{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T03:50:31Z","timestamp":1770349831974,"version":"3.49.0"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Postdoctoral Training Program under Thailand Science Research and Innovation"},{"DOI":"10.13039\/501100004704","name":"National Research Council of Thailand (NRCT) via the International Research Network Program","doi-asserted-by":"publisher","award":["IRN61W0006"],"award-info":[{"award-number":["IRN61W0006"]}],"id":[{"id":"10.13039\/501100004704","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004071","name":"Khon Kaen University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004071","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,5,15]]},"DOI":"10.1109\/jiot.2022.3194881","type":"journal-article","created":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T19:37:22Z","timestamp":1659123442000},"page":"8560-8577","source":"Crossref","is-referenced-by-count":52,"title":["An Enhanced Deep Learning Neural Network for the Detection and Identification of Android Malware"],"prefix":"10.1109","volume":"10","author":[{"given":"Pakarat","family":"Musikawan","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2603-0879","authenticated-orcid":false,"given":"Yanika","family":"Kongsorot","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Cryptology and Mathematics, Kookmin University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1026-191X","authenticated-orcid":false,"given":"Chakchai","family":"So-In","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.06.006"},{"key":"ref57","author":"okeleke","year":"2021","journal-title":"The Mobile Economy 2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355839"},{"key":"ref56","article-title":"Nokia threat intelligence report&#x2014;2019","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115892"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.08.072"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1996.8.1.164"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44415-3_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00121-8"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10033-z"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.03.011"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.044"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075315"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2010.01.001"},{"key":"ref19","first-page":"1","article-title":"Incorporating Nesterov momentum into adam","author":"dozat","year":"2022","journal-title":"Proc 4th Int Conf Learn Represent"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2021.100379","article-title":"A survey on deep learning and its applications","volume":"40","author":"dong","year":"2021","journal-title":"Comput Sci Rev"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09634-4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.10.017"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.03.028"},{"key":"ref90","article-title":"A hybrid deep network framework for android malware detection","author":"zhu","year":"2021","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.050"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.01.084"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2996379"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.02.015"},{"key":"ref47","author":"lin","year":"2021","journal-title":"10 Mobile Usage Statistics Every Marketer Should Know in 2021"},{"key":"ref42","first-page":"562","article-title":"Deeply-supervised nets","author":"lee","year":"2015","journal-title":"Proc Int Conf Artif Intell Stat"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2958382"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.future.2021.06.029","article-title":"MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things","volume":"125","author":"kumar","year":"2021","journal-title":"Future Gener Comput Syst"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2007.12.027"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9535-1"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113864"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2049580"},{"key":"ref87","article-title":"ADADELTA: An adaptive learning rate method","author":"zeiler","year":"2012","journal-title":"arXiv 1212 5701"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106887"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.661502"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.08.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi8020055"},{"key":"ref4","article-title":"Layer normalization","author":"ba","year":"2016","journal-title":"arXiv 1607 06450"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.01.026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107639"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.019"},{"key":"ref82","first-page":"10524","article-title":"On layer normalization in the transformer architecture","author":"xiong","year":"2020","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.03.004"},{"key":"ref40","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/72.914538"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2306193"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028370"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2168604"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.06.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3054915"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2021.106284"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114748"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref75","author":"venkatesan","year":"2020","journal-title":"Sophisticated new Android malware marks the latest evolution of mobile ransomware"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.069"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.06.012"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(01)00130-7"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","article-title":"The random subspace method for constructing decision forests","volume":"20","author":"ho","year":"1998","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906934"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102735"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071450"},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.114805","article-title":"RSigELU: A nonlinear activation function for deep neural networks","volume":"174","author":"kili\u00e7arslan","year":"2021","journal-title":"Expert Syst Appl"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.12.013"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.00038"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108394"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3082002"},{"key":"ref68","year":"2020","journal-title":"Mobile Operating System Market Share Worldwide"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025436"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0981-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.03.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2020.101661"},{"key":"ref69","year":"2020","journal-title":"Number of Smartphone Subscriptions Worldwide From 2016 to 2026"},{"key":"ref20","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2015.2471235"},{"key":"ref63","article-title":"Swish: A self-gated activation function","author":"ramachandran","year":"2017","journal-title":"arXiv 1710 05941"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.03.046"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.03.010"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(98)00046-X"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3079370"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02823-0"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546022"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.007"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10119650\/09845349.pdf?arnumber=9845349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:40:34Z","timestamp":1685382034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9845349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,15]]},"references-count":92,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3194881","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,15]]}}}