{"id":"https://openalex.org/W4224305170","doi":"https://doi.org/10.1145/3536425","title":"SETTI: A S elf-supervised Adv E rsarial Malware De T ection Archi T ecture in an I oT Environment","display_name":"SETTI: A S elf-supervised Adv E rsarial Malware De T ection Archi T ecture in an I oT Environment","publication_year":2022,"publication_date":"2022-06-30","ids":{"openalex":"https://openalex.org/W4224305170","doi":"https://doi.org/10.1145/3536425"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3536425","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://openresearch.surrey.ac.uk/view/delivery/44SUR_INST/12161670950002346/13161670940002346","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035972771","display_name":"Marjan Golmaryami","orcid":"https://orcid.org/0000-0001-5139-1214"},"institutions":[{"id":"https://openalex.org/I204490172","display_name":"Shiraz University of Technology","ror":"https://ror.org/04bxa3v83","country_code":"IR","type":"education","lineage":["https://openalex.org/I204490172"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Golmaryami, Marjan","raw_affiliation_string":"Computer Engineering and Information Technology Department, ShirazUniversity of Technology, Modares Blv, Shiraz, Farse, Iran","raw_affiliation_strings":["Computer Engineering and Information Technology Department, ShirazUniversity of Technology, Modares Blv, Shiraz, Farse, Iran"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027232901","display_name":"Rahim Taheri","orcid":"https://orcid.org/0000-0002-4078-3105"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Taheri, Rahim","raw_affiliation_string":"King\u2019s Communications, Learning and Information Processing (kclip) lab, King\u2019s College London, London, United Kingdom","raw_affiliation_strings":["King\u2019s Communications, Learning and Information Processing (kclip) lab, King\u2019s College London, London, United Kingdom"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044099416","display_name":"Zahra Pooranian","orcid":"https://orcid.org/0000-0003-3767-0377"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pooranian, Zahra","raw_affiliation_string":"5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom","raw_affiliation_strings":["5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022893278","display_name":"Mohammad Shojafar","orcid":"https://orcid.org/0000-0003-3284-5086"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shojafar, Mohammad","raw_affiliation_string":"5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom","raw_affiliation_strings":["5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"]},{"author_position":"last","author":{"id":"https://openalex.org/A5002566516","display_name":"Pei Xiao","orcid":"https://orcid.org/0000-0002-7886-5878"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiao, Pei","raw_affiliation_string":"5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom","raw_affiliation_strings":["5GIC & 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"]}],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":4,"cited_by_percentile_year":{"min":87,"max":89},"biblio":{"volume":"18","issue":"2s","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"ot environment","score":0.3632},{"keyword":"adv","score":0.3342},{"keyword":"ection archi","score":0.3098},{"keyword":"elf-supervised","score":0.25}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8961086},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7996888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79934186},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.74159616},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.51500225},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.50728196},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4816843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46429688},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.43097413},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32955018},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3536425","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://openresearch.surrey.ac.uk/view/delivery/44SUR_INST/12161670950002346/13161670940002346","pdf_url":"https://openresearch.surrey.ac.uk/view/delivery/44SUR_INST/12161670950002346/13161670940002346","source":{"id":"https://openalex.org/S4306402651","display_name":"Surrey Open Research repository (University of Surrey)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"host_organization":"https://openalex.org/I28290843","host_organization_name":"University of Surrey","host_organization_lineage":["https://openalex.org/I28290843"],"host_organization_lineage_names":["University of Surrey"],"type":"repository"},"license":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2204.07772","pdf_url":"https://arxiv.org/pdf/2204.07772","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://openresearch.surrey.ac.uk/view/delivery/44SUR_INST/12161670950002346/13161670940002346","pdf_url":"https://openresearch.surrey.ac.uk/view/delivery/44SUR_INST/12161670950002346/13161670940002346","source":{"id":"https://openalex.org/S4306402651","display_name":"Surrey Open Research repository (University of Surrey)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"host_organization":"https://openalex.org/I28290843","host_organization_name":"University of Surrey","host_organization_lineage":["https://openalex.org/I28290843"],"host_organization_lineage_names":["University of Surrey"],"type":"repository"},"license":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"referenced_works_count":42,"referenced_works":["https://openalex.org/W343636949","https://openalex.org/W1495267108","https://openalex.org/W1661167618","https://openalex.org/W1921093919","https://openalex.org/W1973403081","https://openalex.org/W1994550352","https://openalex.org/W2108598243","https://openalex.org/W2144796873","https://openalex.org/W2180612164","https://openalex.org/W2510535264","https://openalex.org/W2540977243","https://openalex.org/W2552414813","https://openalex.org/W2599837529","https://openalex.org/W2604909019","https://openalex.org/W2738263528","https://openalex.org/W2782729947","https://openalex.org/W2800331776","https://openalex.org/W2808834459","https://openalex.org/W2891205429","https://openalex.org/W2898424515","https://openalex.org/W2962784289","https://openalex.org/W2962904108","https://openalex.org/W2963583471","https://openalex.org/W2963826423","https://openalex.org/W2963878474","https://openalex.org/W2963891416","https://openalex.org/W2964292098","https://openalex.org/W2967043539","https://openalex.org/W3009006131","https://openalex.org/W3011235318","https://openalex.org/W3011411500","https://openalex.org/W3021378896","https://openalex.org/W3028938032","https://openalex.org/W3034930876","https://openalex.org/W3081809735","https://openalex.org/W3098250197","https://openalex.org/W3104038788","https://openalex.org/W3122864121","https://openalex.org/W3165205057","https://openalex.org/W3214479671","https://openalex.org/W4206897074","https://openalex.org/W4214893179"],"related_works":["https://openalex.org/W3204946594","https://openalex.org/W3216063557","https://openalex.org/W2900235625","https://openalex.org/W2053293719","https://openalex.org/W3083187169","https://openalex.org/W2594153842","https://openalex.org/W4299804850","https://openalex.org/W4312707592","https://openalex.org/W3124408655","https://openalex.org/W4366249425"],"ngrams_url":"https://api.openalex.org/works/W4224305170/ngrams","abstract_inverted_index":{"In":[0,95,238],"recent":[1,199],"years,":[2],"malware":[3,37,53,79,154,179],"detection":[4,54,180],"has":[5,218],"become":[6],"an":[7,73],"active":[8],"research":[9,48],"topic":[10],"in":[11,68,80,125,139,211],"the":[12,61,96,116,121,140,159,178,184,189,207,212,215,219,224,231,239,242,246,253],"area":[13],"of":[14,16,29,60,86,206,227],"Internet":[15],"Things":[17],"(IoT)":[18],"security.":[19],"The":[20,112,127],"principle":[21],"is":[22,49,245],"to":[23,55,135,151,168,176,236,258],"exploit":[24],"knowledge":[25],"from":[26,223,234,256],"large":[27],"quantities":[28],"continuously":[30],"generated":[31],"malware.":[32],"Existing":[33],"algorithms":[34],"practise":[35],"available":[36],"features":[38],"for":[39,77],"IoT":[40,63,81,87,117,200],"devices":[41],"and":[42,109,120,155,191,203],"lack":[43],"real-time":[44,58],"prediction":[45],"behaviours.":[46],"More":[47],"thus":[50],"required":[51],"on":[52,197],"cope":[56],"with":[57],"misclassification":[59],"input":[62,118],"data.":[64],"Motivated":[65],"by":[66,229],"this,":[67],"this":[69],"article,":[70],"we":[71,99,163,194],"propose":[72],"adversarial":[74,122,132,137,153,173],"self-supervised":[75,102,141,160,174],"architecture":[76,181],"detecting":[78],"networks,":[82],"SETTI,":[83],"considering":[84],"samples":[85,138],"network":[88,133],"traffic":[89],"that":[90,210,250],"may":[91],"not":[92],"be":[93],"labeled.":[94],"SETTI":[97],"architecture,":[98],"design":[100],"three":[101,146],"attack":[103,190],"techniques,":[104],"namely,":[105,172],"Self-MDS":[106,113,216],",":[107],"GSelf-MDS,":[108],"ASelf-MDS":[110,144,243],".":[111],"method":[114,167,217,244],"considers":[115],"data":[119],"sample":[123,149],"generation":[124],"real-time.":[126],"GSelf-MDS":[128],"builds":[129],"a":[130,165],"generative":[131],"model":[134],"generate":[136],"structure.":[142],"Finally,":[143],"utilises":[145],"well-known":[147],"perturbation":[148],"techniques":[150],"develop":[152],"inject":[156],"it":[157],"over":[158],"architecture.":[161],"Also,":[162],"apply":[164],"defence":[166,192],"mitigate":[169],"these":[170],"attacks,":[171],"training,":[175],"protect":[177],"against":[182],"injecting":[183],"malicious":[185],"samples.":[186],"To":[187],"validate":[188],"algorithms,":[193],"conduct":[195],"experiments":[196],"two":[198],"datasets:":[201],"IoT23":[202,213],"NBIoT.":[204],"Comparison":[205],"results":[208],"shows":[209],"dataset,":[214,241],"most":[220,247],"damaging":[221],"consequences":[222],"attacker\u2019s":[225],"point":[226],"view":[228],"reducing":[230],"accuracy":[232,254],"rate":[233,255],"98%":[235,257],"74%.":[237],"NBIoT":[240],"devastating":[248],"algorithm":[249],"can":[251],"plunge":[252],"77%.":[259]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4224305170","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2024-03-06T12:57:27.114348","created_date":"2022-04-26"}