{"id":"https://openalex.org/W3186605584","doi":"https://doi.org/10.1109/jiot.2021.3100063","title":"IoT Malware Classification Based on Lightweight Convolutional Neural Networks","display_name":"IoT Malware Classification Based on Lightweight Convolutional Neural Networks","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3186605584","doi":"https://doi.org/10.1109/jiot.2021.3100063","mag":"3186605584"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3100063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3100063","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039048652","display_name":"Baoguo Yuan","orcid":"https://orcid.org/0000-0002-8613-6472"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baoguo Yuan","raw_affiliation_strings":["College of Computer Science, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377341","display_name":"Junfeng Wang","orcid":"https://orcid.org/0000-0003-1699-2270"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junfeng Wang","raw_affiliation_strings":["College of Computer Science, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042367706","display_name":"Peng Wu","orcid":"https://orcid.org/0000-0002-9128-9027"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Wu","raw_affiliation_strings":["College of Computer Science, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060212885","display_name":"Xianguo Qing","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xianguo Qing","raw_affiliation_strings":["Science and Technology on Reactor System Design Technology Laboratory, Nuclear Power Institute of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Reactor System Design Technology Laboratory, Nuclear Power Institute of China, Chengdu, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039048652"],"corresponding_institution_ids":["https://openalex.org/I24185976","https://openalex.org/I4210125143"],"apc_list":null,"apc_paid":null,"fwci":5.7084,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.96956929,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"9","issue":"5","first_page":"3770","last_page":"3783"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9031080603599548},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8918861150741577},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7402808666229248},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5132255554199219},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4808986186981201},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4321562945842743},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.430614709854126},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.42364779114723206},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4206398129463196},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4170226752758026},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3790409564971924},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.17374593019485474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17255359888076782},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1156979501247406}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9031080603599548},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8918861150741577},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7402808666229248},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5132255554199219},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4808986186981201},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4321562945842743},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.430614709854126},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42364779114723206},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4206398129463196},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4170226752758026},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3790409564971924},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.17374593019485474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17255359888076782},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1156979501247406},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3100063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3100063","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G2049420336","display_name":null,"funder_award_id":"U1836103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3053330549","display_name":null,"funder_award_id":"U20A20161","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3594146174","display_name":null,"funder_award_id":"2019QY1400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7108774048","display_name":null,"funder_award_id":"2018YFB0804503","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1573526548","https://openalex.org/W1975192419","https://openalex.org/W1981033991","https://openalex.org/W2010065958","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2267635142","https://openalex.org/W2343987812","https://openalex.org/W2549139847","https://openalex.org/W2765363641","https://openalex.org/W2783348159","https://openalex.org/W2783701660","https://openalex.org/W2788455797","https://openalex.org/W2788864200","https://openalex.org/W2791879367","https://openalex.org/W2792450155","https://openalex.org/W2792716682","https://openalex.org/W2795033129","https://openalex.org/W2806076636","https://openalex.org/W2883780447","https://openalex.org/W2887921593","https://openalex.org/W2889100747","https://openalex.org/W2889531475","https://openalex.org/W2895892359","https://openalex.org/W2898509207","https://openalex.org/W2901828657","https://openalex.org/W2903220614","https://openalex.org/W2913493033","https://openalex.org/W2914373984","https://openalex.org/W2924196523","https://openalex.org/W2961099251","https://openalex.org/W2962802821","https://openalex.org/W2963125010","https://openalex.org/W2963351448","https://openalex.org/W2969100211","https://openalex.org/W2990612420","https://openalex.org/W2991150929","https://openalex.org/W2994804501","https://openalex.org/W2994944553","https://openalex.org/W3004280948","https://openalex.org/W3004650773","https://openalex.org/W3006325478","https://openalex.org/W3006334803","https://openalex.org/W3007038242","https://openalex.org/W3011590379","https://openalex.org/W3024340288","https://openalex.org/W3025067198","https://openalex.org/W3088196840","https://openalex.org/W3097409240","https://openalex.org/W3099258169","https://openalex.org/W3117379804","https://openalex.org/W4297775537","https://openalex.org/W6637397297","https://openalex.org/W6737664043","https://openalex.org/W6748641434"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2566006169","https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3193565141","https://openalex.org/W3133861977","https://openalex.org/W3167935049","https://openalex.org/W3029198973"],"abstract_inverted_index":{"Internet":[0],"of":[1,15,37,57,143,152,160,168,178,193],"Things":[2],"(IoT)":[3],"is":[4,49,105,145,154,197,208,217],"hard":[5],"to":[6,12,31,41,51,69],"deploy":[7],"adequate":[8],"security":[9],"defenses":[10],"due":[11],"the":[13,20,34,46,93,103,129,161,185,190,194,200,206,214],"diversity":[14],"architectures":[16],"as":[17,19,127],"well":[18],"limited":[21],"computing":[22],"and":[23,44,113],"storage":[24],"capabilities,":[25],"which":[26,179],"makes":[27],"it":[28],"more":[29],"vulnerable":[30],"malware.":[32],"With":[33],"massive":[35],"deployment":[36],"IoT":[38,52,58,81,173,222],"devices,":[39],"how":[40],"accurately":[42],"identify":[43],"classify":[45],"malware":[47,59,82,94,117,174],"variants":[48],"crucial":[50],"security.":[53],"However,":[54],"existing":[55],"methods":[56,125],"classification":[60,83],"generally":[61],"support":[62],"specific":[63],"platform":[64],"or":[65],"require":[66],"complex":[67],"models":[68],"achieve":[70],"higher":[71,165],"accuracies.":[72],"To":[73],"solve":[74],"these":[75],"problems,":[76],"this":[77],"article":[78],"proposes":[79],"an":[80],"method":[84,163,196,216],"based":[85],"on":[86,171,199],"lightweight":[87],"convolutional":[88],"neural":[89],"networks":[90],"(LCNNs).":[91],"First,":[92],"binaries":[95],"are":[96,164,180],"converted":[97],"into":[98],"multidimensional":[99],"Markov":[100],"images.":[101],"Then,":[102],"LCNN":[104,131,144],"designed":[106,130],"with":[107,121,184],"two":[108],"new":[109],"operations,":[110],"depthwise":[111],"convolution":[112],"channel":[114],"shuffle,":[115],"for":[116,221],"images":[118,170],"classification.":[119],"Compared":[120,183],"other":[122],"deep":[123],"learning-based":[124],"such":[126],"VGG16,":[128],"can":[132],"greatly":[133],"reduce":[134],"trainable":[135],"parameters":[136],"while":[137,150],"maintaining":[138],"accuracy.":[139,228],"The":[140,157,210],"generated":[141],"model":[142,207],"only":[146,219],"about":[147],"1":[148],"MB,":[149],"that":[151,167,213],"VGG16":[153],"552.57":[155],"MB.":[156],"average":[158,191],"accuracies":[159],"proposed":[162,195,215],"than":[166],"gray":[169],"multiple":[172],"data":[175,202],"sets,":[176],"all":[177],"over":[181],"95%.":[182],"state-of-the-art":[186],"low-level":[187],"features-based":[188],"methods,":[189],"accuracy":[192],"99.356%":[198],"Microsoft":[201],"set":[203],"even":[204],"if":[205],"tiny.":[209],"results":[211],"show":[212],"not":[218],"suitable":[220],"environments":[223],"but":[224],"also":[225],"has":[226],"high":[227]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":8}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
