{"id":"https://openalex.org/W4406495560","doi":"https://doi.org/10.1109/bigdata62323.2024.10825955","title":"TinyML for Cybersecurity: Deploying Optimized Deep Learning Models for On-Device Threat Detection on Resource-Constrained Devices","display_name":"TinyML for Cybersecurity: Deploying Optimized Deep Learning Models for On-Device Threat Detection on Resource-Constrained Devices","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406495560","doi":"https://doi.org/10.1109/bigdata62323.2024.10825955"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10825955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115913829","display_name":"Sonali Arcot","orcid":null},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sonali Arcot","raw_affiliation_strings":["San Jose State University,Department of Applied Data Science,San Jose,USA"],"affiliations":[{"raw_affiliation_string":"San Jose State University,Department of Applied Data Science,San Jose,USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083502477","display_name":"Mohammad Masum","orcid":"https://orcid.org/0000-0001-9974-6950"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Masum","raw_affiliation_strings":["San Jose State University,Department of Applied Data Science,San Jose,USA"],"affiliations":[{"raw_affiliation_string":"San Jose State University,Department of Applied Data Science,San Jose,USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114367880","display_name":"Mohammad Shahidul Kader","orcid":null},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Shahidul Kader","raw_affiliation_strings":["Auburn University,Atlanta,Georgia,USA"],"affiliations":[{"raw_affiliation_string":"Auburn University,Atlanta,Georgia,USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101244333","display_name":"Agnik Saha","orcid":null},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Agnik Saha","raw_affiliation_strings":["Georgia State University,Department of Computer Science,Atlanta,Georgia"],"affiliations":[{"raw_affiliation_string":"Georgia State University,Department of Computer Science,Atlanta,Georgia","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108142864","display_name":"Mohammed Chowdhury","orcid":null},"institutions":[{"id":"https://openalex.org/I117942362","display_name":"Western Illinois University","ror":"https://ror.org/02sshz518","country_code":"US","type":"education","lineage":["https://openalex.org/I117942362"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Chowdhury","raw_affiliation_strings":["Western Illinois University,Macomb,USA"],"affiliations":[{"raw_affiliation_string":"Western Illinois University,Macomb,USA","institution_ids":["https://openalex.org/I117942362"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5115913829"],"corresponding_institution_ids":["https://openalex.org/I51504820"],"apc_list":null,"apc_paid":null,"fwci":2.8513,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91696116,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"5542","last_page":"5550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7337750196456909},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.661641538143158},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5217062830924988},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2116072177886963}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7337750196456909},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.661641538143158},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5217062830924988},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2116072177886963}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10825955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W8191517","https://openalex.org/W146900863","https://openalex.org/W1724438581","https://openalex.org/W2561675875","https://openalex.org/W2916401208","https://openalex.org/W2963122961","https://openalex.org/W2963163009","https://openalex.org/W2963446712","https://openalex.org/W2964081807","https://openalex.org/W3011347095","https://openalex.org/W3015240948","https://openalex.org/W3038470071","https://openalex.org/W3213149181","https://openalex.org/W4235130591","https://openalex.org/W4282025104","https://openalex.org/W4285265496","https://openalex.org/W4294974799","https://openalex.org/W4312958888","https://openalex.org/W4321372735","https://openalex.org/W4381149070","https://openalex.org/W4383751021","https://openalex.org/W4399207079","https://openalex.org/W6637709462","https://openalex.org/W6638632666","https://openalex.org/W6658350332","https://openalex.org/W6698183232","https://openalex.org/W6774875199","https://openalex.org/W6780343938","https://openalex.org/W6794185463","https://openalex.org/W6800591251","https://openalex.org/W6801534355","https://openalex.org/W6804716268","https://openalex.org/W6839327625","https://openalex.org/W6847019771","https://openalex.org/W6847365930","https://openalex.org/W6853080832","https://openalex.org/W6856388709","https://openalex.org/W6860756336","https://openalex.org/W6866107345"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Edge":[0],"devices,":[1,85],"which":[2],"are":[3,8],"integral":[4],"to":[5,11,14,46,66,158,172,193,205,220],"IoT":[6],"ecosystems,":[7],"highly":[9],"vulnerable":[10],"cyberattacks":[12],"due":[13],"their":[15,90],"limited":[16],"computing":[17],"power,":[18],"storage,":[19],"and":[20,31,94,106,121,133,138,151],"network":[21],"capacity.":[22],"Traditionally,":[23],"machine":[24],"learning":[25,81],"solutions":[26],"based":[27],"on":[28,83,89,98,103,117,144],"CPUs,":[29],"GPUs,":[30],"cloud":[32,99],"infrastructure":[33],"have":[34],"mitigated":[35],"such":[36],"risks,":[37],"but":[38,175,224],"latency":[39],"remains":[40],"a":[41],"significant":[42,127,226],"challenge,":[43],"allowing":[44],"threats":[45],"cause":[47],"damage":[48],"before":[49],"they":[50],"can":[51],"be":[52],"detected.":[53],"To":[54],"address":[55],"this,":[56],"we":[57,76],"explore":[58],"the":[59,104,111,145,167,180,199],"potential":[60],"of":[61,113],"Tiny":[62],"Machine":[63],"Learning":[64],"(TinyML)":[65],"optimize":[67],"models":[68,82,171,219],"for":[69,213],"low-powered,":[70],"resource-constrained":[71],"devices.":[72],"Using":[73],"TensorFlow":[74],"Lite,":[75],"conducted":[77],"experiments":[78,102],"with":[79,160,225],"deep":[80],"edge":[84],"providing":[86],"comparative":[87],"results":[88],"feasibility":[91],"regarding":[92],"security":[93],"privacy,":[95],"without":[96],"relying":[97],"infrastructure.":[100],"Our":[101],"USTC-TFC2016":[105,146],"Ransomware":[107,181],"PCAP":[108],"datasets":[109],"demonstrate":[110],"impact":[112],"various":[114],"quantization":[115,141,197],"techniques":[116,125],"accuracy,":[118,130],"model":[119,131],"size,":[120,132,154,169],"inference":[122,134,162],"time.":[123,135],"Quantization":[124],"demonstrated":[126],"trade-offs":[128],"between":[129],"While":[136],"dynamic":[137],"static":[139,183,216],"float16":[140,184],"balanced":[142],"performance":[143],"dataset,":[147,182],"preserving":[148],"85.67%":[149],"accuracy":[150,157,176,186,210,227],"halving":[152],"DenseNet169\u2019s":[153,191],"QAT":[155,208],"boosted":[156],"94.90%":[159],"slower":[161],"times.":[163],"Static":[164],"int8":[165,217],"achieved":[166],"smallest":[168],"shrinking":[170],"12.46":[173],"MB,":[174,223],"dropped":[177],"sharply.":[178],"For":[179],"kept":[185],"at":[187,211],"38.89%":[188],"while":[189,215],"cutting":[190],"size":[192],"23.99":[194],"MB.":[195],"Dynamic":[196],"delivered":[198],"fastest":[200],"inference,":[201],"reducing":[202],"MobileNetV2\u2019s":[203],"time":[204],"0.001049":[206],"seconds.":[207],"preserved":[209],"36.11%":[212],"DenseNet121,":[214],"compressed":[218],"just":[221],"2.59":[222],"loss.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
