USENIX Association"},{"key":"1244_CR21","doi-asserted-by":"crossref","unstructured":"Lindorfer M, Neugschwandtner M, Weichselbaum L, Fratantonio Y, Veen VVD, Platzer C (2014) Andrubis \u2013 1,000,000 apps later: A view on current android malware behaviors. In 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)\u00a03\u201317","DOI":"10.1109\/BADGERS.2014.7"},{"key":"1244_CR22","doi-asserted-by":"publisher","first-page":"101663","DOI":"10.1016\/j.cose.2019.101663","volume":"89","author":"MK Alzaylaee","year":"2020","unstructured":"Alzaylaee MK, Yerima SY, Sezer S (2020) Dl-droid: Deep learning based android malware detection using real devices. Computers & Security 89:101663","journal-title":"Computers & Security"},{"key":"1244_CR23","doi-asserted-by":"crossref","unstructured":"Liang H, Song Y, Xiao D (2017) An end-to-end model for android malware detection. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI)\u00a0140\u2013142","DOI":"10.1109\/ISI.2017.8004891"},{"key":"1244_CR24","doi-asserted-by":"crossref","unstructured":"Hou S, Saas A, Chen L, Ye Y (2016) Deep4maldroid: A deep learning framework for android malware detection based on linux kernel system call graphs. In 2016 IEEE\/WIC\/ACM International Conference on Web Intelligence Workshops (WIW) 104\u2013111","DOI":"10.1109\/WIW.2016.040"},{"key":"1244_CR25","doi-asserted-by":"crossref","unstructured":"Yuan Z, Lu Y, Wang Z, Xue Y (2014) Droid-sec: Deep learning in android malware detection. ACM SIGCOMM Computer Communication Review\u00a044(4):371\u2013372","DOI":"10.1145\/2740070.2631434"},{"key":"1244_CR26","doi-asserted-by":"crossref","unstructured":"Fischer A, Igel C (2012) An introduction to restricted boltzmann machines 14\u201336","DOI":"10.1007\/978-3-642-33275-3_2"},{"key":"1244_CR27","doi-asserted-by":"crossref","unstructured":"Xu L, Zhang D, Jayasena N, Cavazos J (2018) Hadm: Hybrid analysis for detection of malware. In Y.\u00a0Bi, S.\u00a0Kapoor, and R.\u00a0Bhatia (eds)\u00a0Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, pages 702\u2013724, Cham. Springer International Publishing","DOI":"10.1007\/978-3-319-56991-8_51"},{"key":"1244_CR28","doi-asserted-by":"crossref","unstructured":"Alshahrani H, Mansourt H, Thorn S, Alshehri A, Alzahrani A, Fu H (2018) Ddefender: Android application threat detection using static and dynamic analysis. In 2018 IEEE Int Conf Consum Electron\u00a0(ICCE)\u00a01\u20136","DOI":"10.1109\/ICCE.2018.8326293"},{"key":"1244_CR29","unstructured":"Br S (2010) Analysis of the Android Architecture. PhD thesis, Karlsruhe Institute of Technology, Am Fasanengarten 5, Bldg. 50.34 76131 Karlsruhe"},{"key":"1244_CR30","unstructured":"Adam P, Blajoh, Kaplan A (2017) Feature-extraction. https:\/\/github.com\/33onethird\/feature-extraction"},{"key":"1244_CR31","unstructured":"Tumbleson C (2019) A tool for reverse engineering android apk files. https:\/\/ibotpeaches.github.io\/Apktool\/. Accessed June 2019"},{"key":"1244_CR32","unstructured":"Derr E (2017) Libscout. https:\/\/github.com\/reddr\/LibScout"},{"key":"1244_CR33","unstructured":"Pan B (2013) dex2jar. https:\/\/github.com\/pxb1988\/dex2jar"},{"key":"1244_CR34","unstructured":"Google (2018) Android developers - permissions on android. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview. Accessed June 2018"},{"key":"1244_CR35","unstructured":"Google (2018) Android developers -\u00a0intent.\u00a0https:\/\/developer.android.com\/reference\/android\/content\/Intent. Accessed June 2018"},{"key":"1244_CR36","unstructured":"Joachims T (2018) Svm light format. https:\/\/www.cs.cornell.edu\/people\/tj\/svm_light\/. Accessed September 2018"},{"issue":"4","key":"1244_CR37","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/0169-7439(89)80095-4","volume":"6","author":"L Stahle","year":"1989","unstructured":"Stahle L, Wold S (1989) Analysis of variance (anova). Chemometrics and Intelligent Laboratory Systems 6(4):259\u2013272","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"key":"1244_CR38","first-page":"01","volume":"15","author":"X Glorot","year":"2010","unstructured":"Glorot X, Bordes A, Bengio Y (2010) Deep sparse rectifier neural networks. 15:01","journal-title":"Deep sparse rectifier neural networks."},{"key":"1244_CR39","doi-asserted-by":"crossref","unstructured":"Han J, Moraga C (1995) The influence of the sigmoid function parameters on the speed of backpropagation learning. In Proceedings of the International Workshop on Artificial Neural Networks: From Natural to Artificial Neural Computation, IWANN \u201996, page 195\u2013201, Berlin, Heidelberg. Springer-Verlag","DOI":"10.1007\/3-540-59497-3_175"},{"issue":"6789","key":"1244_CR40","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1038\/35016072","volume":"405","author":"RHR Hahnloser","year":"2000","unstructured":"Hahnloser RHR, Sarpeshkar R, Mahowald MA, Douglas RJ, Seung HS (2000) Digital selection and analogue amplification coexist in a cortex-inspired silicon circuit. Nature 405(6789):947\u2013951","journal-title":"Nature"},{"issue":"61","key":"1244_CR41","first-page":"2121","volume":"12","author":"J Duchi","year":"2011","unstructured":"Duchi J, Hazan E, Singer Y (2011) Adaptive subgradient methods for online learning and stochastic optimization. Journal of Machine Learning Research 12(61):2121\u20132159","journal-title":"Journal of Machine Learning Research"},{"key":"1244_CR42","unstructured":"G.\u00a0play store (2014)\u00a0https:\/\/play.google.com\/store, 2012"},{"key":"1244_CR43","doi-asserted-by":"crossref","unstructured":"Wei F, Li Y, Roy S, Ou X, Zhou W (2017) Deepground truth analysis of current android malware 252\u2013276","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"1244_CR44","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G et al (2011) Scikit-learn: Machine learning in Python. Journal of Machine Learning Research 12:2825\u20132830","journal-title":"Journal of Machine Learning Research"},{"key":"1244_CR45","unstructured":"Abadi M, Agarwal A et\u00a0al (2015) TensorFlow: Large-scale machine learning on heterogeneous systems. Software available from tensorflow.org"},{"key":"1244_CR46","unstructured":"F-Secure (2019) Trojan:android\/ginmaster.a. https:\/\/www.f-secure.com\/v-descs\/trojan_android_ginmaster.shtml. Accessed July 2019"},{"key":"1244_CR47","unstructured":"Google (2020) Malware categories. https:\/\/developers.google.com\/android\/play-protect\/phacategories. Accessed January 2020"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01244-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01244-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01244-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T04:25:07Z","timestamp":1673238307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01244-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,14]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1244"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01244-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,14]]},"assertion":[{"value":"26 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}