{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:51:41Z","timestamp":1775145101477,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:00:00Z","timestamp":1736553600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:00:00Z","timestamp":1736553600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,11]]},"DOI":"10.1109\/icce63647.2025.10929917","type":"proceedings-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:16:58Z","timestamp":1743041818000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["A Study on Transfer Learning TinyML-Based Intrusion Detection Framework on IoT Devices"],"prefix":"10.1109","author":[{"given":"Jedidah","family":"Mwaura","sequence":"first","affiliation":[{"name":"Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology,Fukuoka,Japan"}]},{"given":"Shunsuke","family":"Araki","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology,Faculty of Computer Science and Systems Engineering,Fukuoka,Japan"}]},{"given":"Muhammad Bisri","family":"Musthafa","sequence":"additional","affiliation":[{"name":"Graduate School of Environmental, Life, Natural Science and Technology, Okayama University,Okayama,Japan"}]},{"given":"Samsul","family":"Huda","sequence":"additional","affiliation":[{"name":"Okayama University,Green Innovation Center,Okayama,Japan"}]},{"given":"Yasuyuki","family":"Nogami","sequence":"additional","affiliation":[{"name":"Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology,Fukuoka,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/batteries9120580"},{"key":"ref2","volume-title":"Powering IoT Devices: Technologies and Opportunities","author":"Somov"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2016.071133"},{"key":"ref4","author":"Shirvani","year":"2024","journal-title":"Towards Sustainable IoT: Challenges, Solutions, and Future Directions for Device Longevity"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2043635.2043640"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2019.91321"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"},{"key":"ref8","volume-title":"Top 4 Popular Transfer Learning Models - Detailed Comparison","author":"Lendave"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icce59016.2024.10444344"},{"key":"ref10","volume-title":"Anatomy of an IoT malware attack","author":"Perry"},{"key":"ref11","volume-title":"Zscaler ThreatLabz 2023 \u2026 Increase in IoT Malware Attacks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2457491"},{"key":"ref13","volume-title":"What is a DDoS attack?"},{"key":"ref14","first-page":"11","article-title":"Analyzing of Zero Day Attack and its Identification Techniques","volume-title":"Proceedings of First Inter. Conf. on Advances in Compo & Comm. Eng.","volume":"1","author":"K","year":"2014"},{"issue":"4","key":"ref15","article-title":"Benefits, challenges, and opportunities in adoption of Industrial IoT","volume":"2","author":"Chowdhurya","year":"2019","journal-title":"Inter. Journal of Computational Intelligence & IoT"},{"key":"ref16","volume-title":"Deploy machine learning models on mobile and edge devices"},{"key":"ref17","volume-title":"Models API","author":"Team"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s20226578"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s23063253"},{"issue":"3","key":"ref22","first-page":"47","article-title":"IOT-MDEDTL: IoT Malware Detection based on Ensemble Deep Transfer Learning","volume":"16","author":"Kh Kadhim","year":"2022","journal-title":"Majlesi Journal of Electrical Engineering"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164770"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s22155621"},{"issue":"4","key":"ref25","first-page":"1326","article-title":"Transfer Learning Based Prototype for Zero-Day Attack Detection","volume":"8","author":"Sameera","year":"2019","journal-title":"Int. Journal of Eng. and Advanced Technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3233775"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112614"},{"key":"ref28","first-page":"022022","article-title":"An overview of overfitting and its solutions","volume-title":"Journal of physics: Conference series","volume":"1168","author":"Ying","year":"2019"},{"key":"ref29","first-page":"441","article-title":"The \u2018K\u2019 in K-fold Cross Validation","volume-title":"European Symposium on Artificial NN, Comp. Intelligence & ML","author":"Anguita","year":"2012"},{"key":"ref30","volume-title":"Model conversion"},{"key":"ref31","volume-title":"A White Paper on Neural Network Quantization","author":"Nagel","year":"2021"}],"event":{"name":"2025 IEEE International Conference on Consumer Electronics (ICCE)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2025,1,11]]},"end":{"date-parts":[[2025,1,14]]}},"container-title":["2025 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10929765\/10929768\/10929917.pdf?arnumber=10929917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:19:54Z","timestamp":1743070794000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10929917\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icce63647.2025.10929917","relation":{},"subject":[],"published":{"date-parts":[[2025,1,11]]}}}