{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T15:32:25Z","timestamp":1774971145482,"version":"3.50.1"},"reference-count":43,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063646","type":"journal-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T03:28:02Z","timestamp":1750735682000},"page":"3281-3304","source":"Crossref","is-referenced-by-count":4,"title":["Enhancing Android Malware Detection with XGBoost and Convolutional Neural Networks"],"prefix":"10.32604","volume":"84","author":[{"given":"Atif Raza","family":"Zaidi","sequence":"first","affiliation":[]},{"given":"Tahir","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Daud","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Alghushairy","sequence":"additional","affiliation":[]},{"given":"Hussain","family":"Dawood","sequence":"additional","affiliation":[]},{"given":"Nadeem","family":"Sarwar","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"109544","DOI":"10.1016\/j.compeleceng.2024.109544","article-title":"Detecting Android malware using deep learning algorithms: a survey","volume":"119","author":"Alzubaidi","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2268","DOI":"10.3390\/s22062268","article-title":"Artificial intelligence algorithms for malware detection in Android-operated mobile devices","volume":"22","author":"Alkahtani","year":"2022","journal-title":"Sensors"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"100130","DOI":"10.1016\/j.teler.2024.100130","article-title":"Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: a comprehensive review","volume":"14","author":"Smmarwar","year":"2024","journal-title":"Telematics Inform Rep"},{"key":"ref4","unstructured":"Akhtar Z. Malware detection and analysis: challenges and research opportunities. arXiv:2101.08429. 2021."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1186\/s40537-021-00444-8","article-title":"Review of deep learning: concepts, CNN architectures, challenges, applications, future directions","volume":"8","author":"Alzubaidi","year":"2021","journal-title":"J Big Data"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/s42979-023-02411-x","article-title":"Security testing of Android apps using malware analysis and XGBoost optimized by adaptive particle swarm optimization","volume":"5","author":"Kumar","year":"2023","journal-title":"SN Comput Sci"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"27527","DOI":"10.1109\/ACCESS.2023.3258377","article-title":"Apk2Audio4AndMal: audio based malware family detection framework","volume":"11","author":"Kural","year":"2023","journal-title":"IEEE Access"},{"key":"ref8","author":"Yeboah","year":"2024","journal-title":"Demalvertising: enhanced detection and mitigation of malvertising on Android devices"},{"key":"ref9","series-title":"2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS); 2024 Jan 28\u201329","first-page":"1","article-title":"A comprehensive analysis and evaluation of Android malware prediction using AI","author":"Fatima"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"102622","DOI":"10.1016\/j.cose.2022.102622","article-title":"EfficientNet convolutional neural networks-based Android malware detection","volume":"115","author":"Yadav","year":"2022","journal-title":"Comput Secur"},{"key":"ref11","series-title":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT); 2024 Jun 24\u201328","first-page":"1","article-title":"Integrating CNN and XGBoost with synthetic samples for advanced Android malware detection","author":"Gadilohar"},{"key":"ref12","series-title":"3rd International Conference for Innovation in Technology (INOCON); 2024 Mar 1\u20133","first-page":"1","article-title":"Ransomware attack detection using machine learning approaches","author":"Rahman","year":"2024"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s10044-024-01381-x","article-title":"A new method for tuning the CNN pre-trained models as a feature extractor for malware detection","volume":"28","author":"Bak\u0131r","year":"2025","journal-title":"Pattern Anal Applic"},{"key":"ref14","series-title":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering; 2019 Oct 22\u201324","first-page":"1","article-title":"Android malware detection based on convolutional neural networks","author":"Wang"},{"key":"ref15","first-page":"151","volume":"1407","author":"Lakshmanarao","year":"2021","journal-title":"Data engineering and intelligent computing. Advances in intelligent systems and computing"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1093\/comjnl\/bxac198","article-title":"Android malware detection in bytecode level using TF-IDF and XGBoost","volume":"66","author":"Ozogur","year":"2023","journal-title":"Comput J"},{"key":"ref17","series-title":"2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS); 2024 Aug 23\u201324","first-page":"1","article-title":"An efficient Android malware detection model using Convnets and Resnet Models","author":"Lakshmanarao"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"62","DOI":"10.58496\/MJCS\/2025\/005","article-title":"Enhanced Android malware detection through artificial neural networks technique","volume":"5","author":"Habeeb","year":"2025","journal-title":"Mesopotamian J CyberSecurity"},{"key":"ref19","series-title":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS); 2019 Oct 18\u201320","first-page":"528","article-title":"Android malware detection based on logistic regression and XGBoost","author":"Li"},{"key":"ref20","series-title":"2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet); 2024 Dec 4\u20136","first-page":"1","article-title":"Android malware detection using machine learning and neural network: a hybrid approach with federated learning","author":"Purkayastha"},{"key":"ref21","series-title":"2024 6th International Conference on Internet of Things, Automation and Artificial Intelligence (IoTAAI); 2024 Jul 26\u201328","first-page":"75","article-title":"Android malware detection using convolutional neural networks and light gradient boosting machine: a hybrid method","author":"Yin"},{"key":"ref22","unstructured":"Reggi Tresna Utami M, Hilman MH, Yazid S. Enhancing phishing detection: integrating XGBoost with feature selection techniques. [cited 2025 Jan 1]. Available from: https:\/\/ssrn.com\/abstract=5087049."},{"key":"ref23","series-title":"2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE); 2022 Oct 31\u2013Nov 3","first-page":"169","article-title":"Explainable AI for Android malware detection: towards understanding why the models perform so well?","author":"Liu"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"100072","DOI":"10.1016\/j.csa.2024.100072","article-title":"A comprehensive investigation into robust malware detection with explainable AI","volume":"3","author":"Baghirov","year":"2025","journal-title":"Cyber Secur Appl"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1109\/TCAD.2021.3102007","article-title":"Accurate and robust malware detection: running XGBoost on runtime data from performance counters","volume":"41","author":"Elnaggar","year":"2022","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"ref26","series-title":"2024 IEEE International Conference on Cybernetics and Intelligent Systems (CIS) and IEEE International Conference on Robotics, Automation and Mechatronics (RAM); 2024 Aug 8\u201311","first-page":"7","article-title":"AMN: attention-based multimodal network for Android malware classification","author":"Yang"},{"key":"ref27","series-title":"2017 International Conference on Computational Science and Computational Intelligence (CSCI); 2017 Dec 14\u201316","first-page":"645","article-title":"Secure AODV protocol for mobile networks using short digital signatures","author":"Abbas"},{"key":"ref28","first-page":"123","article-title":"AKANDO: a hybrid approach for effective Android botnet detection","volume":"2","author":"Doris","year":"2024","journal-title":"Innov Int Multidiscip J Appl Technol"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/TETCI.2023.3281833","article-title":"Android malware detection methods based on convolutional neural network: a survey","volume":"7","author":"Shu","year":"2023","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"104035","DOI":"10.1016\/j.jnca.2024.104035","article-title":"Android malware defense through a hybrid multi-modal approach","volume":"233","author":"Asmitha","year":"2025","journal-title":"J Netw Comput Appl"},{"key":"ref31","first-page":"13","article-title":"New efficient cryptographic techniques for cloud computing security","volume":"21","author":"Kaleem","year":"2024","journal-title":"Migr Lett"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"104035","DOI":"10.1016\/j.cose.2024.104035","article-title":"Unveiling vulnerabilities in deep learning-based malware detection: differential privacy driven adversarial attacks","volume":"146","author":"Taheri","year":"2024","journal-title":"Comput Secur"},{"key":"ref33","first-page":"647","article-title":"Hybrid permission-based Android malware detection using deep learning-enhanced CNNs and XGBoost","volume":"21","author":"Zaidi","year":"2024","journal-title":"Migr Lett"},{"key":"ref34","series-title":"2024 3rd International Conference for Innovation in Technology (INOCON); 2024 Mar 1\u20133","first-page":"1","article-title":"Anticipating threats through malware detection approaches to safeguard data privacy and security: an in-depth study","author":"Mehta"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"104233","DOI":"10.1016\/j.cose.2024.104233","article-title":"Hybrid feature extraction and integrated deep learning for cloud-based malware detection","volume":"150","author":"Nguyen","year":"2025","journal-title":"Comput Secur"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"85511","DOI":"10.1109\/ACCESS.2024.3416321","article-title":"Time series reconstruction with feature-driven imputation: a comparison of base learning algorithms","volume":"12","author":"Bashir","year":"2024","journal-title":"IEEE Access"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"e13488","DOI":"10.1111\/exsy.13488","article-title":"Android malware analysis and detection: a systematic review","volume":"42","author":"Dahiya","year":"2025","journal-title":"Expert Syst"},{"key":"ref38","series-title":"2024 IEEE International Conference on Cyber Security and Resilience (CSR); 2024 Sep 2\u20134","first-page":"9","article-title":"Verifying the robustness of machine learning based intrusion detection against adversarial perturbation","author":"Nowroozi"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"123675","DOI":"10.1016\/j.eswa.2024.123675","article-title":"A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks","volume":"249","author":"Fu","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref40","first-page":"1","article-title":"An ensemble machine learning approach for detecting and classifying malware attacks on mobile devices","volume":"2025","author":"Alsharif","year":"2025","journal-title":"Arab J Sci Eng"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"45","DOI":"10.17671\/gazibtd.1553548","article-title":"Advanced Android malware detection: merging deep learning and XGBoost techniques","volume":"18","author":"Y\u0131lmaz","year":"2025","journal-title":"Bili\u015fim Teknol Derg"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1007\/s42979-024-03123-6","article-title":"Detecting Android malware with convolutional neural networks and Hilbert space-filling curves","volume":"5","author":"Mbungang","year":"2024","journal-title":"SN Comput Sci"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2014.23247","article-title":"Drebin: effective and explainable detection of Android malware in your pocket","author":"Arp","year":"2014","journal-title":"NDSS Symposium 2014"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_63646\/TSP_CMC_63646.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:48:30Z","timestamp":1763344110000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":43,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063646","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}