{"id":"https://openalex.org/W4224305170","doi":"https://doi.org/10.1145/3536425","title":"SETTI: A <u>S</u> elf-supervised Adv <u>E</u> rsarial Malware De <u>T</u> ection Archi <u>T</u> ecture in an <u>I</u> oT Environment","display_name":"SETTI: A <u>S</u> elf-supervised Adv <u>E</u> rsarial Malware De <u>T</u> ection Archi <u>T</u> ecture in an <u>I</u> oT Environment","publication_year":2022,"publication_date":"2022-05-17","ids":{"openalex":"https://openalex.org/W4224305170","doi":"https://doi.org/10.1145/3536425"},"language":"en","primary_location":{"id":"doi:10.1145/3536425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3536425","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035972771","display_name":"Marjan Golmaryami","orcid":"https://orcid.org/0000-0001-5139-1214"},"institutions":[{"id":"https://openalex.org/I204490172","display_name":"Shiraz University of Technology","ror":"https://ror.org/04bxa3v83","country_code":"IR","type":"education","lineage":["https://openalex.org/I204490172"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Marjan Golmaryami","raw_affiliation_strings":["Computer Engineering and Information Technology Department, ShirazUniversity of Technology, Modares Blv, Shiraz, Farse, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and Information Technology Department, ShirazUniversity of Technology, Modares Blv, Shiraz, Farse, Iran","institution_ids":["https://openalex.org/I204490172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027232901","display_name":"Rahim Taheri","orcid":"https://orcid.org/0000-0002-4078-3105"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]},{"id":"https://openalex.org/I4210119896","display_name":"King's College School","ror":"https://ror.org/02bbqcn27","country_code":"GB","type":"education","lineage":["https://openalex.org/I4210119896"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rahim Taheri","raw_affiliation_strings":["King\u2019s Communications, Learning and Information Processing (kclip) lab, King\u2019s College London, London, United Kingdom","King's Communications, Learning and Information Processing (kclip) lab, King's College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"King\u2019s Communications, Learning and Information Processing (kclip) lab, King\u2019s College London, London, United Kingdom","institution_ids":["https://openalex.org/I183935753","https://openalex.org/I4210119896"]},{"raw_affiliation_string":"King's Communications, Learning and Information Processing (kclip) lab, King's College London, London, United Kingdom","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044099416","display_name":"Zahra Pooranian","orcid":"https://orcid.org/0000-0003-3767-0377"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zahra Pooranian","raw_affiliation_strings":["5GIC &amp; 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"],"affiliations":[{"raw_affiliation_string":"5GIC &amp; 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022893278","display_name":"Mohammad Shojafar","orcid":"https://orcid.org/0000-0003-3284-5086"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mohammad Shojafar","raw_affiliation_strings":["5GIC &amp; 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"],"affiliations":[{"raw_affiliation_string":"5GIC &amp; 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002566516","display_name":"Pei Xiao","orcid":"https://orcid.org/0000-0002-7886-5878"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pei Xiao","raw_affiliation_strings":["5GIC &amp; 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom"],"affiliations":[{"raw_affiliation_string":"5GIC &amp; 6GIC, Institute for Communication Systems (ICS), University of Surrey, United Kingdom","institution_ids":["https://openalex.org/I28290843"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035972771"],"corresponding_institution_ids":["https://openalex.org/I204490172"],"apc_list":null,"apc_paid":null,"fwci":2.6746,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.90266307,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"18","issue":"2s","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8961086273193359},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7996888160705566},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7993418574333191},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7415961623191833},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5150022506713867},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5072819590568542},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.48168429732322693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4642968773841858},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4309741258621216},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.329550176858902}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8961086273193359},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7996888160705566},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7993418574333191},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7415961623191833},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5150022506713867},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5072819590568542},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48168429732322693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4642968773841858},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4309741258621216},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.329550176858902},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3536425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3536425","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},{"id":"pmh:oai:alma.44SUR_INST:11161670960002346","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W343636949","https://openalex.org/W1495267108","https://openalex.org/W1538021842","https://openalex.org/W1661167618","https://openalex.org/W1921093919","https://openalex.org/W1945616565","https://openalex.org/W1973403081","https://openalex.org/W1994550352","https://openalex.org/W2108598243","https://openalex.org/W2144796873","https://openalex.org/W2180612164","https://openalex.org/W2510535264","https://openalex.org/W2531563875","https://openalex.org/W2540977243","https://openalex.org/W2552414813","https://openalex.org/W2599837529","https://openalex.org/W2604909019","https://openalex.org/W2640329709","https://openalex.org/W2738263528","https://openalex.org/W2782729947","https://openalex.org/W2785325870","https://openalex.org/W2799758613","https://openalex.org/W2800331776","https://openalex.org/W2803187616","https://openalex.org/W2808834459","https://openalex.org/W2887997457","https://openalex.org/W2891205429","https://openalex.org/W2891649471","https://openalex.org/W2898424515","https://openalex.org/W2905631704","https://openalex.org/W2913266441","https://openalex.org/W2962784289","https://openalex.org/W2962904108","https://openalex.org/W2963583471","https://openalex.org/W2963826423","https://openalex.org/W2963878474","https://openalex.org/W2963891416","https://openalex.org/W2964292098","https://openalex.org/W2967043539","https://openalex.org/W2990408345","https://openalex.org/W2996035354","https://openalex.org/W3009006131","https://openalex.org/W3011235318","https://openalex.org/W3011411500","https://openalex.org/W3021378896","https://openalex.org/W3028938032","https://openalex.org/W3034930876","https://openalex.org/W3043229062","https://openalex.org/W3081809735","https://openalex.org/W3098250197","https://openalex.org/W3104038788","https://openalex.org/W3105084609","https://openalex.org/W3109340983","https://openalex.org/W3113308842","https://openalex.org/W3122864121","https://openalex.org/W3160039201","https://openalex.org/W3165205057","https://openalex.org/W3214479671","https://openalex.org/W4206897074","https://openalex.org/W4214893179","https://openalex.org/W4242073862","https://openalex.org/W4287824654","https://openalex.org/W4288404646","https://openalex.org/W4293580221","https://openalex.org/W4293846201","https://openalex.org/W4297808394","https://openalex.org/W4300511536","https://openalex.org/W4328028508","https://openalex.org/W6719080892"],"related_works":["https://openalex.org/W4366249425","https://openalex.org/W3204946594","https://openalex.org/W3216063557","https://openalex.org/W2900235625","https://openalex.org/W2053293719","https://openalex.org/W3083187169","https://openalex.org/W2594153842","https://openalex.org/W4299804850","https://openalex.org/W4312707592","https://openalex.org/W3124408655"],"abstract_inverted_index":{"In":[0,95,238],"recent":[1,199],"years,":[2],"malware":[3,37,53,79,154,179],"detection":[4,54,180],"has":[5,218],"become":[6],"an":[7,73],"active":[8],"research":[9,48],"topic":[10],"in":[11,68,80,125,139,211],"the":[12,61,96,116,121,140,159,178,184,189,207,212,215,219,224,231,239,242,246,253],"area":[13],"of":[14,16,29,60,86,206,227],"Internet":[15],"Things":[17],"(IoT)":[18],"security.":[19],"The":[20,112,127],"principle":[21],"is":[22,49,245],"to":[23,55,135,151,168,176,236,258],"exploit":[24],"knowledge":[25],"from":[26,223,234,256],"large":[27],"quantities":[28],"continuously":[30],"generated":[31],"malware.":[32],"Existing":[33],"algorithms":[34],"practise":[35],"available":[36],"features":[38],"for":[39,77],"IoT":[40,63,81,87,117,200],"devices":[41],"and":[42,109,120,155,191,203],"lack":[43],"real-time":[44,58],"prediction":[45],"behaviours.":[46],"More":[47],"thus":[50],"required":[51],"on":[52,197],"cope":[56],"with":[57],"misclassification":[59],"input":[62,118],"data.":[64],"Motivated":[65],"by":[66,229],"this,":[67],"this":[69],"article,":[70],"we":[71,99,163,194],"propose":[72],"adversarial":[74,122,132,137,153,173],"self-supervised":[75,102,141,160,174],"architecture":[76,181],"detecting":[78],"networks,":[82],"SETTI,":[83],"considering":[84],"samples":[85,138],"network":[88,133],"traffic":[89],"that":[90,210,250],"may":[91],"not":[92],"be":[93],"labeled.":[94],"SETTI":[97],"architecture,":[98],"design":[100],"three":[101,146],"attack":[103,190],"techniques,":[104],"namely,":[105,172],"Self-MDS":[106,113,216],",":[107],"GSelf-MDS,":[108],"ASelf-MDS":[110,144,243],".":[111],"method":[114,167,217,244],"considers":[115],"data":[119],"sample":[123,149],"generation":[124],"real-time.":[126],"GSelf-MDS":[128],"builds":[129],"a":[130,165],"generative":[131],"model":[134],"generate":[136],"structure.":[142],"Finally,":[143],"utilises":[145],"well-known":[147],"perturbation":[148],"techniques":[150],"develop":[152],"inject":[156],"it":[157],"over":[158],"architecture.":[161],"Also,":[162],"apply":[164],"defence":[166,192],"mitigate":[169],"these":[170],"attacks,":[171],"training,":[175],"protect":[177],"against":[182],"injecting":[183],"malicious":[185],"samples.":[186],"To":[187],"validate":[188],"algorithms,":[193],"conduct":[195],"experiments":[196],"two":[198],"datasets:":[201],"IoT23":[202,213],"NBIoT.":[204],"Comparison":[205],"results":[208],"shows":[209],"dataset,":[214,241],"most":[220,247],"damaging":[221],"consequences":[222],"attacker\u2019s":[225],"point":[226],"view":[228],"reducing":[230],"accuracy":[232,254],"rate":[233,255],"98%":[235,257],"74%.":[237],"NBIoT":[240],"devastating":[248],"algorithm":[249],"can":[251],"plunge":[252],"77%.":[259]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
