Complexity / 2019 / Article / Tab 2

Research Article

Delving into Android Malware Families with a Novel Neural Projection Method

Table 2

Summary table of DT results: minimum depth of decision nodes for each one of the original features.

DevianceGiniTwoing
IDFeatureStandardCurvatureInteraction curvatureStandardCurvatureInteraction curvatureStandardCurvatureInteraction curvatureAverage

1Repackaging1241261242.56
5BOOT2334322332.78
18Encrypted424423.20
9USB63534634.29
3Drive-by Download5542565544.56
24SMS43510363354.67
26User Account6183186184.67
2Update5742635744.78
19NET6289234284.89
6SMS3658733645.00
10PKG65454655.00
22SMS36410643645.11
4Standalone510339351035.67
8CALL4748475.67
11BATT49545495.71
16Ginger Break66.00
15RATC/Zimperlich6819987816.33
7NET58610925866.56
14Exploid5869665866.56
17Asroot74711498476.78
23Block SMS3859994866.78
25Phone Number211212121121127.22
12SYS51061011751067.78
21Phone Call49121374957.88
13MAIN61171012161177.89
20SMS1089.00

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.