[1] Statista.com, "Number of Smartphone Mobile Network Subscriptions Worldwide from 2016 to 2023,with Forecasts from 2023 to 2028," [Online], Available: http://statista.com/statistics/330695/number-of-smartphone-users-worldwide/.
[2] Statista.com, "Market Share of Mobile Operating Systems Worldwide from 2009 to 2025, by Quarter,"[Online], Available: https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/.
[3] Statista.com, " Number of Available Apps in the Google Play Store from 2nd Quarter 2015 to 2nd Quarter2024," [Online], Available: https://www.statista.com/statistics/289418/number-of-available-apps-in-the-google-play-store-quarter/.
[4] Businessofapps, "App Downloads Data (2025)," https://www.businessofapps.com/data/app-statistics/.
[5] J. M. Arif, M. F. Ab Razak et al., "A. Android Mobile Malware Detection Using Fuzzy AHP," Journal ofInformation Security and Applications, vol. 61, p. 102929, 2021.
[6] Securelist.com, "IT Threat Evolution in Q2 2024-Mobile Statistics," [Online], Available:https://securelist.com/it-threat-evolution-q2-2024-mobile-statistics/113678/.
[7] Ö. A. Aslan and R. Samet, "A Comprehensive Review on Malware Detection Approaches," IEEE Access,vol. 8, pp. 6249-6271, 2020.
[8] S. Aurangzeb and M. Aleem, "Evaluation and Classification of Obfuscated Android Malware throughDeep Learning Using Ensemble Voting Mechanism," Scientific Reports, vol. 13, p. 3093, 2023.
[9] V. Rastogi et al., "Catch Me If You Can: Evaluating Android Anti-malware against TransformationAttacks," IEEE Trans on Information Forensics and Security, vol. 9, no. 1, pp. 99–108, 2013.
[10] P. Kotzias, J. Caballero and L. Bilge, "How Did that Get in My Phone? Unwanted App Distribution onAndroid Devices," Proc. of 2021 IEEE Symposium on Security and Privacy (SP2001), pp. 53-69, 2021.
[11] M. M. Alani, "Android Users Privacy Awareness Survey," Int. Journal of Interactive MobileTechnologies, vol. 11, no. 3, 2017.
[12] A. Wajahat et al., "Outsmarting Android Malware with Cutting-edge Feature Engineering and MachineLearning Techniques," Computers, Materials & Continua, vol. 79, no. 1, pp. 651, 2024.
[13] W. Wang, M. Zhao and J. Wang, "Effective Android Malware Detection with a Hybrid Model Based onDeep Autoencoder and Convolutional Neural Network," Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 8, pp.3035-3043, 2019.
[14] S. I. Imtiaz et al., "DeepAMD: Detection and Identification of Android Malware Using High-efficientDeep Artificial Neural Network," Future Generation Computer Systems, vol. 115, pp. 844-856, 2021.
[15] M. K. Alzaylaee, Y. Y. Suleiman and S, Sakir, "DL-Droid: Deep Learning-based Android MalwareDetection Using Real Devices," Computers & Security, vol. 89, p.101663, 2020.
[16] A. Dahiya, S. Sukhdip and S. Gulshan, "Android Malware Analysis and Detection: A SystematicReview," Expert Systems, vol.42, no. 1, p. e13488, 2025.
[17] G. D’Angelo et al., "Privacy-preserving Malware Detection in Android-based IoT Devices throughFederated Markov Chains," Future Generation Computer Systems, vol. 148, pp. 93-105, 2023.
[18] S. Kumar, A. Prachi and J. Sahni, "IOT Malware Detection Using Static and Dynamic AnalysisTechniques: A Systematic Literature Review," Security and Privacy, vol. 7, no. 6, p. e444, 2024.
[19] S. Sehrawat and D. D. Singh, "Malware and Malware Detection Techniques: A Survey, " Int. Journal forResearch in Applied Science and Engineering Technology, vol. 10, no. 5, pp. 3947–3953, 2022.
[20] B. McMahan, E. Moorem et al., "Communication-efficient Learning of Deep Networks fromDecentralized Data," Artificial Intelligence and Statistics (PMLR), vol. 54, pp. 1273-1282, 2017.
[21] A. Pathak et al., "Static Analysis Framework for Permission-based Dataset Generation and AndroidMalware Detection Using Machine Learning," EURASIP J. on Infor. Sec., vol. 2024, Art. no. 33, 2024.
[22] D. Soi et al., "Enhancing Android Malware Detection Explainability through Function Call GraphAPIs," Journal of Information Security and Applications, vol. 80, p. 103691, 2024.
[23] M. Vu Minh et al., "A Static Method for Detecting Android Malware Based on Directed API Call," Int.Journal of Web Information Systems, vol. 21, no. 3, pp. 183-204, 2025.
[24] P. Sivaprakash et al., "Autonomous Android Malware Detection System Based on Static Analysis," Proc.of the 2024 IEEE Int. Conf. on Integration of Emerging Technologies for the Digital World (ICIETDW), pp. 1-6, DOI: 10.1109/ICIETDW61607.2024.10939283, 2024.
[25] W. Zhao, J. Wu and Z. Meng, "Apppoet: Large Language Model-based Android Malware Detection viaMulti-view Prompt Engineering, "Expert Systems with Applications, vol. 262, p. 125546, 2025.
[26] H. Wintolo et al., "Visualization of Malware on Android Applications Using Static Analysis," Proc. ofthe 2024 IEEE Int. Conf. of Adisutjipto on Aerospace Electrical Engineering and Informatics (ICAAEEI), pp. 1-5, Yogyakarta, Indonesia, 2024.
[27] M. A. Haq and M, Khuthaylah, "Leveraging Machine Learning for Android Malware Analysis: Insightsfrom Static and Dynamic Techniques," Engineering, Technology & Applied Science Research, vol. 14, no. 4 pp. 15027–15032, 2024.
[28] S. Fallah and A. J. Bidgoly, "Benchmarking Machine Learning Algorithms for Android MalwareDetection," Jordanian J. of Computers and Inform. Tech. (JJCIT), vol. 5, no. 3, pp. 216-230, 2019.
[29] A. Boudrega, S. Benzouaoua, P. Ea, O. Salem and A. Mehaoua, "Conception of an Autonomous DynamicAnalysis System for Android Malwares," Proc. of the 2024 IEEE Asian Conf. on Communication and Networks (ASIANComNet), pp. 1-6, Bangkok, Thailand, 2024.
[30] G. Sathyadevi, J. Abishek and B. S. Shakthieiswaran, "DynaShield: Android Malware Detection UsingDynamic Analysis of Network Traffic," Proc. of the 2024 IEEE Int. Conf. on System, Computation, Automation and Networking (ICSCAN), pp. 1-6, Puducherry, India, 2024.
[31] H. Zhu et al., "A Dynamic Analysis-powered Explanation Framework for Malware Detection," IEEETrans. on Knowledge and Data Engineering, vol. 36, no. 12, pp. 7483-7496, 2024.
[32] N. Prathapaneni et al., "Dynamic Behaviour Analysis and Interpretation of Malware in Android DevicesUsing Ensemble Machine Learning," Proc. of the 2024 3rd IEEE Int. Conf. on Artificial Intelligence for Internet of Things (AIIoT), pp. 1-6, Vellore, India, 2024.
[33] G. Ciaramella, F. Mercaldo and A. Santone, "Dynamic Analysis for Explainable Fine-grained AndroidMalware Detection," Proc. of the Int. Workshop on Security and Trust Management, pp. 110-127, Part of the Book Series: Lecture Notes in Computer Science, vol. 15235, Springer, 2024.
[34] S. Lee et al., "Hybrid Dynamic Analysis for Android Malware Protected by Anti-analysis Techniqueswith DOOLDA," Journal of Internet Technology, vol. 25, no. 2, pp.195-213, 2024.
[35] A. R. Nasser, A. M. Hasan and A. J. Humaidi, "DL-AMDet: Deep Learning-based Malware Detector forAndroid," Intelligent Systems with Applications, vol. 21, p. 200318, 2024.
[36] J. Feng et al., "HGDetector: A Hybrid Android Malware Detection Method Using Network Traffic andFunction Call Graph," Alexandria Engineering Journal, vol. 114, pp. 30-45, 2025.
[37] S. Zhang et al., "MPDroid: A Multimodal Pre-training Android Malware Detection Method with Staticand Dynamic Features," Computers & Security, vol. 150, p. 104262, 2025.
[38] A, Mesbah, I. Baddari and M. A. Riahla, "LongCGDroid: Android Malware Detection throughLongitudinal Study for Machine Learning and Deep Learning," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 9, no. 4, pp. 328-346, Dec. 2023.
[39] F. Mercaldo, F. Martinelli and A. Santone, "Deep Convolutional Generative Adversarial Networks inImage-based Android Malware Detection," Computers, vol. 13, no. 6, p. 154, 2024.
[40] Bhooshan, Prashant and Nidhi Sonkar, "Comprehensive Android Malware Detection: LeveragingMachine Learning and Sandboxing Techniques through Static and Dynamic Analysis," Proc. of the 2024 IEEE 21st Int. Conf. on Mobile Ad-Hoc and Smart Systems (MASS), pp. 580-585, Seoul, Korea, 2024.
[41] A. M. AlSobeh et al., "Android Malware Detection Using Time-aware Machine LearningApproach," Cluster Computing, vol. 27, pp. 12627–12648, 2024.
[42] F. M. M. Aledam et al., "Enhanced Malware Detection for Mobile Operating Systems Using MachineLearning and Dynamic Analysis," Int. J. of Safety & Security Eng., vol. 14, no. 2, pp. 513-521, 2024.
[43] M. Waheed and S. Qadir, "Effective and Efficient Android Malware Detection and CategoryClassification Using the Enhanced KronoDroid Dataset," Security and Communication Networks, vol. 2024, Article ID 7382302, 2024.
[44] R.H. Hsu, Y.C. Wang et al., "A Privacy-preserving Federated Learning System for Android MalwareDetection Based on Edge Computing," Proc. of the 2020 15th IEEE Asia Joint Conf. on Information Security (AsiaJCIS), pp. 128-136, Taipei, Taiwan, 2020.
[45] A. Mahindru and H. Arora, " Dnndroid: Android Malware Detection Framework Based on FederatedLearning and Edge Computing," Proc. of the Int. Conf. on Advancements in Smart Computing and Information Security, Cham: Springer Nature Switzerland, vol. 17, no. 12, pp. 96-107, 2020.
[46] R. Tageri et al., "FED-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT," IEEETransactions on Industrial Informatics, vol. 17, no. 12, pp. 8442-8452, 2020.
[47] Z. Çıplak et al. "FEDetect: A Federated Learning-based Malware Detection and Classification UsingDeep Neural Network Algorithms," Arab. J. for Sci. and Eng., DOI: 10.1007/s13369-025-10043-x, 2025.
[48] M. Robnik-Šikonja and I. Kononenko, "Theoretical and Empirical Analysis of ReliefF and RReliefF,"Machine learning, vol. 53, pp. 23-69, 2003.
[49] F. Wei, Y. Li, S. Roy, X. Ou and W. Zhou, "Deep Ground Truth Analysis of Current Android Malware,"Proc. of the 14th Int. Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2017), vol. 14, pp. 252-276, 2017.
[50] S.Y. Yerima and S. Sezer, "Droidfusion: A Novel Multilevel Classifier Fusion Approach for AndroidMalware Detection," IEEE Transactions on Cybernetics, vol. 49, no. 2, pp. 453-466, 2018.
[51] F. Fleuret, "Fast Binary Feature Selection with Conditional Mutual Information," Journal of MachineLearning Research, vol. 5, pp. 1531-1555, 2004.
[52] H. Yang and J. Moody, "Data Visualization and Feature Selection: New Algorithms for Non-GaussianData," Advances in Neural Information Processing Systems, vol. 12, pp. 687-693, 1999.
[53] X. Gu et al., "A Feature Selection Algorithm Based on Equal Interval Division and Conditional MutualInformation," Neural Processing Letters, vol. 54, no. 3, pp. 2079-2105, 2022.
[54] G. Brown et al., "Conditional Likelihood Maximisation: A Unifying Framework for InformationTheoretic Feature Selection," Journal of Machine Learning Research, vol. 13, no. 1, pp. 27-66, 2012.
[55] R. Gray, "Vector Quantization, " IEEE ASSP Magazine, vol. 1, no. 2, pp. 4–29, 1984.
[56] H. J´egou, M. Douze and C. Schmid, "Product Quantization for Nearest Neighbor Search," IEEE TPAMI,vol. 33, no. 1, pp. 117–128, 2011.
[57] Y. Matsui et al., "A Survey of Product Quantization," ITE Transactions on Media Technology andApplications, vol. 6, no. 1, pp. 2-10, 2018.
[58] N. Hollmann et al., "Accurate Predictions on Small Data with a Tabular Foundation Model," Nature,vol. 637, no. 8045, pp. 319-326, 2025.
[59] A. Vaswani et al., "Attention Is All You Need," Neural Information Processing Systems, vol. 30, 2017.
[60] J. Pearl, Causality, 2nd Edn., ISBN 0-521-77362-8, Cambridge University Press, USA, 2009.
[61] S. Müller et al., "PFNs4BO: In-context Learning for Bayesian Optimization," Proc. of the Int. Conf. onMachine Learning (PMLR), pp. 25444-25470, 2023.
[62] T. Brown et al., "Language Models Are Few-shot Learners," Advances in Neural Information ProcessingSystems, vol. 33, pp. 1877–1901, Honolulu, USA, 2020.
[63] T. Fawcett, "ROC Graphs: Notes and Practical Considerations for Researchers, " Machine Learning, vol.31, no. 1, pp. 1-38, 2004.
[64] A. Wajahat et al., "Outsmarting Android Malware with Cutting-edge Feature Engineering and MachineLearning Techniques," Computers, Materials & Continua, vol. 79, no. 1, pp. 651-673, 2024.
[65] A. Wajahat et al., "An Effective Deep Learning Scheme for Android Malware Detection LeveragingPerformance Metrics and Computational Resources," Intell. Deci. Tech., vol. 18, no. 1, pp. 33-55, 2024.
[66] A. Wajahat et al., "Securing Android IoT Devices with GuardDroid Transparent and LightweightMalware Detection," Ain Shams Engineering Journal, vol. 15, no. 5, p. 102642, 2024.
[67] T. Kacem and S. Tossou, "Trandroid: An Android Mobile Threat Detection System Using TransformerNeural Networks," Electronics, vol. 14, no. 6, p. 1230, 2025.
[68] H. Shah et al., "A Comparative Analysis for Android Malware Detection Using Machine LearningModels," Proc. of the 2025 6th IEEE Int. Conf. on Mobile Computing and Sustainable Informatics (ICMCSI), pp. 1040-1047, Goathgaun, Nepal, 2025.
[69] N. G. Ambekar, S. Thokchom and S. Moulik, "TC-AMD: Android Malware Detection throughTransformer-CNN Hybrid Architecture," Proc. of the 2024 IEEE Int. Conf. on Advanced Networks and Telecommunication Systems (ANTS), pp. 1-6, Guwahati, India, 2024.
[70] T. Bhandari et al., "Unveiling Machine Learning Paradigms for Robust Malware Detection in PersonalData Security," Proc. of the 2024 6th IEEE Int. Conf. on Computational Intelligence and Communication Technologies (CCICT), pp. 226-231, Sonepat, India, 2024.
[71] J. Li and H. Liu, "Challenges of Feature Selection for Big Data Analytics," IEEE Intelligent Systems,vol. 32, no. 2, pp. 9-15, 2017.
[72] Y. Matsui, "Nano Product Quantization," [online], Available: https://github.com/matsui528/nanopq.
[73] Github.com, "TabPFN: Foundation Model for Tabular Data," [Online], Available:https://github.com/PriorLabs/TabPFN?tab=readme-ov-file.