{"id":"https://openalex.org/W4283021951","doi":"https://doi.org/10.1142/s0218126622503029","title":"A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things","display_name":"A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things","publication_year":2022,"publication_date":"2022-06-17","ids":{"openalex":"https://openalex.org/W4283021951","doi":"https://doi.org/10.1142/s0218126622503029"},"language":"en","primary_location":{"id":"doi:10.1142/s0218126622503029","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622503029","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068739772","display_name":"Hamad Naeem","orcid":"https://orcid.org/0000-0003-1511-218X"},"institutions":[{"id":"https://openalex.org/I4210093674","display_name":"Zhoukou Normal University","ror":"https://ror.org/00jjkh886","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210093674"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hamad Naeem","raw_affiliation_strings":["School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, Henan, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, Henan, P. R. China","institution_ids":["https://openalex.org/I4210093674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027459275","display_name":"Xiaochun Cheng","orcid":"https://orcid.org/0000-0003-0371-9646"},"institutions":[{"id":"https://openalex.org/I60488453","display_name":"Middlesex University","ror":"https://ror.org/01rv4p989","country_code":"GB","type":"education","lineage":["https://openalex.org/I60488453"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiaochun Cheng","raw_affiliation_strings":["Department of Computer Science, Middlesex University, London NW4 4BT, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Middlesex University, London NW4 4BT, United Kingdom","institution_ids":["https://openalex.org/I60488453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050849175","display_name":"Farhan Ullah","orcid":"https://orcid.org/0000-0002-1030-1275"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Farhan Ullah","raw_affiliation_strings":["School of Software, Northwestern Polytechnical University, Xi\u2019an 710072, Shaanxi, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xi\u2019an 710072, Shaanxi, P. R. China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045284879","display_name":"Sohail Jabbar","orcid":"https://orcid.org/0000-0002-2127-1235"},"institutions":[{"id":"https://openalex.org/I4210147796","display_name":"University of Faisalabad","ror":"https://ror.org/04eps4h65","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210147796"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sohail Jabbar","raw_affiliation_strings":["Department of Computational Sciences, The University of Faisalabad, Faisalabad 38000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computational Sciences, The University of Faisalabad, Faisalabad 38000, Pakistan","institution_ids":["https://openalex.org/I4210147796"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053642073","display_name":"Shi Dong","orcid":"https://orcid.org/0000-0003-4616-6519"},"institutions":[{"id":"https://openalex.org/I4210093674","display_name":"Zhoukou Normal University","ror":"https://ror.org/00jjkh886","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210093674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi Dong","raw_affiliation_strings":["School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, Henan, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, Henan, P. R. China","institution_ids":["https://openalex.org/I4210093674"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068739772"],"corresponding_institution_ids":["https://openalex.org/I4210093674"],"apc_list":null,"apc_paid":null,"fwci":4.3091,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.95230069,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"31","issue":"17","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.934535801410675},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8141443133354187},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7325417399406433},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6574149131774902},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6338003277778625},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.6307615637779236},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5848416090011597},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5792053937911987},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5268441438674927},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5160329341888428},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4489153027534485},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.44651922583580017},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4390047788619995},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.43097203969955444},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4293314814567566},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41745516657829285},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4058145582675934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17743584513664246},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08090534806251526}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.934535801410675},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8141443133354187},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7325417399406433},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6574149131774902},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6338003277778625},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.6307615637779236},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5848416090011597},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5792053937911987},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5268441438674927},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5160329341888428},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4489153027534485},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.44651922583580017},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4390047788619995},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.43097203969955444},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4293314814567566},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41745516657829285},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4058145582675934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17743584513664246},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08090534806251526},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1142/s0218126622503029","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622503029","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},{"id":"pmh:oai:eprints.mdx.ac.uk:35500","is_oa":false,"landing_page_url":"https://eprints.mdx.ac.uk/35500/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400025","display_name":"Middlesex University Research Repository (Middlesex University Of London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60488453","host_organization_name":"Middlesex University","host_organization_lineage":["https://openalex.org/I60488453"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2792736988","https://openalex.org/W2887944710","https://openalex.org/W2896341513","https://openalex.org/W2951220223","https://openalex.org/W2972189363","https://openalex.org/W3004698598","https://openalex.org/W3020985685","https://openalex.org/W3038549562","https://openalex.org/W3039088822","https://openalex.org/W3091722391","https://openalex.org/W3095634879","https://openalex.org/W3097409240","https://openalex.org/W3167854433","https://openalex.org/W3168798228","https://openalex.org/W3174894387","https://openalex.org/W3186745756","https://openalex.org/W4251506134","https://openalex.org/W4256347474"],"related_works":["https://openalex.org/W4321369474","https://openalex.org/W4299822940","https://openalex.org/W2279398222","https://openalex.org/W4313563103","https://openalex.org/W2968586400","https://openalex.org/W3156786002","https://openalex.org/W4366492315","https://openalex.org/W2546942002","https://openalex.org/W2810053714","https://openalex.org/W2946016983"],"abstract_inverted_index":{"Malicious":[0],"attacks":[1],"to":[2,63,119,137,159,164,181],"software":[3,23],"applications":[4],"are":[5,83],"on":[6],"the":[7,37,98,107,161,200,204],"rise":[8],"as":[9,116],"more":[10,214],"people":[11],"use":[12],"Internet":[13],"of":[14,56,97,109],"things":[15],"(IoT)":[16],"devices":[17],"and":[18,79,89,113,184,192,220],"high-speed":[19],"internet.":[20],"When":[21],"a":[22,31,44,54,86,120,127,171,213],"system":[24],"crash":[25],"happens":[26],"caused":[27],"by":[28,105],"malicious":[29],"action,":[30],"malware":[32,46,68,155,166,178],"imaging":[33],"method":[34,48,216],"can":[35],"examine":[36],"application.":[38],"In":[39,157],"this":[40],"study,":[41],"we":[42,169],"present":[43],"novel":[45],"classification":[47,95,179,218],"that":[49,134,203],"captures":[50],"suspected":[51],"operations":[52],"in":[53],"variety":[55],"discrete":[57],"size":[58],"image":[59,81,196],"features,":[60],"allowing":[61],"us":[62],"identify":[64],"such":[65],"IoT":[66],"device":[67],"families.":[69,156],"To":[70],"decrease":[71],"deep":[72,100],"neural":[73,128],"network":[74,129,139],"training":[75],"time,":[76],"essential":[77],"local":[78,88],"global":[80,90],"features":[82,211],"selected":[84],"using":[85,114,188],"combined":[87],"feature":[91],"descriptor":[92],"(LBP-GLCM).":[93],"The":[94,142,174],"performance":[96,147,219],"proposed":[99,162,175],"learning":[101],"model":[102],"is":[103,126,135,212],"improved":[104,177],"combining":[106],"predictions":[108],"weak":[110],"learners":[111],"(CNNs)":[112],"them":[115],"knowledge":[117],"input":[118],"multi-layer":[121],"perceptron":[122],"meta":[123],"learner.":[124],"This":[125],"ensemble":[130,207],"with":[131,208],"stacked":[132,205],"generalization":[133,140,206],"used":[136,145],"improve":[138],"ability.":[141],"public":[143],"dataset":[144],"for":[146,217],"evaluation":[148],"contains":[149],"5472":[150],"samples":[151],"from":[152],"11":[153],"different":[154],"order":[158],"compare":[160],"methodology":[163],"current":[165],"detection":[167],"systems,":[168],"developed":[170],"baseline":[172],"experiment.":[173],"approach":[176],"results":[180,201],"98.5%":[182],"accuracy":[183,186],"98.4%":[185],"when":[187],"[Formula:":[189,193],"see":[190,194],"text]":[191,195],"sizes,":[197],"respectively.":[198],"Overall,":[199],"showed":[202],"multi-step":[209],"extracting":[210],"effective":[215],"response":[221],"time.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
