Research Article
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain
Table 3
The detection effect of three datasets%.
| Datasets | AndMal2017 | CICMalDroid2020 | DREBIN |
| TPR | Benign | 96 | 94 | 96 | Malicious | 89 | 87 | 84 |
| F1-score | Benign | 95 | 95 | 92 | Malicious | 88 | 83 | 91 |
| Precision | Benign | 96 | 97 | 98 | Malicious | 87 | 85 | 90 |
| Accuracy | 94 | 92 | 93 |
|
|