{"id":"https://openalex.org/W4382203243","doi":"https://doi.org/10.1109/tcad.2023.3290128","title":"Resource- and Workload-Aware Model Parallelism-Inspired Novel Malware Detection for IoT Devices","display_name":"Resource- and Workload-Aware Model Parallelism-Inspired Novel Malware Detection for IoT Devices","publication_year":2023,"publication_date":"2023-06-27","ids":{"openalex":"https://openalex.org/W4382203243","doi":"https://doi.org/10.1109/tcad.2023.3290128"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2023.3290128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2023.3290128","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004945691","display_name":"Sreenitha Kasarapu","orcid":"https://orcid.org/0000-0002-9974-1348"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sreenitha Kasarapu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081814168","display_name":"Sanket Shukla","orcid":"https://orcid.org/0000-0002-1861-249X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sanket Shukla","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047725314","display_name":"Sai Manoj Pudukotai Dinakarrao","orcid":"https://orcid.org/0000-0002-4417-2387"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Manoj Pudukotai Dinakarrao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004945691"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":1.0189,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7543036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"42","issue":"12","first_page":"4618","last_page":"4628"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8607842922210693},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7894279360771179},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.6667373180389404},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5240233540534973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4929170608520508},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11807036399841309}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8607842922210693},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7894279360771179},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.6667373180389404},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5240233540534973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4929170608520508},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11807036399841309},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcad.2023.3290128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2023.3290128","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2034938003","https://openalex.org/W2057332538","https://openalex.org/W2060393849","https://openalex.org/W2083183119","https://openalex.org/W2146502635","https://openalex.org/W2166844173","https://openalex.org/W2203388234","https://openalex.org/W2215444025","https://openalex.org/W2294937515","https://openalex.org/W2462114818","https://openalex.org/W2544988394","https://openalex.org/W2625408821","https://openalex.org/W2752493903","https://openalex.org/W2889100747","https://openalex.org/W2890774642","https://openalex.org/W2932551155","https://openalex.org/W2951341874","https://openalex.org/W2963459241","https://openalex.org/W2963461686","https://openalex.org/W2965443102","https://openalex.org/W3006727660","https://openalex.org/W3012125688","https://openalex.org/W3047417042","https://openalex.org/W3090489807","https://openalex.org/W3159074911","https://openalex.org/W3167220634","https://openalex.org/W3184036958","https://openalex.org/W3185466946","https://openalex.org/W3206885183","https://openalex.org/W3211764671","https://openalex.org/W4226258814","https://openalex.org/W4246712378","https://openalex.org/W4281795618","https://openalex.org/W4287764839","https://openalex.org/W4292070252","https://openalex.org/W6681435938","https://openalex.org/W6682777827","https://openalex.org/W6684191040","https://openalex.org/W6684859321","https://openalex.org/W6720057410","https://openalex.org/W6779326863","https://openalex.org/W6795846692","https://openalex.org/W6803542835"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2000785801","https://openalex.org/W986318368","https://openalex.org/W2753240997","https://openalex.org/W2384410913","https://openalex.org/W1764168690","https://openalex.org/W2537959205"],"abstract_inverted_index":{"The":[0,149],"wide":[1],"adoption":[2,78],"of":[3,5,44,66,79,94,200,236,254],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8,33,105],"has":[9],"led":[10],"to":[11,41,125,185,245],"better":[12],"connectivity":[13],"along":[14],"with":[15,189],"seamless":[16],"communication":[17,173],"and":[18,69,141,172,196,210,215],"smart":[19],"computation":[20],"capabilities":[21],"across":[22,29],"the":[23,30,42,73,77,88,92,96,111,126,153,166,175,202,206,219,229],"network.":[24],"Despite":[25],"being":[26],"deployed":[27,106],"widely":[28],"globe,":[31],"IoT":[32,63,85,104,147,187],"are":[34,72,122],"prominently":[35],"exploited":[36],"for":[37,62,76,99,103,107,115,146,156,222],"security":[38,46,60,67],"vulnerabilities":[39],"due":[40],"lack":[43],"inherent":[45],"measures.":[47],"Among":[48],"multiple":[49,213],"threats,":[50],"malicious":[51],"applications":[52],"also":[53],"known":[54],"as":[55],"malware":[56,81,100,120,144,157,176,204,223,251],"is":[57,179,208],"a":[58,116,138,160,234,250],"pivotal":[59],"threat":[61],"devices.":[64,86,148],"Lack":[65],"traits":[68],"limited":[70],"resources":[71,98,114,155],"primary":[74,133],"hindrances":[75],"existing":[80,89],"detection":[82,121,145,158,177,252],"techniques":[83,90],"in":[84],"Furthermore,":[87],"assume":[91],"availability":[93],"all":[95],"device":[97,150],"detection.":[101,224],"However,":[102],"critical":[108],"real-world":[109],"applications,":[110],"available":[112,128,154,167],"on-device":[113,182,246],"given":[117],"task,":[118],"including":[119],"minimal":[123],"compared":[124,244],"overall":[127],"resources.":[129,191],"To":[130,192],"address":[131],"this":[132,135],"challenge,":[134],"work":[136],"introduces":[137],"novel":[139],"resource-":[140],"workload-aware":[142],"model-parallelism-inspired":[143],"first":[151],"analyzes":[152],"using":[159],"lightweight":[161],"regression":[162],"model.":[163],"Depending":[164],"on":[165],"resources,":[168],"ongoing":[169],"workload":[170],"executions,":[171],"costs,":[174],"task":[178],"either":[180],"performed":[181],"or":[183],"offloaded":[184],"neighboring":[186],"nodes":[188,214],"sufficient":[190],"ensure":[193],"data":[194],"integrity":[195],"user":[197],"privacy,":[198],"instead":[199],"offloading":[201],"whole":[203],"detection,":[205],"classifier":[207],"partitioned":[209],"distributed":[211],"over":[212],"further":[216],"integrated":[217],"at":[218],"parent":[220],"node":[221],"Experimental":[225],"analysis":[226],"shows":[227],"that":[228],"proposed":[230],"technique":[231],"can":[232],"achieve":[233],"speed-up":[235],"<inline-formula":[237],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[238],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[239],"<tex-math":[240],"notation=\"LaTeX\">$9.8\\times":[241],"$":[242],"</tex-math></inline-formula>":[243],"inference":[247],"while":[248],"maintaining":[249],"accuracy":[253],"96.7%.":[255]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
