{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:25:42Z","timestamp":1759134342753,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission, under the ASTRID and FutureTPM projects","award":["786922 and 779391"],"award-info":[{"award-number":["786922 and 779391"]}]},{"name":"Researchers Supporting Project, King Saud University, Riyadh, Saudi Arabia","award":["RSP-2020\/12"],"award-info":[{"award-number":["RSP-2020\/12"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,2,28]]},"abstract":"<jats:p>Volunteer Computing provision of seamless connectivity that enables convenient and rapid deployment of greener and cheaper computing infrastructure is extremely promising to complement next-generation distributed computing systems. Undoubtedly, without tactile Internet and secure VC ecosystems, harnessing its full potentials and making it an alternative viable and reliable computing infrastructure is next to impossible. Android-enabled smart devices, applications, and services are inevitable for Volunteer computing. Contrarily, the progressive developments of sophisticated Android malware may reduce its exponential growth. Besides, Android malwares are considered the most potential and persistent cyber threat to mobile VC systems. To secure Android-based mobile volunteer computing, the authors proposed MulDroid, an efficient and self-learning autonomous hybrid (Long-Short-Term Memory, Convolutional Neural Network, Deep Neural Network) multi-vector Android malware threat detection framework. The proposed mechanism is highly scalable with well-coordinated infrastructure and self-optimizing capabilities to proficiently tackle fast-growing dynamic variants of sophisticated malware threats and attacks with 99.01% detection accuracy. For a comprehensive evaluation, the authors employed current state-of-the-art malware datasets (Android Malware Dataset, Androzoo) with standard performance evaluation metrics. Moreover, MulDroid is compared with our constructed contemporary hybrid DL-driven architectures and benchmark algorithms. Our proposed mechanism outperforms in terms of detection accuracy with a trivial tradeoff speed efficiency. Additionally, a 10-fold cross-validation is performed to explicitly show unbiased results.<\/jats:p>","DOI":"10.1145\/3428151","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T16:03:26Z","timestamp":1631635406000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure Distributed Mobile Volunteer Computing with Android"],"prefix":"10.1145","volume":"22","author":[{"given":"Iram","family":"Bibi","sequence":"first","affiliation":[{"name":"COMSATS University Islamabad, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8370-9290","authenticated-orcid":false,"given":"Adnan","family":"Akhunzada","sequence":"additional","affiliation":[{"name":"Cybersecurity Section, DTU Compute, Technical University of Denmark, Denmark"}]},{"given":"Jahanzaib","family":"Malik","sequence":"additional","affiliation":[{"name":"National Cyber Security Auditing and Evaluation Lab (NCSAEL), NUST, Pakistan"}]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"Senior Member, IEEE, Center of Excellence in Information Assurance (COEIA), College of Computer &amp; Information Sciences, King Saud University, Saudi Arabia"}]},{"given":"Muhammad","family":"Dawood","sequence":"additional","affiliation":[{"name":"Centre for Security, Communications and Network Research, Plymouth University, UK; and Faculty of Computer Science, University of Applied Sciences Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.006"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382770"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326293"},{"key":"e_1_2_1_5_1","volume-title":"BOINC: A platform for volunteer computing. J. Grid Comput.","author":"Anderson P.","year":"2019","unstructured":"David\u00a0 P. Anderson . 2019 . BOINC: A platform for volunteer computing. J. Grid Comput. (2019), 1\u201324. David\u00a0P. Anderson. 2019. BOINC: A platform for volunteer computing. J. Grid Comput. (2019), 1\u201324."},{"volume-title":"UK\/China Emerging Technologies (UCET\u201919)","author":"Bibi Iram","key":"e_1_2_1_6_1","unstructured":"Iram Bibi , Adnan Akhunzada , Jahanzaib Malik , Ghufran Ahmed , and Mohsin Raza . 2019. An effective Android ransomware detection through multi-factor feature filtration and recurrent neural network . In UK\/China Emerging Technologies (UCET\u201919) . IEEE , 1\u20134. Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Ghufran Ahmed, and Mohsin Raza. 2019. An effective Android ransomware detection through multi-factor feature filtration and recurrent neural network. In UK\/China Emerging Technologies (UCET\u201919). IEEE, 1\u20134."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009819"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2843533"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976908"},{"key":"e_1_2_1_10_1","article-title":"Mobile malware detection: A survey","volume":"17","author":"Salah\u00a0Ibrahim Hamed Yasmin","year":"2019","unstructured":"Yasmin Salah\u00a0Ibrahim Hamed , Sarah Nabil\u00a0Abdullah Abdul Kader , and Mostafa-Sami\u00a0 M. Mostafa . 2019 . Mobile malware detection: A survey . Int. J. Comput. Sci. Inf. Secur. 17 , 1 (2019). Yasmin Salah\u00a0Ibrahim Hamed, Sarah Nabil\u00a0Abdullah Abdul Kader, and Mostafa-Sami\u00a0M. Mostafa. 2019. Mobile malware detection: A survey. Int. J. Comput. Sci. Inf. Secur. 17, 1 (2019).","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"e_1_2_1_11_1","volume-title":"14th International Colloquium on Signal Processing & Its Applications (CSPA\u201918)","author":"Hasegawa Chihiro","year":"2018","unstructured":"Chihiro Hasegawa and Hitoshi Iyatomi . 2018 . One-dimensional convolutional neural networks for Android malware detection. In IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA\u201918) . IEEE, 99\u2013102. Chihiro Hasegawa and Hitoshi Iyatomi. 2018. One-dimensional convolutional neural networks for Android malware detection. In IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA\u201918). IEEE, 99\u2013102."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.057"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3322819"},{"volume-title":"Deep Learning Applications for Cyber Security","author":"Lee William\u00a0Younghoo","key":"e_1_2_1_16_1","unstructured":"William\u00a0Younghoo Lee , Joshua Saxe , and Richard Harang . 2019. SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks . In Deep Learning Applications for Cyber Security . Springer , 197\u2013210. William\u00a0Younghoo Lee, Joshua Saxe, and Richard Harang. 2019. SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks. In Deep Learning Applications for Cyber Security. Springer, 197\u2013210."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004891"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Shahzana Liaqat Adnan Akhunzada Fatema\u00a0Sabeen Shaikh Athanasios Giannetsos and Mian\u00a0Ahmad Jan. 2020. SDN orchestration to combat evolving cyber threats in internet of medical things (IoMT). Comput. Commun. (2020).  Shahzana Liaqat Adnan Akhunzada Fatema\u00a0Sabeen Shaikh Athanasios Giannetsos and Mian\u00a0Ahmad Jan. 2020. SDN orchestration to combat evolving cyber threats in internet of medical things (IoMT). Comput. Commun. (2020).","DOI":"10.1016\/j.comcom.2020.07.006"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009849"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3012046"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.216"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320073"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2824250"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INTELCCT.2017.8324010"},{"key":"e_1_2_1_27_1","unstructured":"Statista. 2019. Number of Smartphone Users Worldwide from 2016 to 2021 (in Billions). Retrieved from https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/.  Statista. 2019. Number of Smartphone Users Worldwide from 2016 to 2021 (in Billions). Retrieved from https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"e_1_2_1_29_1","unstructured":"Alaa Tharwat. 2018. Classification assessment methods. Appl. Comput. Inform. (2018).  Alaa Tharwat. 2018. Classification assessment methods. Appl. Comput. Inform. (2018)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Steven Walczak. 2019. Artificial neural networks. In Advanced Methodologies and Technologies in Artificial Intelligence Computer Simulation and Human-Computer Interaction. IGI Global 40\u201353.  Steven Walczak. 2019. Artificial neural networks. In Advanced Methodologies and Technologies in Artificial Intelligence Computer Simulation and Human-Computer Interaction. IGI Global 40\u201353.","DOI":"10.4018\/978-1-5225-7368-5.ch004"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2012.2213796"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0803-6"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9368-4"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2908280"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3199478.3199492"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:23Z","timestamp":1750195463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,14]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2,28]]}},"alternative-id":["10.1145\/3428151"],"URL":"https:\/\/doi.org\/10.1145\/3428151","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2021,9,14]]},"assertion":[{"value":"2020-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}