Research Article
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain
Table 4
The evaluation parameters of primary classifier and subclassifiers%.
| Classifiers | Primary | Dex-classifier | Manifest-classifier | Certificates-classifier |
| TPR | Benign | 96 | 99 | 93 | 98 | Malicious | 89 | 48 | 40 | 42 |
| F1-score | Benign | 95 | 93 | 89 | 92 | Malicious | 88 | 62 | 58 | 56 |
| Precision | Benign | 96 | 88 | 86 | 87 | Malicious | 87 | 89 | 80 | 85 |
| Accuracy | 94 | 88 | 82 | 86 |
|
|