2023
DOI: 10.1109/jiot.2022.3188583
|View full text |Cite
|
Sign up to set email alerts
|

IoT-Based Android Malware Detection Using Graph Neural Network With Adversarial Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…In this section, we mainly introduce the related research progress in adversarial samples from the authors, method names, essential techniques, and their respective advantages and disadvantages, as shown in Table 1. [14] It achieved an accuracy of 98.33% on the CICMaldroid dataset.…”
Section: Related Workmentioning
confidence: 94%
“…In this section, we mainly introduce the related research progress in adversarial samples from the authors, method names, essential techniques, and their respective advantages and disadvantages, as shown in Table 1. [14] It achieved an accuracy of 98.33% on the CICMaldroid dataset.…”
Section: Related Workmentioning
confidence: 94%
“…A more general approach is proposed by Yumlembam et al [46], who consider each Android app as a local graph, where nodes are APIs and an edge exists between two APIs if they co-exist in a same code block (i.e. a code segment from a smali file, located between .method and .endmethod).…”
Section: Fcg Approachesmentioning
confidence: 99%
“…An adversarial attack for GNN-based APK malware detection has been introduced in the work [46] to measure the robustness of the proposed detection model. The attack is based on a VGAE, that aims to effectively add nodes and edges to a FCG in order to fool the GNN classifier, in a black-box setting.…”
Section: Adversarial Attacks On Graph-based Malware Detectionmentioning
confidence: 99%
“…Existing GNN models are judged insufficient for large-scale graphs that incorporate intricate topologies because they have only been evaluated on small graphs [70]. Examples of GNN implementation in cloud infrastructure have shown that graph analysis is scalable and effective in a variety of applications, such as recommender systems, traffic flow prediction, industrial IoT, privacy preservation, and matrix completion [71][72][73][74][75][76].…”
Section: Awanmentioning
confidence: 99%