• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于深度学习的改进型变压器模型在车联网安卓恶意软件检测与分类中的应用

Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles.

作者信息

Almakayeel Naif

机构信息

Department of Industrial Engineering, College of Engineering, King Khalid University, 61421, Abha, Saudi Arabia.

出版信息

Sci Rep. 2024 Oct 24;14(1):25175. doi: 10.1038/s41598-024-74017-z.

DOI:10.1038/s41598-024-74017-z
PMID:39448652
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11502773/
Abstract

With the growing popularity of autonomous vehicles (AVs), confirming their safety has become a significant concern. Vehicle manufacturers have combined the Android operating system into AVs to improve consumer comfort. However, the diversity and weaknesses of the Android operating system pose substantial safety risks to AVs, as these factors can expose them to threats, namely Android malware. The advanced behaviour of multi-data source fusion in autonomous driving models has mitigated recognition accuracy and effectualness for Android malware. To efficiently counter new malware variants, novel techniques distinct from conventional methods must be utilized. Machine learning (ML) techniques cannot detect every new and complex malware variant. The deep learning (DL) model is an efficient tool for detecting various malware variants. This manuscript proposes a Deep Learning-Based Improved Transformer Model on Android Malware Detection (DLBITM-AMD) technique for Internet vehicles (IoVs). The main aim of the presented DLBITM-AMD approach is to detect Android malware effectually and accurately. The DLBITM-AMD method performs a Z-score normalization process to convert the raw data into a standard form. Then, the DLBITM-AMD approach utilizes the binary grey wolf optimization (BGWO) model to select optimum feature subsets. An improved transformer is integrated with the RNN model and softmax to enhance classification for Android malware recognition. Finally, the snake optimizer algorithm (SOA) method is employed to select the optimum parameter for the classification method. An extensive experiment of the DLBITM-AMD method is accomplished on a benchmark dataset. The performance validation of the DLBITM-AMD technique portrayed a superior accuracy value of 99.26% over existing Android malware recognition models.

摘要

随着自动驾驶汽车(AVs)越来越受欢迎,确认其安全性已成为一个重大问题。汽车制造商已将安卓操作系统集成到自动驾驶汽车中,以提高消费者的舒适度。然而,安卓操作系统的多样性和弱点给自动驾驶汽车带来了重大安全风险,因为这些因素可能使它们面临威胁,即安卓恶意软件。自动驾驶模型中多数据源融合的先进行为降低了对安卓恶意软件的识别准确性和有效性。为了有效对抗新的恶意软件变种,必须采用不同于传统方法的新技术。机器学习(ML)技术无法检测到每一个新的和复杂的恶意软件变种。深度学习(DL)模型是检测各种恶意软件变种的有效工具。本文提出了一种基于深度学习的改进变压器模型用于互联网车辆(IoVs)的安卓恶意软件检测(DLBITM-AMD)技术。所提出的DLBITM-AMD方法的主要目的是有效且准确地检测安卓恶意软件。DLBITM-AMD方法执行Z分数归一化过程,将原始数据转换为标准形式。然后,DLBITM-AMD方法利用二进制灰狼优化(BGWO)模型选择最优特征子集。一种改进的变压器与循环神经网络(RNN)模型和softmax集成,以增强对安卓恶意软件识别的分类。最后,采用蛇优化算法(SOA)方法为分类方法选择最优参数。在一个基准数据集上完成了DLBITM-AMD方法的广泛实验。DLBITM-AMD技术的性能验证显示,与现有的安卓恶意软件识别模型相比,其准确率高达99.26%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/ba74964f18f9/41598_2024_74017_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/8e75b12404e0/41598_2024_74017_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/314cd3782490/41598_2024_74017_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/616966093555/41598_2024_74017_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/fa7268ae04e3/41598_2024_74017_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/52a5ab337ee7/41598_2024_74017_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/c4f9c8c61d69/41598_2024_74017_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/6b130867e260/41598_2024_74017_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/4f15d0cd6c5d/41598_2024_74017_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/42e4bc8e898e/41598_2024_74017_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/dbb41276d4be/41598_2024_74017_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/9a883255a540/41598_2024_74017_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/d80d3fe7ebb6/41598_2024_74017_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/96f9d654825e/41598_2024_74017_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/8414ef1c99ee/41598_2024_74017_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/6af02343102e/41598_2024_74017_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/ba74964f18f9/41598_2024_74017_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/8e75b12404e0/41598_2024_74017_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/314cd3782490/41598_2024_74017_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/616966093555/41598_2024_74017_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/fa7268ae04e3/41598_2024_74017_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/52a5ab337ee7/41598_2024_74017_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/c4f9c8c61d69/41598_2024_74017_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/6b130867e260/41598_2024_74017_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/4f15d0cd6c5d/41598_2024_74017_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/42e4bc8e898e/41598_2024_74017_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/dbb41276d4be/41598_2024_74017_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/9a883255a540/41598_2024_74017_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/d80d3fe7ebb6/41598_2024_74017_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/96f9d654825e/41598_2024_74017_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/8414ef1c99ee/41598_2024_74017_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/6af02343102e/41598_2024_74017_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c54/11502773/ba74964f18f9/41598_2024_74017_Fig15_HTML.jpg

相似文献

1
Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles.基于深度学习的改进型变压器模型在车联网安卓恶意软件检测与分类中的应用
Sci Rep. 2024 Oct 24;14(1):25175. doi: 10.1038/s41598-024-74017-z.
2
Novel Multi-Classification Dynamic Detection Model for Android Malware Based on Improved Zebra Optimization Algorithm and LightGBM.基于改进斑马优化算法和LightGBM的安卓恶意软件新型多分类动态检测模型
Sensors (Basel). 2024 Sep 14;24(18):5975. doi: 10.3390/s24185975.
3
Deep Feature Extraction and Classification of Android Malware Images.安卓恶意软件图像的深度特征提取与分类。
Sensors (Basel). 2020 Dec 8;20(24):7013. doi: 10.3390/s20247013.
4
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.基于 OpCode 级函数调用图的深度学习的安卓恶意软件分类。
Sensors (Basel). 2020 Jun 29;20(13):3645. doi: 10.3390/s20133645.
5
Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism.基于集成投票机制的深度学习评估和分类混淆型 Android 恶意软件。
Sci Rep. 2023 Feb 22;13(1):3093. doi: 10.1038/s41598-023-30028-w.
6
AMDDLmodel: Android smartphones malware detection using deep learning model.AMDDL 模型:基于深度学习模型的安卓智能手机恶意软件检测。
PLoS One. 2024 Jan 19;19(1):e0296722. doi: 10.1371/journal.pone.0296722. eCollection 2024.
7
FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification.FedHGCDroid:用于保护隐私的安卓恶意软件分类的自适应多维联邦学习
Entropy (Basel). 2022 Jul 1;24(7):919. doi: 10.3390/e24070919.
8
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.通过K近邻算法检测物联网中的安卓恶意软件。
Sensors (Basel). 2023 Aug 18;23(16):7256. doi: 10.3390/s23167256.
9
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
10
A Modified ResNeXt for Android Malware Identification and Classification.一种用于 Android 恶意软件识别和分类的改进型 ResNeXt。
Comput Intell Neurosci. 2022 May 20;2022:8634784. doi: 10.1155/2022/8634784. eCollection 2022.

引用本文的文献

1
Enhancing the Distinguishability of Minor Fluctuations in Time Series Classification Using Graph Representation: The MFSI-TSC Framework.使用图表示增强时间序列分类中微小波动的可区分性:MFSI-TSC框架
Sensors (Basel). 2025 Jul 29;25(15):4672. doi: 10.3390/s25154672.
2
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms.基于深度学习的可解释人工智能与优化算法的车联网(IoV)两阶段恶意软件检测模型
Sci Rep. 2025 Jul 1;15(1):20615. doi: 10.1038/s41598-025-00269-y.

本文引用的文献

1
Advanced CKD detection through optimized metaheuristic modeling in healthcare informatics.通过医疗信息学中的优化元启发式建模进行先进的慢性肾脏病检测。
Sci Rep. 2024 Jun 1;14(1):12601. doi: 10.1038/s41598-024-63292-5.
2
A Multi-Layer Intrusion Detection System for SOME/IP-Based In-Vehicle Network.基于 SOME/IP 的车载网络多层入侵检测系统
Sensors (Basel). 2023 Apr 28;23(9):4376. doi: 10.3390/s23094376.