{"id":"https://openalex.org/W4293208285","doi":"https://doi.org/10.1109/jiot.2022.3160755","title":"A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway","display_name":"A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway","publication_year":2022,"publication_date":"2022-03-21","ids":{"openalex":"https://openalex.org/W4293208285","doi":"https://doi.org/10.1109/jiot.2022.3160755"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3160755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3160755","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","Key Laboratory of Computer Network and Information Integration, and Ministry of Education, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, and Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103014339","display_name":"Cheng Zhu","orcid":"https://orcid.org/0000-0002-6740-1912"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Zhu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665328","display_name":"Ruidong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I10091056","display_name":"Kanazawa University","ror":"https://ror.org/02hwp6a56","country_code":"JP","type":"education","lineage":["https://openalex.org/I10091056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ruidong Li","raw_affiliation_strings":["Institute of Science and Engineering, Kanazawa University, Kanazawa, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Engineering, Kanazawa University, Kanazawa, Japan","institution_ids":["https://openalex.org/I10091056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100600398","display_name":"Gong Jian","orcid":"https://orcid.org/0000-0002-2966-3073"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Gong","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5073150709"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":4.169,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94996664,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"10","issue":"5","first_page":"3814","last_page":"3826"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8693221807479858},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.696940541267395},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.6393893361091614},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6221094131469727},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6046693325042725},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5973365306854248},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5860586166381836},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.524676501750946},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5069625377655029},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4776824116706848},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4594813585281372},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.425870805978775},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4167234003543854},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3160669803619385},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26556992530822754},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23565921187400818},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07371336221694946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8693221807479858},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.696940541267395},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.6393893361091614},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6221094131469727},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6046693325042725},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5973365306854248},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5860586166381836},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.524676501750946},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5069625377655029},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4776824116706848},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4594813585281372},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.425870805978775},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4167234003543854},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3160669803619385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26556992530822754},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23565921187400818},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07371336221694946},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3160755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3160755","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G4884949266","display_name":null,"funder_award_id":"19H04105","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G5665709424","display_name":null,"funder_award_id":"2242021R41121","funder_id":"https://openalex.org/F4320324856","funder_display_name":"Southeast University"},{"id":"https://openalex.org/G6794526321","display_name":null,"funder_award_id":"61602114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324856","display_name":"Southeast University","ror":"https://ror.org/04ct4d772"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1583141315","https://openalex.org/W1686810756","https://openalex.org/W2077488147","https://openalex.org/W2108598243","https://openalex.org/W2157331557","https://openalex.org/W2162651021","https://openalex.org/W2165698076","https://openalex.org/W2194775991","https://openalex.org/W2593768305","https://openalex.org/W2606697812","https://openalex.org/W2743678626","https://openalex.org/W2790100928","https://openalex.org/W2884585870","https://openalex.org/W2904209271","https://openalex.org/W2917091861","https://openalex.org/W2926367029","https://openalex.org/W2950635901","https://openalex.org/W2963471098","https://openalex.org/W2964350391","https://openalex.org/W2998115938","https://openalex.org/W3009136487","https://openalex.org/W3018464563","https://openalex.org/W3021632667","https://openalex.org/W3021654819","https://openalex.org/W3024476475","https://openalex.org/W3039623901","https://openalex.org/W3047936414","https://openalex.org/W3087886930","https://openalex.org/W3090494808","https://openalex.org/W3111724640","https://openalex.org/W3121972055","https://openalex.org/W3134309133","https://openalex.org/W3134731862","https://openalex.org/W3185153723","https://openalex.org/W3196078976","https://openalex.org/W4299518610","https://openalex.org/W6637373629","https://openalex.org/W6639480849","https://openalex.org/W6682132143","https://openalex.org/W6682137061","https://openalex.org/W6683633756","https://openalex.org/W6684191040","https://openalex.org/W6713955831","https://openalex.org/W6739901393","https://openalex.org/W6754528357","https://openalex.org/W6767486985","https://openalex.org/W6781227725","https://openalex.org/W6791284882"],"related_works":["https://openalex.org/W1518499115","https://openalex.org/W4322761281","https://openalex.org/W2122599377","https://openalex.org/W4238233472","https://openalex.org/W2915304347","https://openalex.org/W3111395152","https://openalex.org/W4313526662","https://openalex.org/W2794872059","https://openalex.org/W4313463218","https://openalex.org/W3106131444"],"abstract_inverted_index":{"The":[0],"prevailing":[1],"of":[2,8,19,51,63,118,162],"malware":[3,20,38,97,185],"variants":[4],"in":[5,77,120],"ubiquitous":[6],"Internet":[7],"Things":[9],"(IoT)":[10],"devices":[11],"causes":[12],"enormous":[13],"losses.":[14],"Accurate":[15],"and":[16,47,94,123,130,167],"timely":[17],"identification":[18],"variant":[21,39,98,186],"traffic":[22,40,99,115,137,187],"at":[23,100,147,188],"an":[24,101,159,189],"IoT":[25,78,102,149,191],"edge":[26,103,150,190],"gateway":[27],"can":[28],"effectively":[29],"reduce":[30],"the":[31,34,49,60,114,121,148],"loss.":[32],"TransNet,":[33],"state-of-the-art":[35],"technology":[36],"for":[37,165,183],"detection,":[41],"considers":[42],"only":[43],"global":[44],"domain":[45,175],"adaptation":[46,86],"ignores":[48],"alignment":[50],"distributions":[52,117],"between":[53,139],"different":[54,140],"subdomains,":[55],"which":[56,71],"fails":[57],"to":[58,92,112,134,142],"capture":[59],"fine-grained":[61],"information":[62],"classification":[64],"targets.":[65],"Besides,":[66],"TransNet":[67],"converges":[68,168],"very":[69],"slowly,":[70],"may":[72],"use":[73],"up":[74],"precious":[75,144],"resources":[76,146],"devices.":[79],"This":[80],"article":[81],"proposes":[82],"a":[83,172],"deep":[84],"subdomain":[85],"network":[87],"with":[88],"attention":[89,132],"mechanism":[90],"(DSAN-AT)":[91],"accurately":[93],"efficiently":[95],"identify":[96],"gateway.":[104,151,192],"DSAN-AT":[105,157,179],"utilizes":[106],"local":[107],"maximum":[108],"mean":[109],"discrepancy":[110],"(LMMD)":[111],"align":[113],"feature":[116],"subdomains":[119,141],"source":[122],"target":[124,174],"domains.":[125],"It":[126],"also":[127],"exploits":[128],"channel":[129],"spatial":[131],"mechanisms":[133],"accelerate":[135],"learning":[136],"features":[138],"save":[143],"computing":[145],"Our":[152],"experimental":[153],"study":[154],"demonstrates":[155],"that":[156],"achieves":[158],"average":[160],"accuracy":[161],"97.15%":[163],"(96.37%":[164],"TransNet)":[166],"fast":[169],"without":[170],"using":[171],"large":[173],"training":[176],"data":[177],"set.":[178],"has":[180],"strong":[181],"practicality":[182],"identifying":[184]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
