Mathematics 09 02880 v2
Mathematics 09 02880 v2
Article
Fuzzy Integral-Based Multi-Classifiers Ensemble for Android
Malware Classification
Altyeb Taha * , Omar Barukab and Sharaf Malebary
Abstract: One of the most commonly used operating systems for smartphones is Android. The
open-source nature of the Android operating system and the ability to include third-party Android
apps from various markets has led to potential threats to user privacy. Malware developers use
sophisticated methods that are intentionally designed to bypass the security checks currently used in
smartphones. This makes effective detection of Android malware apps a difficult problem and im-
portant issue. This paper proposes a novel fuzzy integral-based multi-classifier ensemble to improve
the accuracy of Android malware classification. The proposed approach utilizes the Choquet fuzzy
integral as an aggregation function for the purpose of combining and integrating the classification
results of several classifiers such as XGBoost, Random Forest, Decision Tree, AdaBoost, and Light-
GBM. Moreover, the proposed approach utilizes an adaptive fuzzy measure to consider the dynamic
nature of the data in each classifier and the consistency and coalescence between each possible subset
of classifiers. This enables the proposed approach to aggregate the classification results from the
multiple classifiers. The experimental results using the dataset, consisting of 9476 Android goodware
apps and 5560 malware Android apps, show that the proposed approach for Android malware
classification based on the Choquet fuzzy integral technique outperforms the single classifiers and
Citation: Taha, A.; Barukab, O.; achieves the highest accuracy of 95.08%.
Malebary, S. Fuzzy Integral-Based
Multi-Classifiers Ensemble for
Keywords: Android malware classification; ensemble learning; choquet fuzzy integral
Android Malware Classification.
Mathematics 2021, 9, 2880. https://
doi.org/10.3390/math9222880
1. Introduction
Academic Editor: Abeer Alsadoon
The use of smartphones is continuously increasing in many aspects of our daily lives.
Received: 1 October 2021 Users are used to storing a considerable amount of their private information on their smart-
Accepted: 9 November 2021 phones. Smartphones are equipped with many sensors that collect valuable information
Published: 12 November 2021 about the user, such as gestures, locations, video, and audio data. The availability of this
important information in the smartphones motivates the malware developers and attackers
Publisher’s Note: MDPI stays neutral to penetrate the smartphones and steal the private information of the users. The number of
with regard to jurisdictional claims in smartphone users has increased rapidly in the past few years. Currently, Android is the
published maps and institutional affil- most widely used smartphone operating system in the world, dominating 70.69% of the
iations. market share as of April 2020. [1].
Recent studies suggest that the number of Android apps has increased in recent
years due to the open-source nature of Android and the popularity of Android-based
smartphones. Moreover, Android-based smartphones have become a widely used control
Copyright: © 2021 by the authors. system for the Internet of Things (IoT) [1]. Based on studies by Statista [2], the number of
Licensee MDPI, Basel, Switzerland. Android apps has grown rapidly since December 2009, and the current number of Android
This article is an open access article apps existing on Google Play Store in 2020 has reached 2.96 million apps after exceeding 1
distributed under the terms and million apps in July 2013. This increase in the number of Android apps is due to the key
conditions of the Creative Commons features of Android such as open source nature and ease of use. Privacy issues arose that
Attribution (CC BY) license (https:// are of concern to both businesses and users. This is because malware developers intend to
creativecommons.org/licenses/by/ deceive users with apps that appear to be useful but have unnoticed malicious intentions.
4.0/).
According to GDATA [3], security experts found more than 4.18 million malicious apps in
2019 and the average number of new Android malware is 11,500 apps per day.
Because Android allows users to download and install programs from Google Play,
the official store for Android apps, as well as several third-party markets, it has become
the most targeted platform by malware software makers. Due to the lack of effective
authentication techniques, malware developers can upload their malicious APPs to Google
Play and other third-party stores [4], and evade smartphone users by employing various
techniques such as repackaging or encryption, dynamic execution, and code obfuscation [5].
Finance charges, changes to user settings, data theft, privilege escalation, and remote control
are all examples of damage caused by malicious Android apps. Currently, malware app
developers are employing sophisticated ways to create extremely complicated programs
that may easily escape detection by the most advanced anti-malware software [6].
Machine learning approaches have been applied successfully in the field of secu-
rity [7]. Researchers offer many techniques based on machine learning algorithms to
identify Android malware apps, which are divided into two categories: static and dynamic
analysis [8]. Static analysis can identify malware by extracting significant features from
the APK without executing it and using these features to differentiate between malware
and goodware applications. In [9–11], the authors used static analysis to obtain the app’s
key features, such as the required permissions. Compared with dynamic analysis, static
analysis can detect malware quickly and prevent it from being installed. The identification
of more complex Android malware apps that employ polymorphism, code obfuscation,
and repackage methods is a problem for static analysis. Dynamic analysis is based on
installing and executing Android applications in an environment and tracing their ex-
ecution or behavior [12]. DroidDolphin [13], Crowdroid [14], and DroidWard [15] use
dynamic analysis to screen runtime activities such as system calls and API calls and utilize
supervised learning algorithms to distinguish between malware and goodware apps.
Because the success of a single classifier is dependent to some extent on the Android
app’s unique characteristics, it has inherent individual uncertainty and limitations. When
compared with a single classifier, the combination of classifiers has the benefit of minimiz-
ing the variation of estimated error and improving classification performance. Ensemble
learning is a machine learning approach that uses many learning algorithms rather than
a single algorithm to generate a single optimal prediction model; it has shown to be an
effective solution in a variety of disciplines. Ensemble learning approaches have been
shown empirically and theoretically to outperform single weak methods, particularly
when dealing with complicated, high-dimensional prediction problems [16]. Bagging [17],
Boosting [18], and Stacking [19] are the most often used ensemble learning methods. Stack-
ing is a fusion approach that combines many machine learning algorithms (base models)
structured in at least one layer and then employs another machine learning algorithm (meta
model) to achieve higher classification performance than any of its basic algorithms [20].
In [21,22], the authors collected a large number of significant features and strings from
Android APK files and used these features to create multiple ensemble machine learning
techniques to identify Android malware apps.
There are intrinsic interactions between several basic classifiers; these interactions
might be positive synergy in nature, in which case the basic classifiers collaborate and
strengthen one another. The ensemble system may use the strengths of the different clas-
sifiers and overcome their weaknesses to attain a better level of accuracy than any single
classifier. The fuzzy integral has the advantages of characterizing the significance of basic
classifiers by fuzzy measure and modeling the coalitions and interactions among every
possible coalition (subset) of classifiers. This study presents a multi-classifier ensemble
based on fuzzy integrals to enhance the accuracy of Android malware classification. The
proposed method employs Choquet fuzzy integral as an aggregation function to fuse the
prediction results of multiple classifiers, including XGBoost, Random forest, Decision tree,
AdaBoost, and LightGBM, by taking into account both the significance of each classifier
as well as the consistency and coalition among each possible subset of classifiers based
Mathematics 2021, 9, 2880 3 of 18
on adaptive fuzzy measures. The proposed approach is able to aggregate more meaning-
ful prediction results from multiple classifiers using the adaptive fuzzy measures. The
following are the primary contributions of the suggested approach:
- Proposes a novel fuzzy integral based multi-classifiers ensemble for Android malware
classification. The proposed approach has the capability of aggregating the classifica-
tion results from multiple classifiers by taking into account both the significance of
each classifier as well as the consistency and coalition among each possible subset of
classifiers based on fuzzy measures.
- For successful detection of Android malware apps, the proposed approach presents
an adaptive fuzzy measure based on dynamic data in single classifiers and consistency
and coalition among each potential subset of classifiers.
- The proposed approach’s performance was evaluated through a series of experi-
ments, and the results indicate that it outperforms both individual classifiers and
other approaches.
The rest of the paper is organized as follows. Section 2 presents the related work on
Android malware detection. Section 3 presents the fuzzy measures and Choquet integral.
Section 4 explains the proposed approach for Android malware classification. Results and
discussion are illustrated in Section 5. Section 6 concludes this paper.
2. Related Work
With the number of Android malware apps growing fast, several researchers have pro-
posed approaches based on machine learning techniques for the classification of Android
malware apps.
Arp et al. [22] developed an app called “Drebin” for detecting Android malware
apps. They used the API calls, Android permissions, and network addresses as features
to differentiate between goodware and malware apps. Their experimental results were
based on a dataset consisting of 5560 malware apps and 123,453 goodware apps from
numerous app markets. Drebin achieved classification accuracy of 94% and a false positive
rate of 1%. Firdaus et al. [23] presented an approach for Android malware apps detection
based on features investigation. The features include Android permissions and directory
paths. They used three machine learning algorithms: voted perceptron (VP), radial basis
function network (RBFN), and multilayer perceptron (MLP) in the conducted experiments
based on Drebin and AndroZoo [24] datasets. Their proposed approach based on MLP
achieved detection accuracy of 90% and true positive rate of 87%. Hu et al. [25] presented
an approach using an ensemble learning classifier with the feature selection algorithm, a
sliding window is utilized inside the ensemble classifier. Zhang et al. [26] presented a new
approach using the Markov blanket for feature selection, SVM is employed for classification
of Android malware apps, and Drebin dataset is used in their experimental results.
Coronado-De-Alba et al. [27] suggested an ensemble-learning approach for Android
malware detection. They used a dataset consisting of 1531 malware and 1531 goodware
apps; the malware apps were selected from the Drebin dataset [22], and the goodware
samples were obtained from the Google Play Store. They used two features selection
algorithms, RELIEF and Chi-squared, and the Random Forest algorithm for the detection
of Android malware. Peiravian and Zhu [28] introduced a machine-learning-based model
for Android malware detection. They used Android app permission and API calls as main
features to distinguish between goodware and malware apps.
Wang et al. [29] utilized Decision Tree, Linear SVM, Logistic regression, and Random
forest for malware apps detection-based static analysis. They used the apps static features
for machine learning training. Based on the experimental results, their proposed approach
detects malware apps with false positive rate of 0.06% using the Logistic Regression
algorithm based on a dataset containing 217,619 goodware and 18,363 malware apps.
Talha et al. [30] suggested a classification approach based on permissions “APK Auditor”
to categorize the Android apps as goodware or malware which achieved 88% accuracy with
Mathematics 2021, 9, 2880 4 of 18
a specificity of 0.925. They used a dataset consisting of 8762 apps including 1853 goodware
apps and 6909 malware apps.
DroidDolphin [13] is a dynamic analysis approach that uses machine learning to
classify Android malware. It analyzes Android apps based on obtaining the apps details
from API calls and activities by running the apps on virtual environments and attained a
precision of 86.1% using the SVM algorithm. Milosevic et al. [31] proposed an Android
malware classifier based on the ensemble learning model. They used Android permissions
and source-code-based features. The ensemble classifier used contained linear regression,
Decision Trees, SVM, C.45, Random Tree, and Random Forests algorithms.
In our previous research [32], we proposed a hybrid approach for the classification
of Android malware by integrating the fuzzy C-means clustering (FCM) algorithm with
the light gradient boosting machine (LightGBM). FCM is used to cluster the Android
permissions, while LightGBM is utilized to classify the Android apps based on the app’s
permissions and their clusters resulting from FCM. Using a widely used dataset consisting
of benign and malware Android apps, the experimental results show that the suggested
approach attained an accuracy of 94.63%.
In our previous research [9], we suggested an evolving hybrid neuro-fuzzy classifier
(EHNFC) for Android malware classification using permission-based features. We adapted
the evolving clustering algorithm to incorporate an adaptive method for updating the radii
and centers of clustered permission-based features. The results show that the proposed
method classifies Android malware with an accuracy of 90%. In our previous research [10],
we introduced an approach for Android malware classification using the adaptive neuro
fuzzy inference systems (ANFIS), an information gain method utilized to choose the
important Android permissions. The proposed method attained an accuracy of 75%.
In our previous research [11], we introduced an adaptive neuro-fuzzy inference system
with fuzzy c-means clustering (FCM-ANFIS) for Android malware classification. The ex-
perimental results show that a classification accuracy of 91% was achieved by the proposed
method. Table 1 summarizes the discussed related works.
Table 1. Cont.
Definition 1. Suppose C is a finite set of machine learning algorithms, the discrete fuzzy measure
on C is the mapping:
P(C)→[0, 1], adhering to the requirements below:
(1) µ (Ø) = 0, l(C) = 1 (requirements limits).
(2) If A, B ∈ P(C) and A ⊂ Z then µ (A) ≤ µ (B) (monotonicity).
where µ (S) represents the score of the importance of classifier set S. Therefore, weights on
any classifiers combination are also considered as well as the standard weights of each classifier
taken independently.
Because the independency of one classifier from another is not necessary in the fuzzy
integral model, it can be utilized in many non-linear situations. The overall evaluation of
all possible solutions can be obtained by the fuzzy integral of f with respect to µ. In the
Mathematics 2021, 9, 2880 6 of 18
case of independent classifiers, the fuzzy measure is additive, and the Choquet integral
matches with the weighted arithmetic mean approach. Thus,
n
CHµ ( f ) = ∑ fi µ({i}) (2)
i =1
A Choquet integral is an approach of collection that takes into account both the
significance of a classifier and its relations with various classifiers [40]. Suppose G, M ⊂ X
and G ⊂ M = Ø, g are known as a λ-fuzzy measure when the following condition is satisfied:
For the relations between G and M, if λ > 0, then the multiplicative effect exists; if
λ < 0, then the substitutive effect exists. λ = 0 shows that G and M are unrelated [41].
Let gi represent the fuzzy density based on the Choquet fuzzy integral, g(A j ) is
attained by λ and g j as
" #
1
∏
g A j = g j + g A j+1 + λg j g A j+1 = (1 + λgi ) − 1 (4)
λ i = j···n
In [42], it was proved that for a fixed set of µj, 0 < µj < 1, there exists a unique root of
λ > −1, and λ 6= 0, using Equation (5). In addition, from Equation (5) it can also be seen
that if the values of µj are known, then λ can be calculated.
The information gain ratio (IGR) technique [43] is applied to select the essential
features for Android malware classification. The IGR technique depends on finding the
relationships between the features of an Android app and then calculating and scoring each
feature individually. The information gain is utilized to select the important Android apps’
permissions in the suggested approach because of its high efficiency and fast computing.
Based on the class (malware or goodware), it assesses the best Android permissions.
Figure 2 displays examples for the features employed in the proposed model and their
information gain ranks. The information gain ranks for the chosen permissions are reflected
in the horizontal axis.
data size is big or small. This method has been successfully applied in classification and
prediction approaches.
4.2.4. AdaBoost
Freund and Schapire [47] have proposed AdaBoost, which provides a majority vote
over many classifiers. AdaBoost has become one of the most important and powerful
classification algorithms in many applications due to its low implementation complexity,
high performance, and strong generalization capabilities.
4.2.5. LightGBM
LightGBM is a new GBDT (gradient boosting decision tree) algorithm, suggested by
Ke and colleagues in 2017, which has been successfully utilized in several types of data
mining operations, such as regression and classification [48]. The LightGBM algorithm
includes two novel methods: the gradient-based one-side sampling and the exclusive
feature bundling.
Mathematics 2021, 9, 2880 9 of 18
Classifier Parameters
Objective = regression, metric = rmse, num_leaves = 80, learning_rate = 0.09, bagging_fraction = 0.7,
LightGBM
feature_fraction = 0.7, bagging_frequency = 5, bagging_seed = 2018, verbosity = 1
Random Forest n_estimators = 50 and random_state = 1
XGBoost random_state = 1 and learning_rate = 0.01
AdaBoost n_estimators = 100
Decision Tree max_depth = 5, min_samples_leaf = 4
Figure 3. Confusion
Figure3. Confusion matrix
matrix for
for aa two-class
two-classproblem.
problem.
The confusion matrices are beneficial tools to check the errors that the classifiers are
making. Suppose 𝐶𝑀 is the confusion matrix of classifier c :
n n ⋯ n
⎡ ⎤
CM = ⎢ n n ⋯ n ⎥ (6)
⎢ ⋯ ⋯ ⋯ ⋯ ⎥
⎣n n ⋯ n ⎦
where i = j, n indicates the number of Android apps belonging to class type T and are
correctly classified by the classifier c as class T . On the other hand, i ≠ j, n denotes
Mathematics 2021, 9, 2880 10 of 18
The confusion matrices are beneficial tools to check the errors that the classifiers are
making. Suppose CMk is the confusion matrix of classifier ck :
where i = j, nkij indicates the number of Android apps belonging to class type TM and are
correctly classified by the classifier ck as class TM . On the other hand, i 6= j, nkij denotes the
number of Android apps with class type TM but are incorrectly classified as class TB by
classifier ck .
As the circumstances between the classification results and training cannot be very
consistent, the fuzzy measure must be adaptively adjusted to appropriately cope with the
classification situation. However, after the classifiers training stage, the generated confusion
matrix will be fixed. Consequently, if the Android malware classifier is constructed based
on the static prior fuzzy density, then the classification accuracy of the fusion classifier may
be decreased. It is logical to fine tune the fuzzy measure based on the adaptive details in
the single classifier outputs.
To tune the fuzzy measure, two issues were considered: firstly, the confidence of classi-
fication results for each classifier, and secondly, the consistency between the classifications
results for each classifier. For the confidence of each single classifier result, we considered
the confidence improvement factor that is represented by α, which reduces the importance
of the classifier when the confidence of the classifier results is less significant [49]. For the
consistency between the classifier results, we considered the consistency improvement
factor, which is represented by β. It reduces the significance of the classifier when the
consistency of the classifier results is less important.
From the confusion matrix, a number of class-wise measures are obtained such as
accuracy, precision, recall, and F1-score. In this study, the performance, P, of classifier i is
evaluated by considering the two classes simultaneously using the accuracy measure:
For a given Android app, the classification performance by classifier i is
TP + TN
Pi = (7)
TP + TN + FP + FN
Let K ⊆ N denote a subset of classifiers with Pk being the performance of classifier K
for each I {1,2, . . . , n}. Then µi is the mean performance of classifiers S ⊆ N with |S| = i
1
µi = ∑ PS
D S⊆N,
(8)
|S|=i
n
where D = denotes the number of sets in the level i of measure and µ0 = 0. The
i
confidence improvement factor α and consistency improvement factor β of classifier ck for
the Android app ai are represented as follows:
For single classifiers, the confidence improvement factor is
αi = pi (9)
The confidence improvement factor and consistency improvement factor for a sub set
of classifiers are calculated using Equations (10) and (11), respectively, in order to consider
the diversity between classifiers:
1 tanh(100 ∗ ( Pi − µi ))
αi = + (10)
n 2n
Mathematics 2021, 9, 2880 11 of 18
k
βki = ∏ γki (11)
i =1
where the γki denote the consistency between the classification results from classifier k and
the classification result from classifier i. Assume classifier k divides the Android app ai as
malware app (X) while classifier i classifies the Android app ai as a goodware app (Y), then
the γki is calculated as follows:
1 − (skX − SiX ) X 6= Y
γki = (12)
1 X=Y
gi = αi ∗ βki (13)
To classify the Android apps using the Choquet fuzzy integral, we used steps in
Figure 4.
Table 3. Classification of Android Apps using individual classifiers, the Choquet fuzzy integral, and arithmetic mean.
^ ^
Android Apps XGBoost Random Forest Decision Tree AdaBoost Light-GBM Actual yC yµ
App1 0.1944 0.0033 0.0032 0.4870 0 0 0 0
App2 0.7831 0.9936 0.9930 0.5072 0.9920 1 1 1
App3 0.2605 0.1132 0.1135 0.4959 0.1135 0 0 0
App4 0 0.2605 0.4984 0.6121 1 1 1 0
App5 0.1944 0.0033 0.0032 0.4870 0.0034 0 0 0
App6 0.6965 0.8627 0.8628 0.5049 0.8606 1 1 1
App7 0.1944 0.0033 0.0032 0.4870 0 0 0 0
App8 0.7831 0.9858 0.9873 0.5133 0.9877 1 1 1
App9 0.7831 0.9858 0.9873 0.5133 0.9877 1 1 1
App10 0.6965 0.8627 0.8628 0.5049 0.8606 1 1 1
To build the fuzzy measures, we iterated through all the probable sets of classifiers
and calculated their performance. The performance of a set of classifiers is computed using
the arithmetic mean of the classification results for the classifiers in the set. Then, each
Android app is classified as malware or goodware app by selecting the class that belongs
to the greatest aggregated output. Lastly, the performance of the classifier(s) is provided by
comparing the classification results of the sub-ensemble with the actual results. Table 4
shows the performances of the single and all possible sets of classifiers.
Considering the data in Table 4 and Equation (12), we can construct the fuzzy measure
for the single classifiers and all the possible sets of classifiers as shown in Figure 5.
After constructing the fuzzy measure as shown in Figure 5, we can classify each
Android application as malware or goodware using the Choquet integral. For example, we
will consider the process of classifying the fourth Android app in Table 3. The probabilities
of App4 belonging to malware class given by each classifier are PC1 (y = 1|App4) = 0.0000,
PC2 (y = 1|App4) = 0.2605, PC3 (y = 1|App4) = 0.4984, PC4 (y = 1|App4) = 0.6121and PC5
(y = 1|App4) = 1.0000. Since PC3 (y = 1|App4) < PC1 (y = 1|App4) < PC2 (y = 1|App4)
< PC4 (y = 1|App4) < PC5 (y = 1|App4), and the coefficients of the fuzzy measures that
are significant for the classification of App4 are m({C1,C2, C3, C4,C5}), m({C1,C2, C3, C4}),
m({C4, C2, C5}), m({C2, C4}), and m({C2}) (see blue path in Figure 2). Thus, the aggregation
of scores for malware class is given by:
Cm(0.0000, 0.2605, 0.4984, 0.6121, 1.0000) = 0.0000 * m({ C1,C2, C3, C4,C5})+ (0.2605 −
0.0000)* m({ C1,C2, C3, C4}) + (0.4984- 0.2605)* m({C4, C2, C5}) + (0.612172 − 0.498429)*
Mathematics 2021, 9, 2880 13 of 18
m({C2, C4}) + 1.0000* m({C2}) = 0.0000 *(1) + (0.2605 − 0.0000) *(0.8624)+ (0.4984 −
0.2605)*(0.6698)+ (0.612172 − 0.498429) * (0.4268) + (1 − 0.612172) * (0.9495) = 0.8008.
Since 0.8008 > 0.5, the proposed approach classifies the fourth Android app as a malware
app. The fuzzy measures utilized in the classification of the fourth Android app are illus-
trated by the blue paths in Figure 5. However, if the arithmetic mean is considered for the
classification of the fourth Android app, the result would be (0 + 0.260513 + 0.498429 +
0.612172 + 1)/5 = 0.4742, and since 0.4742 < 0.5, the classification result would be goodware
app, which is an incorrect classification result. Noticing that the true class label for the
fourth Android app is 1, the proposed approach correctly classified the fourth Android
app, due to its ability to consider the interactions among classifiers.
Table 4. Classification performance of single classifier and all possible sets of classifiers.
Figure 5. The fuzzy measure values of single classifiers and all possible sets of classifiers. The fuzzy measures utilized in
the classification of the fourth Android app are illustrated by the blue paths.
Table 5. Performance comparison between the proposed approach and other approaches.
The AUC is an important and useful evaluation of the overall performance [50]. An
AUC with a high score indicates greater classification performance. As shown in Figure 7,
the proposed approach achieved the highest AUC value of 95.0%, which demonstrates
the ability of the proposed approach to differentiate between Android malware and good-
ware apps.
Figure 7. AUC curves for the proposed approach compared with other approaches.
6. Conclusions
Android malware’s continual growth poses a significant threat to the security of
sensitive data and the privacy of smartphone users. It is critical to develop effective and fast
methods for distinguishing Android malicious applications from legitimate applications.
Android malware classification techniques based on multiple classifier fusion have been
a growing trend in this field. This paper proposed a multi-classifier ensemble based
on fuzzy integrals for detecting Android malware. The suggested technique combines
and integrates the classification results of several classifiers, including XGBoost, Random
Forest, Decision Tree, AdaBoost, and LightGBM, using the Choquet fuzzy integral as an
aggregation function. The suggested approach can inherit the advantages of basic classifiers
while avoiding their drawbacks. Additionally, the suggested technique is capable of taking
into account classifier interactions. The experimental results indicate that combining
several classifiers based on the Choquet fuzzy integers outperforms individual classifiers
and achieves the highest accuracy of 95.08%. The limitation of the proposed approach is its
inability to detect obfuscated Android malware apps. For future work, we aim to explore
more advanced Android malware apps’ features and techniques for integrating multiple
classifiers to classify the Android malware apps.
References
1. Niu, W.; Cao, R.; Zhang, X.; Ding, K.; Zhang, K.; Li, T. OpCode-level function call graph based android malware classification
using deep learning. Sensors 2020, 20, 3645. [CrossRef] [PubMed]
2. Statista. 2019. Available online: https://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-
play-store (accessed on 13 June 2021).
Mathematics 2021, 9, 2880 17 of 18
32. Taha, A.A.; Malebary, S.J. Hybrid classification of Android malware based on fuzzy clustering and the gradient boosting machine.
Neural Comput. Appl. 2020, 33, 6721–6732. [CrossRef]
33. Awan, M.J.; Masood, O.A.; Mohammed, M.A.; Yasin, A.; Zain, A.M.; Damaševičius, R.; Abdulkareem, K.H. Image-Based Malware
Classification Using VGG19 Network and Spatial Convolutional Attention. Electronics 2021, 10, 2444. [CrossRef]
34. Hemalatha, J.; Roseline, S.A.; Geetha, S.; Kadry, S.; Damaševičius, R. An efficient DenseNet-based deep learning model for
malware detection. Entropy 2021, 23, 344. [CrossRef]
35. Nisa, M.; Shah, J.H.; Kanwal, S.; Raza, M.; Khan, M.A.; Damaševičius, R.; Blažauskas, T. Hybrid malware classification method
using segmentation-based fractal texture analysis and deep convolution neural network features. Appl. Sci. 2020, 10, 4966.
[CrossRef]
36. Choquet, G. Theory of Capacities. Ann. Inst. Fourier 1954, 5, 131–295. [CrossRef]
37. Höhle, U. Integration with Respect to Fuzzy Measures. In Proceedings of the IFAC Symposium on Theory and Applications of
Digital Control, New Delhi, India, 5–7 January 1982; pp. 35–37.
38. Murofushi, T.; Sugeno, M. A theory of fuzzy measures: Representations, the Choquet integral, and null sets. J. Math. Anal. Appl.
1991, 159, 532–549. [CrossRef]
39. Murofushi, T.; Sugeno, M. An interpretation of fuzzy measures and the Choquet integral as an integral with respect to a fuzzy
measure. Fuzzy Sets Syst. 1989, 29, 201–227. [CrossRef]
40. Li, X.; Wang, F.; Chen, X. Support Vector Machine Ensemble Based on Choquet Integral for Financial Distress Prediction. Int. J.
Pattern Recognit. Artif. Intell. 2015, 29. [CrossRef]
41. Chiou, H.-K.; Tzeng, G.-H. Fuzzy Multiple-Criteria Decision-Making Approach for Industrial Green Engineering. Environ. Manag.
2002, 30, 816–830. [CrossRef]
42. Tahani, H.; Keller, J.M. Information fusion in computer vision using the fuzzy integral. IEEE Trans. Syst. Man Cyber. 1990, 733, 741.
[CrossRef]
43. Mori, T. Information Gain Ratio as Term Weight: The Case of Summarization of Ir Results. In Proceedings of the COLING 2002,
The 19th International Conference on Computational Linguistics, Taipei, Taiwan, 26–30 August 2002.
44. Chen, T.; Guestrin, C. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd ACM S International Conference on
Knowledge Discovery and Data Mining, New York, NY, USA, 13–17 August 2016; pp. 785–794.
45. Breiman, L. Random forests. Mach. Learn. 2001, 45, 5–32. [CrossRef]
46. Breiman, L.; Friedman, J.H.; Olshen, R.A.; Stone, C.J. Classification and Regression Trees; Routledge: London, UK, 2017.
47. Freund, Y.; Schapire, R.E. A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput.
Syst. Sci. 1997, 55, 119–139. [CrossRef]
48. Ke, G.; Meng, Q.; Finley, T.; Wang, T.; Chen, W.; Ma, W.; Ye, Q.; Liu, T.Y. Lightgbm: A highly efficient gradient boosting decision
tree. Adv. Neural Inf. Process. Syst. 2017, 30, 3146–3154.
49. Chibelushi, C.; Deravi, F.; Mason, J. Adaptive classifier integration for robust pattern recognition. IEEE Trans. Syst. Man Cybern.
Part B 1999, 29, 902–907. [CrossRef] [PubMed]
50. Dal Pozzolo, A.; Caelen, O.; Le Borgne, Y.-A.; Waterschoot, S.; Bontempi, G. Learned lessons in credit card fraud detection from a
practitioner perspective. Expert Syst. Appl. 2014, 41, 4915–4928. [CrossRef]
51. Salah, A.; Shalabi, E.; Khedr, W. A lightweight android malware classifier using novel feature selection methods. Symmetry 2020,
12, 858. [CrossRef]
52. Yerima, S.Y.; Sezer, S.; McWilliams, G. Analysis of Bayesian classification-based approaches for Android malware detection. IET
Inf. Secur. 2013, 8, 25–36. [CrossRef]
53. Sanz, B.; Santos, I.; Laorden, C.; Ugarte-Pedrero, X.; Bringas, P.G.; Álvarez, G. Puma: Permission Usage to Detect Malware in
Android. In International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions; Springer: Berlin/Heidelberg, Germany,
2013; pp. 289–298.