2022
DOI: 10.1007/s11277-022-09765-0
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Android Malware Detection Using Adaptive Red Fox Optimization Based CNN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…The results demonstrated that this method outperformed other methods in the literature, making it a more effective diagnostic tool for COVID-19 virus detection. Mahesh and Hemalatha (2022) proposed a CNN-ARFO approach based on a CNN to assist users in identifying malicious applications. Pugal Priya, Saradadevi Sivarani, and Gnana Saravanan (2021) developed a RFO algorithm that employs deep long short-term memory to classify mild, moderate, and severe stages of NPDR.…”
Section: Related Workmentioning
confidence: 99%
“…The results demonstrated that this method outperformed other methods in the literature, making it a more effective diagnostic tool for COVID-19 virus detection. Mahesh and Hemalatha (2022) proposed a CNN-ARFO approach based on a CNN to assist users in identifying malicious applications. Pugal Priya, Saradadevi Sivarani, and Gnana Saravanan (2021) developed a RFO algorithm that employs deep long short-term memory to classify mild, moderate, and severe stages of NPDR.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the most commonly used methods are discussed in brief below. ✓ ✓ ✓ Zhu et al [190] ✓ ✓ ✓ A. Altaher [191] ✓ ✓ ✓ Su et al [192] ✓ ✓ ✓ Mahindru et al [193] ✓ ✓ ✓ Dehkordy et al [194] ✓ ✓ ✓ Nguyen et al [195] ✓ ✓ ✓ Taheri et al [196] ✓ ✓ ✓ Analysis Malware Detection Normal Malware Mahesh et al [197] ✓ ✓ ✓ Firdaus et al [198] ✓ ✓ ✓ Shrivastava et al [199] ✓ ✓ ✓ [20] chose to eliminate such permissions as they might introduce ambiguity in the malware detection process. Moreover, they ranked the features based on their frequency of usage in malicious and benign apps.…”
Section: Techniques Usedmentioning
confidence: 99%
“…Just like a student who learns a concept under the supervision of a teacher, the machines are used to predict an output correctly with the help of the training data working as a supervisor that teaches the machines. The type of machine learning in which the devices are trained using well [190] ✓ ✓ Permission rate, system events Su et al [192] ✓ ✓ ✓ ✓ Strings, certificate-payload info, code pattern Mahindru et al [193] ✓ ✓ Number of user download an app, rating of an app Dehkordy et al [194] ✓ ✓ ✓ ✓ URLs, activity, service receiver, provider Nguyen et al [195] ✓ ✓ ✓ ✓ Provider, activity, service, URLs Taheri et al [196] ✓ ✓ Mahesh et al [197] ✓ ✓ Firdaus et al [198] ✓ Directory path, telephony Shrivastava et al [199] ✓ ✓ Varsha et al [ Regression This type of learning is used when a relationship exists between the input and the output variable and the prediction is of continuous variables. Some commonly used regression algorithms are linear regression, regression trees, nonlinear regression, Bayesian linear regression, polynomial regression [214] etc.…”
Section: Supervised Machine Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…A graph attention network is constructed which is based on residual connection to analyze homology of malicious code. Mahesh et al [33] proposed an adaptive red fox optimization based on convolutional neural networks. They used the Minmax technique to normalize the features extracted from the APK of benign and malicious applications.…”
Section: Related Workmentioning
confidence: 99%