International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF
Volume 74 | Issue 3 | Year 2026 | Article Id. IJETT-V74I3P128 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I3P128

Advancements in Android Malware Detection: Comprehensive Technical Analysis of Deep Learning Techniques


Mandeep Kumar, Abhishek Kajal

Received Revised Accepted Published
24 Dec 2025 23 Jan 2026 29 Jan 2026 28 Mar 2026

Citation :

Mandeep Kumar, Abhishek Kajal, "Advancements in Android Malware Detection: Comprehensive Technical Analysis of Deep Learning Techniques," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 3, pp. 408-441, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I3P128

Abstract

Nowadays, Android smartphones have occupied about 72% of the mobile market worldwide. This huge number of Android users attracts large-scale malware attacks due to the open-source nature of Android operating systems. Android app installation with extensive permission requests granted by smartphone users enables malware to access device functionality and sensitive data. Due to the limitations of traditional signature-based and heuristic-based malware detection methods, it is very important to protect against these attacks using evolving deep learning techniques. This review study covers and summarizes the latest academic papers over the last 12 years on malware detection architectures and categorizes them as per the use of dynamic analysis, static analysis, and hybrid analysis. This review will assist researchers in outlining future research directions in Android malware detection using deep learning techniques such as CNNs, LSTMs, Federated Learning, Graph Neural Networks, and GANs. Furthermore, the review identifies critical research gaps and proposes directions for future investigation to develop more robust, interpretable, and privacy-preserving malware detection systems.

Keywords

Android malware, Deep Learning, Cybersecurity, CNN, GNN, Machine Learning, Security, Hybrid analysis.

References

[1] Google, Security Reports Android Open-Source Project, 2024. [Online]. Available: https://source.android.com/docs/security/overview/reports

[2]  Avatlas, AV-ATLAS - Malware and PUA, 2026. [Online]. Available: https://portal.av-atlas.org/malware/statistics   

[3] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton, “Deep Learning,” Nature, vol. 521, no. 7553, pp. 436-444, 2015. 
[
CrossRef] [Google Scholar] [Publisher Link]

[4]  Jaswinder Singh, and Rajdeep Banerjee, “A Study on Single and Multi-Layer Perceptron Neural Network,” 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[5] Matt W. Gardner, and Stephen R. Dorling, “Artificial Neural Networks (The Multilayer Perceptron)-A Review of Applications in the Atmospheric Sciences,” Atmospheric Environment, vol. 32, no. 14-15, pp. 2627-2636, 1998.
[CrossRef] [Google Scholar] [Publisher Link]

[6] Huijuan Zhu et al., “SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 984-994, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[7] Neha Sharma, Vibhor Jain, and Anju Mishra, “An Analysis of Convolutional Neural Networks for Image Classification,” Procedia Computer Science, vol. 132, pp. 377-384, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[8] Peng Song, Chaoyang Geng, and Zhijie Li, “Research on Text Classification based on Convolutional Neural Network,” 2019 International Conference on Computer Network, Electronic and Automation (ICCNEA), Xi'an, China, pp. 229-232, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[9]  Danish Vasan et al., “Image-based Malware Classification using Ensemble of CNN Architectures (IMCEC),” Computers & Security, vol. 92, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[10]  Andrea Alamia et al., “Comparing Feedforward and Recurrent Neural Network Architectures with Human Behavior in Artificial Grammar Learning,” Scientific Reports, vol. 10, no. 1, pp. 1-15, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[11]Julianna M. Czum, “Dive into Deep Learning,” Journal of the American College of Radiology, vol. 17, no. 5, pp. 637-638, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[12] Felix A. Gers, Jürgen Schmidhuber, and Fred Cummins, “Learning to Forget: Continual Prediction with LSTM,” 9th International Conference on Artificial Neural Networks: ICANN '99, vol. 1999, pp. 850-855, 1999.
[CrossRef] [Google Scholar]

[13] Kyunghyun Cho et al., “Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation,” Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, pp. 1724-1734, 2014.
[CrossRef] [Google Scholar] [Publisher Link]

[14] Kaiming He et al., “Deep Residual Learning for Image Recognition,” Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770-778, 2016.
[Google Scholar] [Publisher Link]

[15] Alyazia Aldhaheri et al., “Deep Learning for Cyber Threat Detection in IoT Networks: A Review,” Internet of Things and Cyber-Physical Systems, vol. 4, pp. 110-128, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[16] Zhen Liu et al., “Research on Unsupervised Feature Learning for Android Malware Detection based on Restricted Boltzmann Machines,” Future Generation Computer Systems, vol. 120, pp. 91-108, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[17] Zhenlong Yuan, Yongqiang Lu, and Yibo Xue, “Droiddetector: Android Malware Characterization and Detection using Deep Learning,” Tsinghua Science and Technology, vol. 21, no. 1, p. 114-123, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[18] Han Qiu et al., “Adversarial Attacks against Network Intrusion Detection in IoT Systems,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10327-10335, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[19] Jing-Hao Xue, and D. Michael Titterington, “Comment on Discriminative vs. Generative Classifiers: A Comparison of Logistic Regression and Naive Bayes,” Neural Processing Letters, vol. 28, no. 3, p. 169-187, 2008.
[CrossRef] [Google Scholar] [Publisher Link]

[20]Yan Lu, and Jiang Li, “Generative Adversarial Network for Improving Deep Learning-based Malware Classification,” 2019 Winter Simulation Conference (WSC), National Harbor, MD, USA, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[21] Antonia Creswell et al., “Generative Adversarial Networks: An Overview,” IEEE Signal Processing Magazine, vol. 35, no. 1, pp. 53-65, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[22] Jie Zhou et al., “Graph Neural Networks: A Review of Methods and Applications,” AI Open, vol. 1, pp. 57-81, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[23]  Chuanqi Tan et al., “A Survey on Deep Transfer Learning,” Lecture Notes in Computer Science, pp. 270-279, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[24] Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore, “Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review,” Communications in Computer and Information Science, pp. 51-72, 2022.
[CrossRef] [Google Scholar] [Publisher Link]

[25] Liu Binxiang, Zhao Gang, and Sun Ruoying, “A Deep Reinforcement Learning Malware Detection Method based on PE Feature Distribution,” 2019 6th International Conference on Information Science and Control Engineering (ICISCE), Shanghai, China, pp. 23-27, 2019.
[CrossRef] [Google Scholar] [Publisher Link]

[26] Kigbu Shallom, and Chukwujekwu Damian Ikemefuna, “Enhancing Malware Detection using Federated Learning and Explainable AI for Privacy-Preserving Threat Intelligence,” World Journal of Advanced Research and Reviews, vol. 27, no. 1, pp. 331-351, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[27] Kaijun Liu et al., “A Review of Android Malware Detection Approaches based on Machine Learning,” IEEE Access, vol. 8, pp. 124579-124607, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[28] Yajin Zhou, and Xuxian Jiang, “Dissecting Android Malware: Characterization and Evolution,” 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, pp. 95-109, 2012.
[CrossRef] [Google Scholar] [Publisher Link]

[29]  Jinpei Yan, Yong Qi, and Qifan Rao, “LSTM-based Hierarchical Denoising Network for Android Malware Detection,” Security and Communication Networks, vol. 2018, pp. 1-18, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[30] Yu Feng et al., “Apposcopy: Semantics-based Detection of Android Malware through Static Analysis,” Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 576-587, 2014.
[CrossRef] [Google Scholar] [Publisher Link]

[31] Elliot Mbunge et al., “A Review of Deep Learning Models to Detect Malware in Android Applications,” Cyber Security and Applications, vol. 1, pp. 1-9, 2023. 
[CrossRef] [Google Scholar] [Publisher Link]

[32] Riyadh Mahmood, Nariman Mirzaei, and Sam Malek, “EvoDroid: Segmented Evolutionary Testing of Android Apps,” Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 599-609, 2014.
[
CrossRef] [Google Scholar] [Publisher Link]

[33] Recep Sinan Arslan, “FG-Droid: Grouping based Feature Size Reduction for Android Malware Detection,” PeerJ Computer Science, vol. 8, 2022.
[CrossRef] [Google Scholar] [Publisher Link]

[34] Huizhong Sun et al., “Android Malware Detection based on Feature Selection and Weight Measurement,” Intelligent Automation and Soft Computing, vol. 33, no. 1, pp. 585-600, 2022.
[Google Scholar] [Publisher Link]

[35] Ashwag Albakri et al., “Metaheuristics with Deep Learning Model for Cybersecurity and Android Malware Detection and Classification,” Applied Sciences, vol. 13, no. 4, pp. 1-18, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[36] Yinwei Wu et al., “DroidRL: Feature Selection for Android Malware Detection with Reinforcement Learning,” Computers & Security, vol. 128, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[37] Tanjie Wang et al., “Android Malware Detection via Efficient Application Programming Interface Call Sequences Extraction and Machine Learning Classifiers,” IET Software, vol. 17, no. 4, pp. 348-361, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[38] Abhishek Anand et al., “Android Malware Detection using LSTM with Smali Codes,” Preprint, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[39] Rahul Gupta, Kapil Sharma, and Ramesh Kumar Garg, “Innovative Approach to Android Malware Detection: Prioritizing Critical Features using Rough Set Theory,” Electronics, vol. 13, no. 3, pp. 1-26, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[40] Weiping Wang et al., “FGL Droid: An Efficient Android Malware Detection Method based on Hybrid Analysis,” Security and Communication Networks, vol. 2022, no. 1, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]

[41] Muhammad Shoaib Akhtar, and Tao Feng, “Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time,” Symmetry, vol. 14, no. 11, pp. 1-12, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[42] Mohammed Maray et al., “Intelligent Pattern Recognition using Equilibrium Optimizer with Deep Learning Model for Android Malware Detection,” IEEE Access, vol. 12, pp. 24516-24524, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[43] R. Vinayakumar et al., “Detecting Android Malware using Long Short-Term Memory (LSTM),” Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 34, no. 3, pp. 1277-1288, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[44] Xi Xiao et al., “Android Malware Detection based on System Call Sequences and LSTM,” Multimedia Tools and Applications, vol. 78, no. 4, pp. 3979-3999, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[45] Iram Bibi et al., “An Effective Android Ransomware Detection through Multi-Factor Feature Filtration and Recurrent Neural Network,” 2019 UK/ China Emerging Technologies (UCET), Glasgow, UK, pp. 1-4, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[46]  Burak Tahtaci, and Beyzanur Canbay, “Android Malware Detection using Machine Learning,” 2020 Innovations in Intelligent Systems and Applications Conference (ASYU), Istanbul, Turkey, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[47] Tianliang Lu et al., “Android Malware Detection based on a Hybrid Deep Learning Model,” Security and Communication Networks, vol. 2020, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[48] Ruitao Feng et al., “Seqmobile: An Efficient Sequence-based Malware Detection System using RNN on Mobile Devices,” 2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, pp. 63-72, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[49] Zhangjie Fu, Yongjie Ding, and Musaazi Godfrey, “An LSTM-based Malware Detection using Transfer Learning,” Journal of Cyber Security, vol. 3, no. 1, pp. 11-28, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[50] Yafei Wu et al., “DeepCatra: Learning Flow-and Graph-based Behaviours for Android Malware Detection,” IET Information Security, vol. 17, no. 1, p. 118-130, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[51] Brahami Menaouer et al., “Android Malware Detection Approach using Stacked AutoEncoder and Convolutional Neural Networks,” International Journal of Intelligent Information Technologies, vol. 19, no. 1, pp. 1-22, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[52] Ahmed R. Nasser, Ahmed M. Hasan, and Amjad J. Humaidi, “Dl-AMDet: Deep Learning-based Malware Detector for Android,” Intelligent Systems with Applications, vol. 21, pp. 1-10, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[53] S. Poornima, and R. Mahalakshmi, “Automated Malware Detection using Machine Learning and Deep Learning Approaches for Android Applications,” Measurement: Sensors, vol. 32, pp. 1-8, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[54] Sudan Jha et al., “Recurrent Neural Network for Detecting Malware,” Computers & Security, vol. 99, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[55] Huanyu Wu, “A Systematical Study for Deep Learning-based Android Malware Detection,” Proceedings of the 2020 9th International Conference on Software and Computer Applications, pp. 177-182, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[56] Zhiqiang Wang, Qian Liu, and Yaping Chi, “Review of Android Malware Detection based on Deep Learning,” IEEE Access, vol. 8, pp. 181102-181126, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[57] A. Lakshmanarao, and M. Shashi, “Android Malware Detection with Deep Learning using RNN from Opcode Sequences,” International Journal of Interactive Mobile Technologies (IJIM), vol. 16, no. 1, pp. 145-157, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[58] Sancheng Peng et al., “Challenges and Trends of Android Malware Detection in the Era of Deep Learning,” 2020 IEEE 8th International Conference on Smart City and Informatization (ISCI), Guangzhou, China, pp. 37-43, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[59] Esra Calik Bayazit, Ozgur Koray Sahingoz, and Buket Dogan, “Malware Detection in Android Systems with Traditional Machine Learning Models: A Survey,” 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, pp. 1-8, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[60] Dainius Čeponis, and Nikolaj Goranin, “Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Effciency against Single-Flow CNN Models for the Host- based Intrusion and Malware Detection Task on Univariate Times Series Data,” Applied Sciences, vol. 10, no. 7, pp. 1-26, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[61] Mahshid Gohari, Sattar Hashemi, and Lida Abdi, “Android Malware Detection and Classification based on Network Traffic using Deep Learning,” 2021 7th International Conference on Web Research (ICWR), Tehran, Iran, pp. 71-77, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[62] Esraa Saleh Alomari et al., “Malware Detection using Deep Learning and Correlation-based Feature Selection,” Symmetry, vol. 15, no. 1, pp. 1-21, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[63] Muhammad Aamir et al., “AMDDLmodel: Android Smart- Phones Malware Detection using Deep Learning Model,” PLoS One, vol. 19, no. 1, pp. 1-16, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[64] Peter Zegzhda et al., “Detecting Android Application Malicious Behaviors based on the Analysis of Control Flows and Data Flows,” Proceedings of the 10th International Conference on Security of Information and Networks, pp. 280-286, 2017.
[CrossRef] [Google Scholar] [Publisher Link]

[65] Linfeng Wei et al., “Machine Learning-based Malicious Application Detection of Android,” IEEE Access, vol. 5, pp. 25591-25601, 2017.
[
CrossRef] [Google Scholar] [Publisher Link]

[66] Luca Massarelli et al., “AndroDFA: Android Malware Classification based on Resource Consumption,” Information, vol. 11, no. 6, pp. 1-20, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[67] Yang Zhao, Guangquan Xu, and Yao Zhang, “HFA-MD: An Efficient Hybrid Features Analysis based Android Malware Detection Method,” Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 248-257, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[68] Suman R. Tiwari, and Ravi U. Shukla, “An Android Malware Detection Technique using Optimized Permission and API with PCA,” 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, pp. 2611-2616, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[69] Shweta Bhandari et al., “SWORD: Semantic Aware AndrOid Malware Detector,” Journal of Information Security and Applications, vol. 42, pp. 46-56, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[70] Saba Arshad et al., “SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System,” IEEE Access, vol. 6, pp. 4321-4339, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[71] Ke Xu et al., “DeepRefiner: Multi-Layer Android Malware Detection System Applying Deep Neural Networks,” 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, pp. 473-487, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[72] Haoyu Wang et al., “RmvDroid: Towards a Reliable Android Malware Dataset with App Metadata,” 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, pp. 404-408, 2019.
[CrossRef] [Google Scholar] [Publisher Link]

[73] Yuxuan Yan et al., “Understanding and Detecting Overlay-based Android Malware at Market Scales,” Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, pp. 168-179, 2019.
[CrossRef] [Google Scholar] [Publisher Link]

[74] William Younghoo Lee, Joshua Saxe, and Richard Harang, SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks, Advanced Sciences and Technologies for Security Applications, pp. 197-210, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[75] Shanshan Wang et al., “Deep and Broad URL Feature Mining for Android Malware Detection,” Information Sciences, vol. 513, pp. 600-613, 2020
[CrossRef] [Google Scholar] [Publisher Link]

[76]  Jiayin Feng et al., “A Two-Layer Deep Learning Method for Android Malware Detection using Network Traffic,” IEEE Access, vol. 8, pp. 125786-125796, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[77] Shahid Alam, Soltan Abed Alharbi, and Serdar Yildirim, “Mining Nested Flow of Dominant APIs for Detecting Android Malware,” Computer Networks, vol. 167,2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[78] Mohannad Alhanahnah et al., “DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2782-2797, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[79] Eslam Amer, Ivan Zelinka, and Shaker El-Sappagh, “A Multi- Perspective Malware Detection Approach through Behavioral Fusion of API Call Sequence,” Computers & Security, vol. 110, pp. 1-21, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[80] Huanran Wang, Weizhe Zhang, and Hui He, “you are What the Permissions Told Me! Android Malware Detection based on Hybrid Tactics,” Journal of Information Security and Applications, vol. 66, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[81] Junwei Tang et al., “Android Malware Obfuscation Variants Detection Method based on Multi-Granularity Opcode Features,” Future Generation Computer Systems, vol. 129, pp. 141-151, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[82] Pooja Yadav et al., “EfficientNet Convolutional Neural Networks-based Android Malware Detection,” Computers & Security, vol. 115, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[83] Hemant Rathore et al., “Breaking the Anti-Malware: EvoAAttack based on Genetic Algorithm against Android Malware Detection Systems,” International Conference on Computational Science, pp. 535-550, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[84] Diego Soi et al., “Can You See Me? On the Visibility of NOPs against Android Malware Detectors,” arxiv preprint, pp. 1-21, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[85] Arshad Hashmi, “Malware Detection and Classification on Different Dataset by Hybridization of CNN and Machine Learning,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 6s, pp. 650-667, 2023.
[Google Scholar] [Publisher Link]

[86] Sushil Buriya, and Neelam Sharma, “Malware Detection using 1d Convolution with Batch Normalization and L2 Regularization for Android,” 2023 International Conference on System, Computation, Automation and Networking (ICSCAN), Puducherry, India, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[87] Atif Raza Zaidi et al., “Effectiveness of Detecting Android Malware using Deep Learning Techniques,” Journal of Nanoscope (JN), vol. 4, no. 2, pp. 1-21, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[88] Abdurraheem Joomye, Mee Hong Ling, and Kok-Lim Alvin Yau, “Dynamic Android Malware Detection using Temporal Convolutional Networks,” 2023 IEEE International Conference on Computing (ICOCO), Langkawi, Malaysia, pp. 317-322, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[89] Doan Minh Trung et al., “On the Effectiveness of Transferability of Adversarial Android Malware Samples against Learning-based Detectors,” 2023 International Conference on Multimedia Analysis and Pattern Recognition (MAPR), Quy Nhon, Vietnam, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[90] Jabunnesa Jahan Sara, and Shohrab Hossain, “Static Analysis based Malware Detection for Zero-Day Attacks in Android Applications,” 2023 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD), Dhaka, Bangladesh, pp. 169-173, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[91] Hayam Alamro et al., “Automated Android Malware Detection using Optimal Ensemble Learning Approach for Cybersecurity,” IEEE Access, vol. 11, pp. 72509-72517, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[92] Chenhao Zhang et al., “Detecting Android Malware with Pre-Existing Image Classification Neural Networks,” IEEE Signal Processing Letters, vol. 30, pp. 858-862, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[93] Marwa Mamdouh, Khaled Elsayed, and Ahmed Elsheikh, “Android Malware Detection via Deep Learning Approach,” 2023 Intelligent Methods, Systems, and Applications (IMSA), Giza, Egypt, pp. 251-256, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[94] Shresth Jain et al., “Android Malware Analysis using Coefficient of Multiple Correlation,” 2023 IEEE Symposium on Wireless Technology & Applications (ISWTA), Kuala Lumpur, Malaysia, pp. 72-77, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[95] Shi Dong, Longhui Shu, and Shan Nie, “Android Malware Detection Method based on CNN and DNN Bybrid Mechanism,” IEEE Transactions on Industrial Informatics, vol. 20, no. 5, pp. 7744-7753, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[96] Esra Calik Bayazit, Ozgur Koray Sahingoz, and Buket Dogan, “A Deep Learning based Android Malware Detection System with Static Analysis,” 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, pp. 1-6, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[97] Fahdah A. Almarshad et al., “Detection of Android Malware using Machine Learning and Siamese Shot Learning Technique for Security,” IEEE Access, vol. 11, pp. 127697-127714, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[98] K.V. Vinayaka, and C.D. Jaidhar, “Heterogeneous Graph Convolutional Networks for Android Malware Detection using Callback-Aware Caller-Callee Graphs,” Computing and Processing, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[99] Riddhi Gupta et al., “Malware Analysis using Machine Learning and Deep Learning,” 2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan, pp. 341-346, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[100] Md. Habibullah Shakib, “Android Malware Detection Approach’s based on Genetic AI, CNN, RNN, lSTM, GRU, and Active Learning,” SSRN, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[101]Abhishek Sujith et al., “Enhancing Android Security: Static Analysis for Robust Protection and Resilient Defences using Deep Learning,” 2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Kirtipur, Nepal, pp. 154-159, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[102] Ghadah Aldehim et al., “Gauss-Mapping Black Widow Optimization with Deep Extreme Learning Machine for Android Malware Classification Model,” IEEE Access, vol. 11, pp. 87062-87070, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[103] Wenbo Fang et al., “Comprehensive Android Malware Detection based on Federated Learning Architecture,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3977-3990, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[104] A. Jyothish, Ashik Mathew, and P. Vinod, “Effectiveness of Machine Learning based Android Malware Detectors against Adversarial Attacks,” Cluster Computing, vol. 27, no. 3, pp. 2549-2569, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[105] Zakaria Sawadogo et al., “Zero-Vuln: using Deep Learning and Zero-Shot Learning Techniques to Detect Zero-Day Android Malware,” 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Canary Islands, Spain, pp. 1-5, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[106] Santosh K. Smmarwar, Govind P. Gupta, and Sanjay Kumar, “XAI-AMD-DL: An Explainable AI Approach for Android Malware Detection System using Deep Learning,” 2023 IEEE World Conference on Applied Intelligence and Computing (AIC), Sonbhadra, India, pp. 423-428, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[107] Alejandro Martín, Raúl Lara-Cabrera, and David Camacho, “Android Malware Detection through Hybrid Features Fusion and Ensemble Classifiers: The AndroPYtool Framework and the Omnidroid Dataset,” Information Fusion, vol. 52, pp. 128-142, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[108]  VirusShare.com, [Online]. Available: https://virusshare.com/

[109]  N Anitha Devi et al., “Shap based -Android Malware Detection using Ensemble Learning,” International Research Journal on Advanced Science Hub, vol. 7, no. 07, pp. 673-680, 2025.
[CrossRef] [Publisher Link]

[110] C. Sruneethi, and Kotla Vandana, “Automated Android Malware Detection using Optimal Ensemble Learning Approach for Cybersecurity,” International Journal of Scientific Research in Science and Technology, vol. 12, no. 3, pp. 331-334, 2025.
[
CrossRef] [Publisher Link]