{"id":"https://openalex.org/W2782999659","doi":"https://doi.org/10.1109/glocom.2017.8254503","title":"Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection","display_name":"Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2782999659","doi":"https://doi.org/10.1109/glocom.2017.8254503","mag":"2782999659"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2017.8254503","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102759541","display_name":"Xiaoyue Wan","orcid":"https://orcid.org/0000-0003-4808-7443"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyue Wan","raw_affiliation_strings":["Dept. of Communication Engineering, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Dept. of Communication Engineering, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066640148","display_name":"Geyi Sheng","orcid":"https://orcid.org/0000-0003-3561-0215"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Geyi Sheng","raw_affiliation_strings":["Dept. of Communication Engineering, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Dept. of Communication Engineering, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033512723","display_name":"Yanda Li","orcid":"https://orcid.org/0000-0002-9439-202X"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanda Li","raw_affiliation_strings":["Dept. of Communication Engineering, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Dept. of Communication Engineering, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068976123","display_name":"Liang Xiao","orcid":"https://orcid.org/0000-0003-2402-611X"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Xiao","raw_affiliation_strings":["Dept. of Communication Engineering, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Dept. of Communication Engineering, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Dept. of Computer and Information Science, Temple University, Philadelphia, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Science, Temple University, Philadelphia, USA","institution_ids":["https://openalex.org/I84392919"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102759541"],"corresponding_institution_ids":["https://openalex.org/I191208505"],"apc_list":null,"apc_paid":null,"fwci":3.3286,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.9354861,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8676331043243408},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7563624382019043},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7341001629829407},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6929200291633606},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6150670647621155},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5237945318222046},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48937004804611206},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4684320390224457},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.437975138425827},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.41522207856178284},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3218191862106323},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31409740447998047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21579116582870483},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18251830339431763}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8676331043243408},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7563624382019043},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7341001629829407},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6929200291633606},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6150670647621155},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5237945318222046},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48937004804611206},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4684320390224457},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.437975138425827},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.41522207856178284},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3218191862106323},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31409740447998047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21579116582870483},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18251830339431763}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2017.8254503","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1582740727","https://openalex.org/W1752315353","https://openalex.org/W1984008582","https://openalex.org/W1990649188","https://openalex.org/W2010302594","https://openalex.org/W2025658534","https://openalex.org/W2033784617","https://openalex.org/W2037026906","https://openalex.org/W2056388267","https://openalex.org/W2080346852","https://openalex.org/W2114337635","https://openalex.org/W2116075922","https://openalex.org/W2131799137","https://openalex.org/W2145339207","https://openalex.org/W2159145942","https://openalex.org/W2170018742","https://openalex.org/W2347128811","https://openalex.org/W2611484353","https://openalex.org/W3099263166","https://openalex.org/W3122087971","https://openalex.org/W6656725681"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2048100608","https://openalex.org/W2090296580","https://openalex.org/W1576249345","https://openalex.org/W4243905374","https://openalex.org/W1796074903","https://openalex.org/W4245955065","https://openalex.org/W4254967497"],"abstract_inverted_index":{"Cloud-based":[0],"malware":[1,13,22,51,91,105],"detection":[2,5,14,52,92,106,128,131,141],"improves":[3],"the":[4,33,36,41,45,49,64,68,72,81,99,104,127,130,134,140,144,148],"performance":[6],"for":[7],"mobile":[8,57,90],"devices":[9],"that":[10],"offload":[11],"their":[12],"tasks":[15],"to":[16,67,124],"security":[17,46,69],"servers":[18],"with":[19,83,118,147],"much":[20],"larger":[21],"database":[23],"and":[24,40,133],"powerful":[25],"computational":[26],"resources.":[27],"In":[28],"this":[29],"paper,":[30],"we":[31,86],"investigate":[32],"competition":[34],"of":[35,44,63,143],"radio":[37],"transmission":[38],"bandwidths":[39],"data":[42],"sharing":[43],"server":[47],"in":[48,54,80],"dynamic":[50],"game,":[53],"which":[55,97],"each":[56],"device":[58],"chooses":[59],"its":[60],"offloading":[61,111],"rate":[62,79],"application":[65],"traces":[66],"server.":[70],"As":[71],"Q-learning":[73],"technique":[74,117],"has":[75],"a":[76,89,119],"slow":[77],"learning":[78,150],"game":[82],"high":[84],"dimension,":[85],"have":[87],"designed":[88],"based":[93,102,113,151],"on":[94,103,114],"hotbooting-Q":[95],"techniques,":[96],"initiates":[98],"quality":[100],"values":[101],"experience.":[107],"We":[108],"propose":[109],"an":[110],"strategy":[112],"deep":[115,120],"Q-network":[116],"convolutional":[121],"neural":[122],"network":[123],"further":[125],"improve":[126],"speed,":[129],"accuracy,":[132],"utility.":[135],"Preliminary":[136],"simulation":[137],"results":[138],"verify":[139],"gain":[142],"scheme":[145],"compared":[146],"Q-":[149],"strategy.":[152]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
