Reassessing feature-based Android malware detection in a contemporary context
Table 5
Result comparison between Rathore et al. [18] and our reimplementation, showing the effect of model choice for permissions-based models, and the most effective feature selection method for reducing the number of permissions for each ML model type.