{"id":"https://openalex.org/W4399154640","doi":"https://doi.org/10.1109/wf-iot58464.2023.10539588","title":"Optimization of Lightweight Malware Detection Models for AIoT Devices","display_name":"Optimization of Lightweight Malware Detection Models for AIoT Devices","publication_year":2023,"publication_date":"2023-10-12","ids":{"openalex":"https://openalex.org/W4399154640","doi":"https://doi.org/10.1109/wf-iot58464.2023.10539588"},"language":"en","primary_location":{"id":"doi:10.1109/wf-iot58464.2023.10539588","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wf-iot58464.2023.10539588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 9th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095762142","display_name":"Felicia Lo","orcid":null},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Felicia Lo","raw_affiliation_strings":["National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering","Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering","institution_ids":["https://openalex.org/I154864474"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040420733","display_name":"Shin\u2010Ming Cheng","orcid":"https://orcid.org/0000-0002-9796-0643"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shin-Ming Cheng","raw_affiliation_strings":["National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering","Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology,Department of Computer Science and Information Engineering","institution_ids":["https://openalex.org/I154864474"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016225739","display_name":"Rafael Kaliski","orcid":"https://orcid.org/0000-0002-6622-4838"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Rafael Kaliski","raw_affiliation_strings":["National Sun Yat-sen University,Department of Computer Science and Engineering","Department of Computer Science and Engineering, National Sun Yat-sen University"],"affiliations":[{"raw_affiliation_string":"National Sun Yat-sen University,Department of Computer Science and Engineering","institution_ids":["https://openalex.org/I142974352"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, National Sun Yat-sen University","institution_ids":["https://openalex.org/I142974352"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5095762142"],"corresponding_institution_ids":["https://openalex.org/I154864474"],"apc_list":null,"apc_paid":null,"fwci":0.2038,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51630673,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8296047449111938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8203567266464233},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6186190843582153},{"id":"https://openalex.org/keywords/memory-footprint","display_name":"Memory footprint","score":0.608056902885437},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5777175426483154},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5421100854873657},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.517052948474884},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45662060379981995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12691637873649597},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0962134301662445}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8296047449111938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8203567266464233},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6186190843582153},{"id":"https://openalex.org/C74912251","wikidata":"https://www.wikidata.org/wiki/Q6815727","display_name":"Memory footprint","level":2,"score":0.608056902885437},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5777175426483154},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5421100854873657},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.517052948474884},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45662060379981995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12691637873649597},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0962134301662445}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wf-iot58464.2023.10539588","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wf-iot58464.2023.10539588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 9th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3673216156","display_name":null,"funder_award_id":"108-2218-E-011-036-MY3,112-2221-E-110-023","funder_id":"https://openalex.org/F4320320953","funder_display_name":"Asia Pacific League of Associations for Rheumatology"}],"funders":[{"id":"https://openalex.org/F4320320953","display_name":"Asia Pacific League of Associations for Rheumatology","ror":"https://ror.org/05mny9804"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2002718637","https://openalex.org/W2101234009","https://openalex.org/W2970602317","https://openalex.org/W3209498073","https://openalex.org/W3209762321","https://openalex.org/W4210960727","https://openalex.org/W4214835615","https://openalex.org/W4233056867","https://openalex.org/W4312654986","https://openalex.org/W6637572315"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W3094340691","https://openalex.org/W4221166601"],"abstract_inverted_index":{"Malware":[0],"intrusion":[1],"is":[2,120,193],"problematic":[3],"for":[4,167,195],"Internet":[5],"of":[6,12,23,94,189],"Things":[7,13],"(IoT)":[8],"and":[9,53,139,175,185,208,228],"Artificial":[10],"Intelligence":[11],"(AIoT)":[14],"devices":[15,33,129,217],"as":[16,27],"they":[17],"often":[18],"reside":[19],"in":[20,67,126],"an":[21],"ecosystem":[22,38],"connected":[24],"devices,":[25,70],"such":[26],"a":[28,89,107,224],"smart":[29],"home.":[30],"If":[31],"any":[32],"are":[34,48],"infected,":[35],"the":[36,117,132,156,173,219],"whole":[37],"can":[39,204],"be":[40,124],"compromised.":[41],"Although":[42],"various":[43],"Machine":[44],"Learning":[45],"(ML)":[46],"models":[47,60,75,104,192],"deployed":[49,125],"to":[50,62,72,82,105,131,154,163],"detect":[51],"malware":[52],"network":[54],"intrusion,":[55],"generally":[56],"speaking,":[57],"robust":[58,74,96,109],"high-accuracy":[59],"tend":[61],"require":[63],"resources":[64,134],"not":[65],"found":[66],"all":[68],"IoT":[69],"compared":[71],"less":[73,95],"defined":[76],"by":[77],"weak":[78,101],"learners.":[79],"In":[80],"order":[81],"combat":[83],"this":[84,151],"issue,":[85],"Fadhilla":[86],"[1]":[87],"proposed":[88,157],"meta-learner":[90],"ensemble":[91,111,161],"model":[92,177],"comprised":[93],"prediction":[97],"results":[98,200],"inherent":[99],"with":[100,116,181,223],"learner":[102,159],"ML":[103,176,191,221],"produce":[106],"highly":[108],"meta-learning":[110,160],"model.":[112],"The":[113],"main":[114],"problem":[115],"prior":[118],"research":[119,152],"that":[121,187,202],"it":[122,165],"cannot":[123],"low-end":[127,146,168,196],"AIoT":[128,147,169,197,216],"due":[130],"limited":[133],"comprising":[135],"processing":[136],"power,":[137],"storage,":[138],"memory":[140,178,230],"(the":[141],"required":[142],"libraries":[143],"quickly":[144],"exhaust":[145],"devices'":[148],"resources.)":[149],"Hence,":[150],"aims":[153],"optimize":[155],"super":[158],"model[l]":[162],"make":[164],"viable":[166],"devices.":[170,198],"We":[171],"show":[172],"library":[174],"requirements":[179],"associated":[180],"each":[182],"optimization":[183,188],"stage":[184],"emphasize":[186],"current":[190],"necessitated":[194],"Our":[199],"demonstrate":[201],"we":[203],"obtain":[205],"similar":[206],"accuracy":[207],"False":[209],"Positive":[210],"Rate":[211],"(FPR)":[212],"metrics":[213],"from":[214],"high-end":[215],"running":[218],"derived":[220],"model,":[222],"lower":[225],"inference":[226],"duration":[227],"smaller":[229],"footprint.":[231]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
