{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:34:06Z","timestamp":1769207646706,"version":"3.49.0"},"reference-count":24,"publisher":"World Scientific Pub Co Pte Ltd","issue":"17","funder":[{"name":"Zhoukou Normal University High Level Talent Scientifc Research","award":["ZKNUC2021027"],"award-info":[{"award-number":["ZKNUC2021027"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p> Malicious attacks to software applications are on the rise as more people use Internet of things\u00a0(IoT) devices\u00a0and high-speed internet. When a software system crash happens caused by malicious action, a malware imaging method can examine the application. In this study, we present a novel malware classification method that captures suspected operations in a variety of discrete size image features, allowing us to identify such IoT device malware families. To decrease deep neural network training time, essential local and global image features are selected using a combined local and global feature descriptor (LBP-GLCM). The classification performance of the proposed deep learning model is improved by combining the predictions of weak learners (CNNs) and using them as knowledge input to a multi-layer perceptron meta learner. This is a neural network ensemble with stacked generalization that is used to improve network generalization ability. The public dataset used for performance evaluation contains 5472 samples from 11 different malware families. In order to compare the proposed methodology to current malware detection systems, we developed a baseline experiment. The proposed approach improved malware classification results to 98.5% accuracy and 98.4% accuracy when using [Formula: see text] and [Formula: see text] image sizes, respectively. Overall, the results showed that the stacked generalization ensemble with multi-step extracting features is a more effective method for classification performance and response time. <\/jats:p>","DOI":"10.1142\/s0218126622503029","type":"journal-article","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T14:35:19Z","timestamp":1655476519000},"source":"Crossref","is-referenced-by-count":28,"title":["A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things"],"prefix":"10.1142","volume":"31","author":[{"given":"Hamad","family":"Naeem","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, Henan, P. R. China"}]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Middlesex University, London NW4 4BT, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1030-1275","authenticated-orcid":false,"given":"Farhan","family":"Ullah","sequence":"additional","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Xi\u2019an 710072, Shaanxi, P. R. China"}]},{"given":"Sohail","family":"Jabbar","sequence":"additional","affiliation":[{"name":"Department of Computational Sciences, The University of Faisalabad, Faisalabad 38000, Pakistan"}]},{"given":"Shi","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, Henan, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"S0218126622503029BIB001","first-page":"103","volume":"4","author":"Uppal D.","year":"2014","journal-title":"Int. J. Comput. Sci. Appl."},{"key":"S0218126622503029BIB002","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.3233\/JIFS-169424","volume":"34","author":"Vinayakumar R.","year":"2018","journal-title":"J. Intelli. Fuzzy Syst."},{"key":"S0218126622503029BIB003","first-page":"1677","volume-title":"2017 Int. Conf. Advances in Computing, Communications and Informatics (ICACCI)","author":"Vinayakumar R.","year":"2017"},{"key":"S0218126622503029BIB004","doi-asserted-by":"crossref","first-page":"124579","DOI":"10.1109\/ACCESS.2020.3006143","volume":"8","author":"Liu K.","year":"2020","journal-title":"IEEE Access"},{"key":"S0218126622503029BIB005","doi-asserted-by":"crossref","first-page":"181102","DOI":"10.1109\/ACCESS.2020.3028370","volume":"8","author":"Wang Z.","year":"2020","journal-title":"IEEE Access"},{"issue":"3","key":"S0218126622503029BIB006","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1109\/COMST.2021.3086475","volume":"23","author":"Zhao J.","year":"2021","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"S0218126622503029BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079574"},{"key":"S0218126622503029BIB008","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42452-020-3132-2","volume":"2","author":"\u00dcnver H. M.","year":"2020","journal-title":"SN Appl. Sci."},{"key":"S0218126622503029BIB009","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/ITOEC.2018.8740537","volume-title":"2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC)","author":"Chen H.","year":"2018"},{"key":"S0218126622503029BIB010","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/IoTaIS47347.2019.8980412","volume-title":"2019 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS)","author":"Darus F. M.","year":"2019"},{"key":"S0218126622503029BIB011","first-page":"020015","volume-title":"AIP Conf. Proc.","volume":"1967","author":"Huang W.","year":"2018"},{"key":"S0218126622503029BIB012","first-page":"8154","volume":"9","author":"Keping Y.","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"S0218126622503029BIB013","author":"Tan L.","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"S0218126622503029BIB014","first-page":"261","volume-title":"Proc. 2020 6th Int. Conf. Computing and Artificial Intelligence","author":"Gu S.","year":"2020"},{"key":"S0218126622503029BIB015","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/3264746.3264780","volume-title":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","author":"Jung J.","year":"2018"},{"key":"S0218126622503029BIB016","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.3390\/sym13071107","volume":"13","author":"Zhang W.","year":"2021","journal-title":"Symmetry"},{"key":"S0218126622503029BIB017","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/LES.2020.3035875","volume":"13","author":"Lachtar N.","year":"2020","journal-title":"IEEE Embedded Syst. Lett."},{"key":"S0218126622503029BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3035520"},{"key":"S0218126622503029BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000374"},{"key":"S0218126622503029BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2019.01.007"},{"key":"S0218126622503029BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937347"},{"key":"S0218126622503029BIB023","first-page":"3756","volume":"13","author":"Naeem H.","year":"2019","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"S0218126622503029BIB024","doi-asserted-by":"crossref","first-page":"102154","DOI":"10.1016\/j.adhoc.2020.102154","volume":"105","author":"Naeem H.","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"S0218126622503029BIB025","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11416-020-00350-2","volume":"16","author":"Mercaldo F.","year":"2020","journal-title":"J. Computer Virol. Hacking Tech."}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126622503029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T10:25:16Z","timestamp":1669199116000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126622503029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":24,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1142\/S0218126622503029"],"URL":"https:\/\/doi.org\/10.1142\/s0218126622503029","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"value":"0218-1266","type":"print"},{"value":"1793-6454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,18]]},"article-number":"2250302"}}