{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:15:28Z","timestamp":1743063328930,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031141782"},{"type":"electronic","value":"9783031141799"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14179-9_16","type":"book-chapter","created":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:02:47Z","timestamp":1662332567000},"page":"239-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Proposal for\u00a0FPGA-Accelerated Deep Learning Ensembles in\u00a0MPSoC Platforms Applied to\u00a0Malware Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1685-8736","authenticated-orcid":false,"given":"Alessandro","family":"Cilardo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1631-1597","authenticated-orcid":false,"given":"Vincenzo","family":"Maisto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0401-9687","authenticated-orcid":false,"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4099-5244","authenticated-orcid":false,"given":"Franca","family":"Rocco di Torrepadula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abdelsalam, M., Krishnan, R., Huang, Y., Sandhu, R.: Malware detection in cloud infrastructures using convolutional neural networks. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 162\u2013169. IEEE (2018)","DOI":"10.1109\/CLOUD.2018.00028"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Alhalabi, B., Gaber, M.M., Basura, S.: MicroNets: a multi-phase pruning pipeline to deep ensemble learning in IoT devices. Comput. Electr. Eng. 96, 107581 (2021)","DOI":"10.1016\/j.compeleceng.2021.107581"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Azmandian, F., Moffie, M., Alshawabkeh, M., Dy, J., Aslam, J., Kaeli, D.: Virtual machine monitor-based lightweight intrusion detection. ACM SIGOPS Oper. Syst. Rev. 45(2), 38\u201353 (2011)","DOI":"10.1145\/2007183.2007189"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.sysarc.2019.01.007","volume":"98","author":"AG Blaiech","year":"2019","unstructured":"Blaiech, A.G., Khalifa, K.B., Valderrama, C., Fernandes, M.A., Bedoui, M.H.: A survey and taxonomy of FPGA-based deep learning accelerators. J. Syst. Architect. 98, 331\u2013345 (2019)","journal-title":"J. Syst. Architect."},{"key":"16_CR5","doi-asserted-by":"publisher","unstructured":"Chen, Y.H., Krishna, T., Emer, J.S., Sze, V.: Eyeriss: an energy-efficient reconfigurable accelerator for deep convolutional neural networks. IEEE J. Solid-State Circuits 52(1), 127\u2013138 (2017). https:\/\/doi.org\/10.1109\/JSSC.2016.2616357","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Courbariaux, M., Hubara, I., Soudry, D., El-Yaniv, R., Bengio, Y.: Binarized neural networks: training deep neural networks with weights and activations constrained to +1 or $$-$$1 (2016). https:\/\/doi.org\/10.48550\/ARXIV.1602.02830","DOI":"10.48550\/ARXIV.1602.02830"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Farhadi, M., Ghasemi, M., Yang, Y.: A novel design of adaptive and hierarchical convolutional neural networks using partial reconfiguration on FPGA. In: 2019 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1\u20137 (2019). https:\/\/doi.org\/10.1109\/HPEC.2019.8916237","DOI":"10.1109\/HPEC.2019.8916237"},{"key":"16_CR8","unstructured":"Garfinkel, T., Rosenblum, M., et al.: A virtual machine introspection based architecture for intrusion detection. In: NDSS, vol. 3, pp. 191\u2013206. Citeseer (2003)"},{"issue":"1","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/neco.1992.4.1.1","volume":"4","author":"S Geman","year":"1992","unstructured":"Geman, S., Bienenstock, E., Doursat, R.: Neural networks and the bias\/variance dilemma. Neural Comput. 4(1), 1\u201358 (1992)","journal-title":"Neural Comput."},{"key":"16_CR10","doi-asserted-by":"publisher","unstructured":"Guan, Y., Yuan, Z., Sun, G., Cong, J.: FPGA-based accelerator for long short-term memory recurrent neural networks. In: 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 629\u2013634 (2017). https:\/\/doi.org\/10.1109\/ASPDAC.2017.7858394","DOI":"10.1109\/ASPDAC.2017.7858394"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Hebbal, Y., Laniepce, S., Menaud, J.M.: Virtual machine introspection: techniques and applications. In: 2015 10th International Conference on Availability, Reliability and Security, pp. 676\u2013685. IEEE (2015)","DOI":"10.1109\/ARES.2015.43"},{"key":"16_CR12","unstructured":"Intel\u00ae: Intel\u00ae Architecture Instruction Set Extensions and Future Features (2021)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Kalash, M., Rochan, M., Mohammed, N., Bruce, N.D., Wang, Y., Iqbal, F.: Malware classification with deep convolutional neural networks. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp. 1\u20137 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"16_CR15","doi-asserted-by":"publisher","unstructured":"Pinneterre, S., Chiotakis, S., Paolino, M., Raho, D.: vFPGAmanager: a virtualization framework for orchestrated FPGA accelerator sharing in 5G cloud environments. In: 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/BMSB.2018.8436930","DOI":"10.1109\/BMSB.2018.8436930"},{"issue":"9","key":"16_CR16","doi-asserted-by":"publisher","first-page":"8852","DOI":"10.1109\/JIOT.2020.2996425","volume":"7","author":"M Saharkhizan","year":"2020","unstructured":"Saharkhizan, M., Azmoodeh, A., Dehghantanha, A., Choo, K.K.R., Parizi, R.M.: An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J. 7(9), 8852\u20138859 (2020)","journal-title":"IEEE Internet Things J."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Sang, D.V., Cuong, D.M., Cuong, L.T.B.: An effective ensemble deep learning framework for malware detection. In: Proceedings of the Ninth International Symposium on Information and Communication Technology, pp. 192\u2013199 (2018)","DOI":"10.1145\/3287921.3287971"},{"key":"16_CR18","doi-asserted-by":"publisher","unstructured":"Seyoum, B., Pagani, M., Biondi, A., Balleri, S., Buttazzo, G.: Spatio-temporal optimization of deep neural networks for reconfigurable FPGA SoCs. IEEE Trans. Comput. 70(11), 1988\u20132000 (2021). https:\/\/doi.org\/10.1109\/TC.2020.3033730","DOI":"10.1109\/TC.2020.3033730"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"16_CR20","doi-asserted-by":"publisher","unstructured":"Umuroglu, Y., et al.: FINN: a framework for fast, scalable binarized neural network inference. In: Proceedings of the 2017 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays. ACM, February 2017. https:\/\/doi.org\/10.1145\/3020078.3021744","DOI":"10.1145\/3020078.3021744"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Vanerio, J., Casas, P.: Ensemble-learning approaches for network security and anomaly detection. In: Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, pp. 1\u20136 (2017)","DOI":"10.1145\/3098593.3098594"},{"key":"16_CR22","doi-asserted-by":"publisher","unstructured":"Vu, D.V., Sander, O., Sandmann, T., Baehr, S., Heidelberger, J., Becker, J.: Enabling partial reconfiguration for coprocessors in mixed criticality multicore systems using PCI express single-root I\/O virtualization. In: 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14), pp. 1\u20136 (2014). https:\/\/doi.org\/10.1109\/ReConFig.2014.7032516","DOI":"10.1109\/ReConFig.2014.7032516"},{"key":"16_CR23","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019)","journal-title":"IEEE Access"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Yan, J., Qi, Y., Rao, Q.: Detecting malware with an ensemble method based on deep neural network. Secur. Commun. Netw. 2018, 1\u201316 (2018)","DOI":"10.1155\/2018\/7247095"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Yao, W., Zhang, K., Yu, C., Zhao, H.: Exploiting ensemble learning for edge-assisted anomaly detection scheme in e-healthcare system. In: 2021 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/GLOBECOM46510.2021.9685745"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14179-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:19:48Z","timestamp":1662333588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14179-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031141782","9783031141799"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14179-9_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"5 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Talavera de la Reina","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}