Research Article
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain
Table 5
The evaluation parameters of different mechanisms%.
| Detection mechanisms | Decision | Single-feature [7] | Multifeatures fusion [21] |
| TPR | Benign | 96 | 95 | 91 | Malicious | 89 | 63 | 83 |
| F1-score | Benign | 95 | 93 | 93 | Malicious | 88 | 69 | 76 |
| Precision | Benign | 96 | 90 | 95 | Malicious | 87 | 70 | 71 |
| Accuracy | 94 | 85 | 89 |
|
|