{"id":"https://openalex.org/W4404238384","doi":"https://doi.org/10.1109/access.2024.3495635","title":"Optimizing Malware Detection for IoT and Edge Environments With Quantization Awareness","display_name":"Optimizing Malware Detection for IoT and Edge Environments With Quantization Awareness","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404238384","doi":"https://doi.org/10.1109/access.2024.3495635"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3495635","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3495635","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3495635","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014721122","display_name":"Gasim Alandjani","orcid":"https://orcid.org/0000-0003-0321-7013"},"institutions":[{"id":"https://openalex.org/I113133037","display_name":"Yanbu University College","ror":"https://ror.org/011adk382","country_code":"SA","type":"education","lineage":["https://openalex.org/I113133037"]},{"id":"https://openalex.org/I4400600957","display_name":"Yanbu Industrial College","ror":"https://ror.org/01sxpmm41","country_code":"SA","type":"education","lineage":["https://openalex.org/I4400600957"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Gasim Alandjani","raw_affiliation_strings":["Computer Science and Engineering Department, Yanbu Industrial College, Yanbu, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-0321-7013","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Yanbu Industrial College, Yanbu, Saudi Arabia","institution_ids":["https://openalex.org/I113133037","https://openalex.org/I4400600957"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014721122"],"corresponding_institution_ids":["https://openalex.org/I113133037","https://openalex.org/I4400600957"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.9437,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8753517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"166776","last_page":"166791"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7813555598258972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7637249231338501},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.6169536113739014},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5939292311668396},{"id":"https://openalex.org/keywords/edge-detection","display_name":"Edge detection","score":0.44912010431289673},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.44444820284843445},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4414740800857544},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4289973974227905},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.41074544191360474},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3693382143974304},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.11729273200035095}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7813555598258972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7637249231338501},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.6169536113739014},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5939292311668396},{"id":"https://openalex.org/C193536780","wikidata":"https://www.wikidata.org/wiki/Q1513153","display_name":"Edge detection","level":4,"score":0.44912010431289673},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.44444820284843445},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4414740800857544},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4289973974227905},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.41074544191360474},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3693382143974304},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.11729273200035095},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3495635","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3495635","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bfd083fd2c34498abdcea9913bbda78d","is_oa":true,"landing_page_url":"https://doaj.org/article/bfd083fd2c34498abdcea9913bbda78d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 166776-166791 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3495635","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3495635","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W2010065958","https://openalex.org/W2097117768","https://openalex.org/W2194775991","https://openalex.org/W2363800358","https://openalex.org/W2548971154","https://openalex.org/W2752782242","https://openalex.org/W2782173654","https://openalex.org/W2783210649","https://openalex.org/W2783615536","https://openalex.org/W2784296288","https://openalex.org/W2786771851","https://openalex.org/W2791879367","https://openalex.org/W2795033129","https://openalex.org/W2796681025","https://openalex.org/W2798790152","https://openalex.org/W2809624076","https://openalex.org/W2883780447","https://openalex.org/W2889474744","https://openalex.org/W2924196523","https://openalex.org/W2944830571","https://openalex.org/W2948805184","https://openalex.org/W2949468774","https://openalex.org/W2954996726","https://openalex.org/W2961099251","https://openalex.org/W2961548374","https://openalex.org/W2962761403","https://openalex.org/W2962802821","https://openalex.org/W2963122961","https://openalex.org/W2963163009","https://openalex.org/W2963446712","https://openalex.org/W2964137095","https://openalex.org/W2981441179","https://openalex.org/W2982083293","https://openalex.org/W3004061291","https://openalex.org/W3004280948","https://openalex.org/W3034940165","https://openalex.org/W3047318188","https://openalex.org/W3048726132","https://openalex.org/W3115533518","https://openalex.org/W3138516171","https://openalex.org/W3157814027","https://openalex.org/W3167041328","https://openalex.org/W3200314056","https://openalex.org/W3202442802","https://openalex.org/W3203731077","https://openalex.org/W4282929420","https://openalex.org/W4286902072","https://openalex.org/W4288335398","https://openalex.org/W4289793082","https://openalex.org/W4312812783","https://openalex.org/W4319225041","https://openalex.org/W4367154266","https://openalex.org/W4386814486","https://openalex.org/W4389170061","https://openalex.org/W4391924994","https://openalex.org/W4394670654","https://openalex.org/W4399114316","https://openalex.org/W6637373629","https://openalex.org/W6684191040","https://openalex.org/W6746935165","https://openalex.org/W6748224102","https://openalex.org/W6751528251","https://openalex.org/W6753069482","https://openalex.org/W6762718338","https://openalex.org/W6802894071","https://openalex.org/W6810983866","https://openalex.org/W7055564967"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"Despite":[0],"the":[1,8,70,82,92,114,137,143,161,167,184,188],"widespread":[2],"applicability":[3],"of":[4,10,91],"malware":[5,17,38,120,145,169,195],"detection":[6,18,39,121,196],"on":[7,19,100,106,127,136,142,160,166,174,197],"Internet":[9],"Things":[11],"(IoT)":[12],"and":[13,59,103,140,164],"edge":[14,20,177,198],"platforms,":[15],"efficient":[16,75],"devices":[21],"is":[22,183],"significantly":[23,117],"challenging":[24],"due":[25],"to":[26,65,80],"hardware":[27,102],"limitations.":[28],"This":[29],"study":[30],"proposes":[31],"a":[32,48,175],"novel":[33],"edge-friendly":[34,86],"framework":[35,46,72],"for":[36,85,194],"learning":[37],"by":[40],"incorporating":[41],"quantization":[42],"awareness.":[43],"The":[44,89,130],"proposed":[45,71,83,93,115,131],"incorporates":[47],"lightweight":[49],"deep":[50],"neural":[51],"network":[52],"leveraging":[53],"long-distance":[54],"pixel":[55],"dependency,":[56],"spatial-asymmetric":[57],"attention,":[58],"normalization-free":[60],"multi-head":[61],"attention":[62],"(MHA)":[63],"block":[64],"refine":[66],"salient":[67],"features.":[68],"Additionally,":[69],"introduces":[73],"an":[74],"quantization-aware":[76],"training":[77],"(QAT)":[78],"strategy":[79],"optimize":[81],"model":[84,94],"INT8":[87,154],"precision.":[88],"practicality":[90,193],"has":[95],"been":[96],"validated":[97],"through":[98],"deployment":[99],"ARM-based":[101],"extensive":[104],"evaluations":[105],"standard":[107],"x64":[108],"hardware.":[109],"Experimental":[110],"results":[111],"show":[112],"that":[113],"method":[116,132],"outperforms":[118],"existing":[119],"methods":[122],"in":[123,187],"numerous":[124],"precision":[125,149],"modes":[126],"both":[128],"platforms.":[129,199],"achieved":[133,157],"99.36%":[134],"accuracy":[135,159],"MalImg":[138,162],"dataset":[139,146,163],"98.41%":[141],"IoT":[144,168],"with":[147],"FP16":[148],"at":[150],"662":[151],"fps.":[152],"With":[153],"precision,":[155],"it":[156],"95.62%":[158],"97.36%":[165],"dataset,":[170],"maintaining":[171],"1197":[172],"fps":[173],"low-power":[176],"device.":[178],"To":[179],"our":[180],"knowledge,":[181],"this":[182],"first":[185],"work":[186],"open":[189],"literature":[190],"demonstrating":[191],"QAT\u2019s":[192]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
