Reassessing feature-based Android malware detection in a contemporary context
Table 10
Result comparison between Jung et al. [25] and our reimplementation, showing the performance of models trained just using the top 50 API calls found in malware and the top 50 API calls found in benign software.