TL-GNN: Android Malware Detection Using Transfer Learning

dc.contributor.authorRaza, Ali
dc.contributor.authorQaisar, Zahid Hussain
dc.contributor.authorAslam, Naeem
dc.contributor.authorFaheem, Muhammad
dc.contributor.authorAshraf, Muhammad Waqar
dc.contributor.authorChaudhry, Muhammad Naman
dc.contributor.orcidhttps://orcid.org/0000-0003-4628-4486
dc.date.accessioned2026-05-05T11:56:10Z
dc.date.issued2024
dc.description.abstractMalware growth has accelerated due to the widespread use of Android applications. Android smartphone attacks have increased due to the widespread use of these devices. While deep learning models offer high efficiency and accuracy, training them on large and complex datasets is computationally expensive. Hence, a method that effectively detects new malware variants at a low computational cost is required. A transfer learning method to detect Android malware is proposed in this research. Because of transferring known features from a source model that has been trained to a target model, the transfer learning approach reduces the need for new training data and minimizes the need for huge amounts of computational power. We performed many experiments on 1.2 million Android application samples for performance evaluation. In addition, we evaluated how well our framework performed in comparison with traditional deep learning and standard machine learning models. In comparison with state-of-the-art Android malware detection methods, the proposed framework offers improved classification accuracy of 98.87%, a precision of 99.55%, recall of 97.30%, F1-measure of 99.42%, and a quicker detection rate of 5.14 ms using the transfer learning strategy.en
dc.description.notification© 2024 The Authors. Applied AI Letters published by John Wiley & Sons Ltd. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
dc.description.reviewstatusfi=vertaisarvioitu|en=peerReviewed|
dc.identifier.urihttps://osuva.uwasa.fi/handle/11111/20255
dc.identifier.urnURN:NBN:fi-fe2026050539109
dc.language.isoen
dc.publisherJohn Wiley & Sons
dc.relation.doihttps://doi.org/10.1002/ail2.94
dc.relation.ispartofjournalApplied AI letters
dc.relation.issn2689-5595
dc.relation.issue3
dc.relation.urlhttps://doi.org/10.1002/ail2.94
dc.relation.urlhttps://urn.fi/URN:NBN:fi-fe2026050539109
dc.relation.volume5
dc.rightshttps://creativecommons.org/licenses/by/4.0/
dc.source.identifier2-s2.0-85192527152
dc.source.identifiera0154b2c-afe4-4402-9eb9-104c4952f648
dc.source.metadataSoleCRIS
dc.subjectAndroid malware detection
dc.subjectdeep learning
dc.subjectgraph neural network
dc.subjectmalware classifier
dc.subjecttransfer learning
dc.subject.disciplinefi=Tietotekniikka tekn|en=Information Technology tech|
dc.titleTL-GNN: Android Malware Detection Using Transfer Learning
dc.type.okmfi=A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä (vertaisarvioitu)|en=A1 Journal article (peer-reviewed)|
dc.type.publicationarticle
dc.type.versionpublishedVersion

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
nbnfi-fe2026050539109.pdf
Size:
1.16 MB
Format:
Adobe Portable Document Format

Kokoelmat