Research Article | Open Access | Download PDF
Volume 74 | Issue 3 | Year 2026 | Article Id. IJETT-V74I3P128 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I3P128Advancements in Android Malware Detection: Comprehensive Technical Analysis of Deep Learning Techniques
Mandeep Kumar, Abhishek Kajal
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 24 Dec 2025 | 23 Jan 2026 | 29 Jan 2026 | 28 Mar 2026 |
Citation :
Mandeep Kumar, Abhishek Kajal, "Advancements in Android Malware Detection: Comprehensive Technical Analysis of Deep Learning Techniques," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 3, pp. 408-441, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I3P128
Abstract
Nowadays, Android smartphones have occupied about 72% of the mobile market worldwide. This huge number of Android users attracts large-scale malware attacks due to the open-source nature of Android operating systems. Android app installation with extensive permission requests granted by smartphone users enables malware to access device functionality and sensitive data. Due to the limitations of traditional signature-based and heuristic-based malware detection methods, it is very important to protect against these attacks using evolving deep learning techniques. This review study covers and summarizes the latest academic papers over the last 12 years on malware detection architectures and categorizes them as per the use of dynamic analysis, static analysis, and hybrid analysis. This review will assist researchers in outlining future research directions in Android malware detection using deep learning techniques such as CNNs, LSTMs, Federated Learning, Graph Neural Networks, and GANs. Furthermore, the review identifies critical research gaps and proposes directions for future investigation to develop more robust, interpretable, and privacy-preserving malware detection systems.
Keywords
Android malware, Deep Learning, Cybersecurity, CNN, GNN, Machine Learning, Security, Hybrid analysis.
References
[1] Google, Security Reports Android Open-Source Project, 2024. [Online]. Available: https://source.android.com/docs/security/overview/reports
[2] Avatlas, AV-ATLAS - Malware and PUA, 2026. [Online].
Available: https://portal.av-atlas.org/malware/statistics
[3] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton,
“Deep Learning,” Nature, vol. 521,
no. 7553, pp. 436-444, 2015.
[CrossRef] [Google Scholar] [Publisher
Link]
[4] Jaswinder Singh, and Rajdeep Banerjee, “A Study
on Single and Multi-Layer Perceptron Neural Network,” 2019 3rd International Conference on Computing Methodologies
and Communication (ICCMC), Erode, India, 2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[5] Matt W. Gardner, and Stephen R. Dorling,
“Artificial Neural Networks (The Multilayer Perceptron)-A Review of
Applications in the Atmospheric Sciences,” Atmospheric
Environment, vol. 32, no. 14-15, pp. 2627-2636, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Huijuan Zhu et al., “SEDMDroid: An Enhanced
Stacking Ensemble Framework for Android Malware Detection,” IEEE Transactions on Network Science and
Engineering, vol. 8, no. 2, pp. 984-994, 2021.
[CrossRef] [Google Scholar] [Publisher
Link]
[7] Neha Sharma, Vibhor Jain, and Anju Mishra, “An
Analysis of Convolutional Neural Networks for Image Classification,” Procedia Computer Science, vol. 132, pp.
377-384, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Peng Song, Chaoyang Geng, and Zhijie Li,
“Research on Text Classification based on Convolutional Neural Network,” 2019 International Conference on Computer
Network, Electronic and Automation (ICCNEA), Xi'an, China, pp. 229-232,
2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[9] Danish Vasan et al., “Image-based Malware
Classification using Ensemble of CNN Architectures (IMCEC),” Computers & Security, vol. 92, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Andrea Alamia et al., “Comparing Feedforward and
Recurrent Neural Network Architectures with Human Behavior in Artificial
Grammar Learning,” Scientific Reports,
vol. 10, no. 1, pp. 1-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11]Julianna M. Czum, “Dive into Deep Learning,” Journal of the American College of Radiology,
vol. 17, no. 5, pp. 637-638, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Felix A. Gers, Jürgen Schmidhuber, and Fred
Cummins, “Learning to Forget: Continual Prediction with LSTM,” 9th International Conference on
Artificial Neural Networks: ICANN '99, vol. 1999, pp. 850-855, 1999.
[CrossRef] [Google Scholar]
[13] Kyunghyun Cho et al., “Learning Phrase
Representations using RNN Encoder-Decoder for Statistical Machine Translation,”
Proceedings of the 2014 Conference on
Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, pp.
1724-1734, 2014.
[CrossRef] [Google Scholar] [Publisher
Link]
[14] Kaiming He et al., “Deep Residual Learning for
Image Recognition,” Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.
770-778, 2016.
[Google Scholar] [Publisher Link]
[15] Alyazia Aldhaheri et al., “Deep Learning for
Cyber Threat Detection in IoT Networks: A Review,” Internet of Things and Cyber-Physical Systems, vol. 4, pp. 110-128,
2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Zhen Liu et al., “Research on Unsupervised
Feature Learning for Android Malware Detection based on Restricted Boltzmann
Machines,” Future Generation Computer
Systems, vol. 120, pp. 91-108, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Zhenlong Yuan, Yongqiang Lu, and Yibo Xue,
“Droiddetector: Android Malware Characterization and Detection using Deep
Learning,” Tsinghua Science and
Technology, vol. 21, no. 1, p. 114-123, 2016.
[CrossRef] [Google Scholar] [Publisher
Link]
[18] Han Qiu et al., “Adversarial Attacks against
Network Intrusion Detection in IoT Systems,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10327-10335,
2021.
[CrossRef] [Google Scholar] [Publisher
Link]
[19] Jing-Hao Xue, and D. Michael Titterington,
“Comment on Discriminative vs. Generative Classifiers: A Comparison of Logistic
Regression and Naive Bayes,” Neural
Processing Letters, vol. 28, no. 3, p. 169-187, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[20]Yan Lu, and Jiang Li, “Generative Adversarial
Network for Improving Deep Learning-based Malware Classification,” 2019 Winter Simulation Conference (WSC),
National Harbor, MD, USA, 2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[21] Antonia Creswell et al., “Generative Adversarial
Networks: An Overview,” IEEE Signal
Processing Magazine, vol. 35, no. 1, pp. 53-65, 2018.
[CrossRef] [Google Scholar] [Publisher
Link]
[22] Jie Zhou et al., “Graph Neural Networks: A Review
of Methods and Applications,” AI Open,
vol. 1, pp. 57-81, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Chuanqi Tan et al., “A Survey on Deep Transfer
Learning,” Lecture Notes in Computer
Science, pp. 270-279, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore,
“Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection:
A Review,” Communications in Computer and
Information Science, pp. 51-72, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Liu Binxiang, Zhao Gang, and Sun Ruoying, “A Deep
Reinforcement Learning Malware Detection Method based on PE Feature
Distribution,” 2019 6th
International Conference on Information Science and Control Engineering
(ICISCE), Shanghai, China, pp. 23-27, 2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[26] Kigbu Shallom, and Chukwujekwu Damian Ikemefuna,
“Enhancing Malware Detection using Federated Learning and Explainable AI for
Privacy-Preserving Threat Intelligence,” World
Journal of Advanced Research and Reviews, vol. 27, no. 1, pp. 331-351,
2025.
[CrossRef] [Google Scholar] [Publisher
Link]
[27] Kaijun Liu et al., “A Review of Android Malware
Detection Approaches based on Machine Learning,” IEEE Access, vol. 8, pp. 124579-124607, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[28] Yajin Zhou, and Xuxian Jiang, “Dissecting Android
Malware: Characterization and Evolution,” 2012
IEEE Symposium on Security and Privacy, San Francisco, CA, USA, pp. 95-109,
2012.
[CrossRef] [Google Scholar] [Publisher
Link]
[29] Jinpei Yan, Yong Qi, and Qifan Rao, “LSTM-based
Hierarchical Denoising Network for Android Malware Detection,” Security and Communication Networks,
vol. 2018, pp. 1-18, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Yu Feng et al., “Apposcopy: Semantics-based
Detection of Android Malware through Static Analysis,” Proceedings of the 22nd ACM SIGSOFT International Symposium
on Foundations of Software Engineering, pp. 576-587, 2014.
[CrossRef] [Google Scholar] [Publisher
Link]
[31] Elliot Mbunge et al., “A Review of Deep Learning
Models to Detect Malware in Android Applications,” Cyber Security and Applications, vol. 1, pp. 1-9, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Riyadh Mahmood, Nariman Mirzaei, and Sam Malek,
“EvoDroid: Segmented Evolutionary Testing of Android Apps,” Proceedings of the 22nd ACM
SIGSOFT International Symposium on Foundations of Software Engineering, pp.
599-609, 2014.
[CrossRef] [Google Scholar] [Publisher
Link]
[33] Recep Sinan Arslan, “FG-Droid: Grouping based
Feature Size Reduction for Android Malware Detection,” PeerJ Computer Science, vol. 8, 2022.
[CrossRef] [Google Scholar] [Publisher
Link]
[34] Huizhong Sun et al., “Android Malware Detection
based on Feature Selection and Weight Measurement,” Intelligent Automation and Soft Computing, vol. 33, no. 1, pp.
585-600, 2022.
[Google Scholar] [Publisher
Link]
[35] Ashwag Albakri et al., “Metaheuristics with Deep
Learning Model for Cybersecurity and Android Malware Detection and
Classification,” Applied Sciences,
vol. 13, no. 4, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[36] Yinwei Wu et al., “DroidRL: Feature Selection for
Android Malware Detection with Reinforcement Learning,” Computers & Security, vol. 128, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Tanjie Wang et al., “Android Malware Detection
via Efficient Application Programming Interface Call Sequences Extraction and
Machine Learning Classifiers,” IET
Software, vol. 17, no. 4, pp. 348-361, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Abhishek Anand et al., “Android Malware Detection
using LSTM with Smali Codes,” Preprint,
2023.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Rahul Gupta, Kapil Sharma, and Ramesh Kumar Garg,
“Innovative Approach to Android Malware Detection: Prioritizing Critical
Features using Rough Set Theory,” Electronics,
vol. 13, no. 3, pp. 1-26, 2024.
[CrossRef] [Google Scholar] [Publisher
Link]
[40] Weiping Wang et al., “FGL Droid: An Efficient
Android Malware Detection Method based on Hybrid Analysis,” Security and Communication Networks,
vol. 2022, no. 1, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Muhammad Shoaib Akhtar, and Tao Feng, “Detection
of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real
Time,” Symmetry, vol. 14, no. 11, pp.
1-12, 2022.
[CrossRef] [Google Scholar] [Publisher
Link]
[42] Mohammed Maray et al., “Intelligent Pattern
Recognition using Equilibrium Optimizer with Deep Learning Model for Android
Malware Detection,” IEEE Access, vol.
12, pp. 24516-24524, 2024.
[CrossRef] [Google Scholar] [Publisher
Link]
[43] R. Vinayakumar et al., “Detecting Android Malware
using Long Short-Term Memory (LSTM),” Journal
of Intelligent & Fuzzy Systems: Applications in Engineering and Technology,
vol. 34, no. 3, pp. 1277-1288, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Xi Xiao et al., “Android Malware Detection based
on System Call Sequences and LSTM,” Multimedia
Tools and Applications, vol. 78, no. 4, pp. 3979-3999, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Iram Bibi
et al., “An Effective Android Ransomware Detection through Multi-Factor Feature
Filtration and Recurrent Neural Network,” 2019
UK/ China Emerging Technologies (UCET), Glasgow, UK, pp. 1-4, 2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[46] Burak Tahtaci, and Beyzanur Canbay, “Android
Malware Detection using Machine Learning,” 2020
Innovations in Intelligent Systems and Applications Conference (ASYU),
Istanbul, Turkey, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[47] Tianliang Lu et al., “Android Malware Detection
based on a Hybrid Deep Learning Model,” Security
and Communication Networks, vol. 2020, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Ruitao Feng et al., “Seqmobile: An Efficient
Sequence-based Malware Detection System using RNN on Mobile Devices,” 2020 25th International
Conference on Engineering of Complex Computer Systems (ICECCS), Singapore,
pp. 63-72, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[49] Zhangjie Fu, Yongjie Ding, and Musaazi Godfrey,
“An LSTM-based Malware Detection using Transfer Learning,” Journal of Cyber Security, vol. 3, no. 1, pp. 11-28, 2021.
[CrossRef] [Google Scholar] [Publisher
Link]
[50] Yafei Wu et al., “DeepCatra: Learning Flow-and
Graph-based Behaviours for Android Malware Detection,” IET Information Security, vol. 17, no. 1, p. 118-130, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Brahami Menaouer et al., “Android Malware
Detection Approach using Stacked AutoEncoder and Convolutional Neural
Networks,” International Journal of
Intelligent Information Technologies, vol. 19, no. 1, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[52] Ahmed R. Nasser, Ahmed M. Hasan, and Amjad J.
Humaidi, “Dl-AMDet: Deep Learning-based Malware Detector for Android,” Intelligent Systems with Applications,
vol. 21, pp. 1-10, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[53] S. Poornima, and R. Mahalakshmi, “Automated
Malware Detection using Machine Learning and Deep Learning Approaches for
Android Applications,” Measurement:
Sensors, vol. 32, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Sudan Jha et al., “Recurrent Neural Network for
Detecting Malware,” Computers &
Security, vol. 99, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Huanyu Wu, “A Systematical Study for Deep
Learning-based Android Malware Detection,” Proceedings
of the 2020 9th International Conference on Software and Computer
Applications, pp. 177-182, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[56] Zhiqiang Wang, Qian Liu, and Yaping Chi, “Review
of Android Malware Detection based on Deep Learning,” IEEE Access, vol. 8, pp. 181102-181126, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[57] A. Lakshmanarao, and M. Shashi, “Android Malware
Detection with Deep Learning using RNN from Opcode Sequences,” International Journal of Interactive Mobile
Technologies (IJIM), vol. 16, no. 1, pp. 145-157, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[58] Sancheng Peng et al., “Challenges and Trends of
Android Malware Detection in the Era of Deep Learning,” 2020 IEEE 8th International Conference on Smart City and
Informatization (ISCI), Guangzhou, China, pp. 37-43, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[59] Esra Calik Bayazit, Ozgur Koray Sahingoz, and
Buket Dogan, “Malware Detection in Android Systems with Traditional Machine
Learning Models: A Survey,” 2020
International Congress on Human-Computer Interaction, Optimization and Robotic
Applications (HORA), Ankara, Turkey, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[60] Dainius Čeponis, and Nikolaj Goranin,
“Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Effciency
against Single-Flow CNN Models for the Host- based Intrusion and Malware
Detection Task on Univariate Times Series Data,” Applied Sciences, vol. 10, no. 7, pp. 1-26, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[61] Mahshid Gohari, Sattar Hashemi, and Lida Abdi,
“Android Malware Detection and Classification based on Network Traffic using
Deep Learning,” 2021 7th
International Conference on Web Research (ICWR), Tehran, Iran, pp. 71-77,
2021.
[CrossRef] [Google Scholar] [Publisher
Link]
[62] Esraa Saleh Alomari et al., “Malware Detection
using Deep Learning and Correlation-based Feature Selection,” Symmetry, vol. 15, no. 1, pp. 1-21,
2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[63] Muhammad Aamir et al., “AMDDLmodel: Android
Smart- Phones Malware Detection using Deep Learning Model,” PLoS One, vol. 19, no. 1, pp. 1-16,
2024.
[CrossRef] [Google Scholar] [Publisher Link]
[64] Peter Zegzhda et al., “Detecting Android
Application Malicious Behaviors based on the Analysis of Control Flows and Data
Flows,” Proceedings of the 10th
International Conference on Security of Information and Networks, pp.
280-286, 2017.
[CrossRef] [Google Scholar] [Publisher
Link]
[65] Linfeng Wei et al., “Machine
Learning-based Malicious Application Detection of Android,” IEEE Access, vol. 5, pp. 25591-25601,
2017.
[CrossRef] [Google Scholar] [Publisher
Link]
[66] Luca Massarelli et al., “AndroDFA: Android
Malware Classification based on Resource Consumption,” Information, vol. 11, no. 6, pp. 1-20, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[67] Yang Zhao, Guangquan Xu, and Yao Zhang, “HFA-MD:
An Efficient Hybrid Features Analysis based Android Malware Detection Method,” Lecture Notes of the Institute for Computer
Sciences, Social Informatics and Telecommunications Engineering, pp.
248-257, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[68] Suman R. Tiwari, and Ravi U. Shukla, “An Android
Malware Detection Technique using Optimized Permission and API with PCA,” 2018 Second International Conference on
Intelligent Computing and Control Systems (ICICCS), Madurai, India, pp.
2611-2616, 2018.
[CrossRef] [Google Scholar] [Publisher
Link]
[69] Shweta Bhandari et al., “SWORD: Semantic Aware
AndrOid Malware Detector,” Journal of
Information Security and Applications, vol. 42, pp. 46-56, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[70] Saba Arshad et al., “SAMADroid: A Novel 3-Level
Hybrid Malware Detection Model for Android Operating System,” IEEE Access, vol. 6, pp. 4321-4339,
2018.
[CrossRef] [Google Scholar] [Publisher
Link]
[71] Ke Xu et al., “DeepRefiner: Multi-Layer Android
Malware Detection System Applying Deep Neural Networks,” 2018 IEEE European Symposium on Security and Privacy (EuroS&P),
London, UK, pp. 473-487, 2018.
[CrossRef] [Google Scholar] [Publisher
Link]
[72] Haoyu Wang et al., “RmvDroid: Towards a Reliable
Android Malware Dataset with App Metadata,” 2019
IEEE/ACM 16th International Conference on Mining Software
Repositories (MSR), Montreal, QC, Canada, pp. 404-408, 2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[73] Yuxuan Yan et al., “Understanding
and Detecting Overlay-based Android Malware at Market Scales,” Proceedings of the 17th Annual
International Conference on Mobile Systems, Applications, and Services, pp.
168-179, 2019.
[CrossRef] [Google Scholar] [Publisher
Link]
[74] William Younghoo Lee, Joshua Saxe, and Richard
Harang, SeqDroid: Obfuscated Android
Malware Detection using Stacked Convolutional and Recurrent Neural Networks,
Advanced Sciences and Technologies for Security Applications, pp. 197-210,
2019.
[CrossRef] [Google Scholar] [Publisher Link]
[75] Shanshan Wang et al., “Deep and Broad URL Feature
Mining for Android Malware Detection,” Information
Sciences, vol. 513, pp. 600-613, 2020
[CrossRef] [Google Scholar] [Publisher Link]
[76] Jiayin Feng et al., “A Two-Layer Deep Learning
Method for Android Malware Detection using Network Traffic,” IEEE Access, vol. 8, pp. 125786-125796,
2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[77] Shahid Alam, Soltan Abed Alharbi, and Serdar
Yildirim, “Mining Nested Flow of Dominant APIs for Detecting Android Malware,” Computer Networks, vol. 167,2020.
[CrossRef] [Google Scholar] [Publisher Link]
[78] Mohannad Alhanahnah et al., “DINA: Detecting
Hidden Android Inter-App Communication in Dynamic Loaded Code,” IEEE Transactions on Information Forensics
and Security, vol. 15, pp. 2782-2797, 2020.
[CrossRef] [Google Scholar] [Publisher
Link]
[79] Eslam Amer, Ivan Zelinka, and Shaker El-Sappagh,
“A Multi- Perspective Malware Detection Approach through Behavioral Fusion of
API Call Sequence,” Computers &
Security, vol. 110, pp. 1-21, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[80] Huanran Wang, Weizhe Zhang, and Hui He, “you are
What the Permissions Told Me! Android Malware Detection based on Hybrid
Tactics,” Journal of Information Security
and Applications, vol. 66, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[81] Junwei Tang et al., “Android Malware Obfuscation
Variants Detection Method based on Multi-Granularity Opcode Features,” Future Generation Computer Systems, vol.
129, pp. 141-151, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[82] Pooja Yadav et al., “EfficientNet Convolutional
Neural Networks-based Android Malware Detection,” Computers & Security, vol. 115, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[83] Hemant Rathore et al., “Breaking the
Anti-Malware: EvoAAttack based on Genetic Algorithm against Android Malware
Detection Systems,” International
Conference on Computational Science, pp. 535-550, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[84] Diego Soi et al., “Can You See Me? On the
Visibility of NOPs against Android Malware Detectors,” arxiv preprint, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[85] Arshad Hashmi, “Malware Detection and
Classification on Different Dataset by Hybridization of CNN and Machine
Learning,” International Journal of
Intelligent Systems and Applications in Engineering, vol. 12, no. 6s, pp.
650-667, 2023.
[Google Scholar] [Publisher Link]
[86] Sushil Buriya, and Neelam Sharma, “Malware
Detection using 1d Convolution with Batch Normalization and L2 Regularization
for Android,” 2023 International
Conference on System, Computation, Automation and Networking (ICSCAN), Puducherry, India, pp. 1-6,
2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[87] Atif Raza Zaidi et al., “Effectiveness of
Detecting Android Malware using Deep Learning Techniques,” Journal of Nanoscope (JN), vol. 4, no. 2, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[88] Abdurraheem Joomye, Mee Hong Ling, and Kok-Lim
Alvin Yau, “Dynamic Android Malware Detection using Temporal Convolutional
Networks,” 2023 IEEE International
Conference on Computing (ICOCO), Langkawi, Malaysia, pp. 317-322, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[89] Doan Minh Trung et al., “On the Effectiveness of
Transferability of Adversarial Android Malware Samples against Learning-based
Detectors,” 2023 International Conference
on Multimedia Analysis and Pattern Recognition (MAPR), Quy Nhon, Vietnam,
pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[90] Jabunnesa Jahan Sara, and Shohrab Hossain,
“Static Analysis based Malware Detection for Zero-Day Attacks in Android
Applications,” 2023 International
Conference on Information and Communication Technology for Sustainable
Development (ICICT4SD), Dhaka, Bangladesh, pp. 169-173, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[91] Hayam Alamro et al., “Automated Android Malware
Detection using Optimal Ensemble Learning Approach for Cybersecurity,” IEEE Access, vol. 11, pp. 72509-72517,
2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[92] Chenhao Zhang et al., “Detecting Android Malware
with Pre-Existing Image Classification Neural Networks,” IEEE Signal Processing Letters, vol. 30, pp. 858-862, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[93] Marwa Mamdouh, Khaled Elsayed, and Ahmed
Elsheikh, “Android Malware Detection via Deep Learning Approach,” 2023 Intelligent Methods, Systems, and
Applications (IMSA), Giza, Egypt, pp. 251-256, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[94] Shresth Jain et al., “Android Malware Analysis
using Coefficient of Multiple Correlation,” 2023
IEEE Symposium on Wireless Technology & Applications (ISWTA), Kuala
Lumpur, Malaysia, pp. 72-77, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[95] Shi Dong, Longhui Shu, and Shan Nie, “Android
Malware Detection Method based on CNN and DNN Bybrid Mechanism,” IEEE Transactions on Industrial Informatics,
vol. 20, no. 5, pp. 7744-7753, 2024.
[CrossRef] [Google Scholar] [Publisher
Link]
[96] Esra Calik Bayazit, Ozgur Koray Sahingoz, and
Buket Dogan, “A Deep Learning based Android Malware Detection System with
Static Analysis,” 2022 International
Congress on Human-Computer Interaction, Optimization and Robotic Applications
(HORA), Ankara, Turkey, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher
Link]
[97] Fahdah A. Almarshad et al., “Detection of Android
Malware using Machine Learning and Siamese Shot Learning Technique for
Security,” IEEE Access, vol. 11, pp.
127697-127714, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[98] K.V. Vinayaka, and C.D. Jaidhar, “Heterogeneous
Graph Convolutional Networks for Android Malware Detection using Callback-Aware
Caller-Callee Graphs,” Computing and
Processing, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[99] Riddhi Gupta et al., “Malware Analysis using
Machine Learning and Deep Learning,” 2023
3rd International Conference on Technological Advancements in
Computational Sciences (ICTACS), Tashkent, Uzbekistan, pp. 341-346, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[100] Md.
Habibullah Shakib, “Android Malware Detection Approach’s based on Genetic AI,
CNN, RNN, lSTM, GRU, and Active Learning,” SSRN,
2023.
[CrossRef] [Google Scholar] [Publisher Link]
[101]Abhishek Sujith et al., “Enhancing Android
Security: Static Analysis for Robust Protection and Resilient Defences using
Deep Learning,” 2023 7th
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)
(I-SMAC), Kirtipur, Nepal, pp. 154-159, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[102] Ghadah Aldehim et al., “Gauss-Mapping Black Widow
Optimization with Deep Extreme Learning Machine for Android Malware
Classification Model,” IEEE Access,
vol. 11, pp. 87062-87070, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[103] Wenbo Fang et al., “Comprehensive Android Malware
Detection based on Federated Learning Architecture,” IEEE Transactions on Information Forensics and Security, vol. 18,
pp. 3977-3990, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[104] A. Jyothish, Ashik Mathew, and P. Vinod,
“Effectiveness of Machine Learning based Android Malware Detectors against
Adversarial Attacks,” Cluster Computing,
vol. 27, no. 3, pp. 2549-2569, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[105] Zakaria
Sawadogo et al., “Zero-Vuln: using Deep Learning and Zero-Shot Learning
Techniques to Detect Zero-Day Android Malware,” 2023 3rd International Conference on Electrical, Computer, Communications
and Mechatronics Engineering (ICECCME), Tenerife,
Canary Islands, Spain, pp. 1-5, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[106] Santosh K.
Smmarwar, Govind P. Gupta, and Sanjay Kumar, “XAI-AMD-DL: An Explainable AI
Approach for Android Malware Detection System using Deep Learning,” 2023 IEEE World Conference on Applied
Intelligence and Computing (AIC), Sonbhadra, India, pp. 423-428, 2023.
[CrossRef] [Google Scholar] [Publisher
Link]
[107] Alejandro Martín, Raúl Lara-Cabrera, and David
Camacho, “Android Malware Detection through Hybrid Features Fusion and Ensemble
Classifiers: The AndroPYtool Framework and the Omnidroid Dataset,” Information Fusion, vol. 52, pp.
128-142, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[108] VirusShare.com, [Online]. Available: https://virusshare.com/
[109] N Anitha Devi et al., “Shap based -Android
Malware Detection using Ensemble Learning,” International
Research Journal on Advanced Science Hub, vol. 7, no. 07, pp. 673-680,
2025.
[CrossRef] [Publisher Link]
[110] C. Sruneethi, and Kotla Vandana, “Automated
Android Malware Detection using Optimal Ensemble Learning Approach for
Cybersecurity,” International Journal of
Scientific Research in Science and Technology, vol. 12, no. 3, pp. 331-334,
2025.
[CrossRef] [Publisher Link]