{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:47:49Z","timestamp":1774021669336,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825955","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"5542-5550","source":"Crossref","is-referenced-by-count":9,"title":["TinyML for Cybersecurity: Deploying Optimized Deep Learning Models for On-Device Threat Detection on Resource-Constrained Devices"],"prefix":"10.1109","author":[{"given":"Sonali","family":"Arcot","sequence":"first","affiliation":[{"name":"San Jose State University,Department of Applied Data Science,San Jose,USA"}]},{"given":"Mohammad","family":"Masum","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Science,San Jose,USA"}]},{"given":"Mohammad Shahidul","family":"Kader","sequence":"additional","affiliation":[{"name":"Auburn University,Atlanta,Georgia,USA"}]},{"given":"Agnik","family":"Saha","sequence":"additional","affiliation":[{"name":"Georgia State University,Department of Computer Science,Atlanta,Georgia"}]},{"given":"Mohammed","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"Western Illinois University,Macomb,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3294111"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ichi54592.2022.00047"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/mi13060851"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s23125696"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s23042344"},{"key":"ref6","article-title":"Benchmarking TinyML Systems: Challenges and direction","author":"Banbury","year":"2020"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/ICECCME52200.2021.9590959","article-title":"Implementation of Cyber Threat Intelligence Platform on Internet of Things (IoT) using TinyML Approach for Deceiving Cyber Invasion","volume-title":"2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)","author":"Dutta"},{"issue":"2","key":"ref8","first-page":"590","article-title":"Security at the edge for Resource-Limited IoT devices","volume-title":"Sensors","volume":"24","author":"Canavese","year":"2024"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/MASS56207.2022.00118","article-title":"Malware network traffic classification on the edge","volume-title":"2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)","author":"Chen"},{"key":"ref10","first-page":"108703","article-title":"On TinyML and cybersecurity: Electric vehicle charging infrastructure use case","volume-title":"IEEE Access","volume":"12","author":"Dehrouyeh","year":"2024"},{"issue":"9\u201310","key":"ref11","first-page":"573","article-title":"Traffic identification model based on generative adversarial deep convolutional network","volume-title":"Annals of Telecommunications","volume":"77","author":"Dong","year":"2021"},{"key":"ref12","first-page":"100461","article-title":"TinyML Meets IoT: A Comprehensive survey","volume-title":"Internet of Things","volume":"16","author":"Dutta","year":"2021"},{"key":"ref13","first-page":"100670","article-title":"Energy consumption of on-device machine learning models for IoT intrusion detection","volume-title":"Internet of Things","volume":"21","author":"Tekin","year":"2023"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1109\/WFCS60972.2024.10540991","article-title":"IIoT Intrusion Detection using Lightweight Deep Learning Models on Edge Devices","volume-title":"2024 IEEE 20th International Conference on Factory Communication Systems (WFCS)","author":"Ericson"},{"key":"ref15","article-title":"Compressing Deep Convolutional Networks using Vector Quantization","author":"Gong","year":"2014"},{"key":"ref16","first-page":"1135","article-title":"Learning both weights and connections for efficient neural networks","volume-title":"Neural Information Processing Systems","volume":"28","author":"Han","year":"2015"},{"key":"ref17","first-page":"630","article-title":"Identity mappings in deep residual networks","volume-title":"Lecture notes in computer science","author":"He","year":"2016"},{"issue":"1","key":"ref18","article-title":"Network traffic classification model based on attention mechanism and spatiotemporal features","volume-title":"EURASIP Journal on Information Security","volume":"2023","author":"Hu","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR.2018.00286","article-title":"Quantization and Training of Neural Networks for Efficient Integer-Arithmetic-Only Inference","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Jacob"},{"issue":"2","key":"ref21","article-title":"Beyond Firewalls: Navigating the jungle of emerging cybersecurity trends","volume-title":"Deleted Journal","volume":"2","author":"Jerbi","year":"2023"},{"key":"ref22","first-page":"91","article-title":"PcapWT: An efficient packet extraction tool for large volume network traces","volume-title":"Computer Networks","volume":"79","author":"Kim","year":"2015"},{"key":"ref23","article-title":"Accelerated machine learning for On-Device Hardware-Assisted cybersecurity in edge platforms","volume-title":"2022 23rd International Symposium on Quality Electronic Design (ISQED)","author":"Makrani"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1109\/GLOCOM.2018.8647679","article-title":"DNS Typo-Squatting Domain Detection: A Data Analytics & Machine Learning Based Approach","volume-title":"2018 IEEE Global Communications Conference (GLOBECOM)","author":"Moubayed"},{"key":"ref25","volume-title":"Ransomware PCAP repository"},{"issue":"4","key":"ref26","first-page":"1595","article-title":"A review on TinyML: State-of-the-art and prospects","volume-title":"Journal of King Saud University - Computer and Information Sciences","volume":"34","author":"Ray","year":"2022"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR.2018.00474","article-title":"MobileNetV2: Inverted residuals and linear bottlenecks","volume-title":"Google Inc","author":"Sandler"},{"issue":"12","key":"ref28","first-page":"363","article-title":"TinyML for Ultra-Low Power AI and Large Scale IoT Deployments: A Systematic Review","volume-title":"Future Internet","volume":"14","author":"Schizas","year":"2022"},{"issue":"5","key":"ref29","first-page":"821","article-title":"TSFN: A novel Malicious Traffic Classification Method using BERT and LSTM","volume-title":"Entropy","volume":"25","author":"Shi","year":"2023"},{"key":"ref30","volume-title":"TinyML","year":"2023"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1109\/MASSW.2019.00009","article-title":"Machine Learning for Security at the IoT Edge - A Feasibility Study","volume-title":"2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW)","author":"Wang"},{"key":"ref32","article-title":"EasyQuant: Post-training quantization via scale optimization","author":"Wu","year":"2020"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR.2018.00907","article-title":"Learning Transferable Architectures for Scalable Image Recognition","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Zoph"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825955.pdf?arnumber=10825955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:48:47Z","timestamp":1737100127000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825955","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}