{"id":"https://openalex.org/W4313119132","doi":"https://doi.org/10.1109/jiot.2022.3229005","title":"Efficient and Lightweight Convolutional Networks for IoT Malware Detection: A Federated Learning Approach","display_name":"Efficient and Lightweight Convolutional Networks for IoT Malware Detection: A Federated Learning Approach","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4313119132","doi":"https://doi.org/10.1109/jiot.2022.3229005"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3229005","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3229005","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079704928","display_name":"Mohamed Abdel\u2010Basset","orcid":"https://orcid.org/0000-0002-2794-3936"},"institutions":[{"id":"https://openalex.org/I192398990","display_name":"Zagazig University","ror":"https://ror.org/053g6we49","country_code":"EG","type":"education","lineage":["https://openalex.org/I192398990"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Mohamed Abdel-Basset","raw_affiliation_strings":["Faculty of Computers and Informatics, Zagazig University, Zagazig, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers and Informatics, Zagazig University, Zagazig, Egypt","institution_ids":["https://openalex.org/I192398990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081293402","display_name":"Hossam Hawash","orcid":"https://orcid.org/0000-0001-9925-3232"},"institutions":[{"id":"https://openalex.org/I192398990","display_name":"Zagazig University","ror":"https://ror.org/053g6we49","country_code":"EG","type":"education","lineage":["https://openalex.org/I192398990"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hossam Hawash","raw_affiliation_strings":["Faculty of Computers and Informatics, Zagazig University, Zagazig, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers and Informatics, Zagazig University, Zagazig, Egypt","institution_ids":["https://openalex.org/I192398990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012051592","display_name":"Karam M. Sallam","orcid":"https://orcid.org/0000-0001-5767-2818"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Karam M. Sallam","raw_affiliation_strings":["School of IT and Systems, University of Canberra, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of IT and Systems, University of Canberra, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077388157","display_name":"Ibrahim Elgendi","orcid":"https://orcid.org/0000-0002-0849-3677"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ibrahim Elgendi","raw_affiliation_strings":["School of IT and Systems, University of Canberra, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of IT and Systems, University of Canberra, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066074266","display_name":"Kumudu S. Munasinghe","orcid":"https://orcid.org/0000-0002-0141-8973"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Kumudu Munasinghe","raw_affiliation_strings":["School of IT and Systems, University of Canberra, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of IT and Systems, University of Canberra, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086268677","display_name":"Abbas Jamalipour","orcid":"https://orcid.org/0000-0002-1807-7220"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Abbas Jamalipour","raw_affiliation_strings":["School of Electrical and Information Engineering, The University of Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, The University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079704928"],"corresponding_institution_ids":["https://openalex.org/I192398990"],"apc_list":null,"apc_paid":null,"fwci":5.2073,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.96512211,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"10","issue":"8","first_page":"7164","last_page":"7173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.892490029335022},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8893923759460449},{"id":"https://openalex.org/keywords/generalizability-theory","display_name":"Generalizability theory","score":0.6749133467674255},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.542643666267395},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5358331203460693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4990217685699463},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4782209098339081},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.44754400849342346},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4462845027446747},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40683114528656006},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12593159079551697},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.07694363594055176}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.892490029335022},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8893923759460449},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.6749133467674255},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.542643666267395},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5358331203460693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4990217685699463},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4782209098339081},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.44754400849342346},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4462845027446747},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40683114528656006},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12593159079551697},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.07694363594055176},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3229005","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3229005","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2963351448","https://openalex.org/W2998074434","https://openalex.org/W3003257820","https://openalex.org/W3020687048","https://openalex.org/W3108367851","https://openalex.org/W3113308842","https://openalex.org/W3157680283","https://openalex.org/W3186080995","https://openalex.org/W3186605584","https://openalex.org/W3196064684","https://openalex.org/W3206162503","https://openalex.org/W3213574824","https://openalex.org/W4205292723","https://openalex.org/W4206724648","https://openalex.org/W4206739656","https://openalex.org/W4212924680","https://openalex.org/W4283771810","https://openalex.org/W4285189699","https://openalex.org/W4285293538","https://openalex.org/W4288780798","https://openalex.org/W4292387506","https://openalex.org/W4293193114","https://openalex.org/W4295700754","https://openalex.org/W4306316917","https://openalex.org/W4312352414","https://openalex.org/W6748641434","https://openalex.org/W6791301604","https://openalex.org/W6804695989"],"related_works":["https://openalex.org/W4313339048","https://openalex.org/W4386004629","https://openalex.org/W3176734149","https://openalex.org/W3201779876","https://openalex.org/W3113627641","https://openalex.org/W4238142035","https://openalex.org/W2918879532","https://openalex.org/W2885461866","https://openalex.org/W3191964704","https://openalex.org/W2901937988"],"abstract_inverted_index":{"Over":[0],"the":[1,46,50,91,102,118,175],"past":[2],"few":[3],"years,":[4],"billions":[5],"of":[6,9,31,129],"unsecured":[7],"Internet":[8],"Things":[10],"(IoT)":[11],"devices":[12,85],"have":[13,38],"been":[14],"produced":[15],"and":[16,18,49,52,106,155,182],"released,":[17],"that":[19,174],"number":[20],"will":[21],"only":[22],"grow":[23],"as":[24,121],"wireless":[25],"technology":[26],"advances.":[27],"As":[28],"a":[29,59,69,108,143],"result":[30],"their":[32],"susceptibility":[33],"to":[34,62,79,86,100,116,152],"malware,":[35],"effective":[36],"methods":[37],"become":[39],"necessary":[40],"for":[41,136],"identifying":[42],"IoT":[43,140],"malware.":[44,88],"However,":[45],"low":[47],"generalizability":[48,154],"nonindependently":[51],"identically":[53],"distributed":[54,83],"data":[55,171],"(non-IID)":[56],"still":[57],"pose":[58],"major":[60],"challenge":[61],"achieving":[63],"this":[64,67],"goal.":[65],"In":[66,89],"work,":[68],"new":[70],"federated":[71],"malware":[72,92,119,170],"detection":[73],"paradigm,":[74],"termed":[75],"FED-MAL,":[76,90],"is":[77,114,148,177],"introduced":[78],"collaboratively":[80],"train":[81],"multiple":[82],"edge":[84],"detect":[87],"binaries":[93],"are":[94],"transformed":[95],"into":[96],"an":[97,122,133],"image":[98,123],"format":[99],"lessen":[101],"impact":[103],"on":[104,138,167],"non-IID,":[105],"then":[107],"compact":[109,127],"convolutional":[110],"model,":[111],"named":[112],"AM-NET,":[113],"proposed":[115],"learn":[117],"patterns":[120],"recognition":[124],"task.":[125],"The":[126],"nature":[128],"AM-NET":[130],"makes":[131],"it":[132],"appropriate":[134],"choice":[135],"deployment":[137],"resource-constrained":[139],"devices.":[141],"Following,":[142],"refined":[144],"edge-based":[145],"adversarial":[146,159],"training":[147],"given":[149],"in":[150],"FED-MAL":[151,176],"empower":[153],"resistibility":[156],"by":[157],"generating":[158],"samples":[160],"from":[161],"various":[162],"participating":[163],"clients.":[164],"Experimental":[165],"evaluation":[166],"publicly":[168],"available":[169],"sets":[172],"shows":[173],"efficacious,":[178],"reliable,":[179],"expandable,":[180],"generalizable,":[181],"communication":[183],"efficient.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
