{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:47:59Z","timestamp":1772502479530,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Brazilian National Council for Scientific and Technological Development (CNPq)","award":["304990\/2021-3"],"award-info":[{"award-number":["304990\/2021-3"]}]},{"name":"Brazilian National Council for Scientific and Technological Development (CNPq)","award":["407879\/2023-4"],"award-info":[{"award-number":["407879\/2023-4"]}]},{"name":"Brazilian National Council for Scientific and Technological Development (CNPq)","award":["302937\/2023-4"],"award-info":[{"award-number":["302937\/2023-4"]}]},{"name":"Brazilian National Council for Scientific and Technological Development (CNPq)","award":["442262\/2024-8"],"award-info":[{"award-number":["442262\/2024-8"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707974","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:21Z","timestamp":1747247181000},"page":"730-737","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Early Exit Deep Neural Network for Fast Inference Intrusion Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7088-1758","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Simioni","sequence":"first","affiliation":[{"name":"Pontifical Catholic University of Paran\u00e1, Curitiba, PR, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5050-6363","authenticated-orcid":false,"given":"Eduardo Kugler","family":"Viegas","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Paran\u00e1, Curitiba, PR, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2341-2177","authenticated-orcid":false,"given":"Altair","family":"Santin","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Paran\u00e1, Curitiba, PR, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3036-0210","authenticated-orcid":false,"given":"Pedro","family":"Horchulhack","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Paran\u00e1, Curitiba, PR, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"August 2023 (accessed October 5 2023). Mid-Year Update: 2023 SonicWall Cyber Threat Report. https:\/\/www.sonicwall.com\/medialibrary\/en\/white-paper\/midyear-2023-cyber-threat-report.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"D. W. Coit A. Konak and A. E. Smith. 2006. Multi-Objective Optimization Using Genetic Algorithms: A Tutorial. Reliability Engineering System Safety 91 (2006).","DOI":"10.1016\/j.ress.2005.11.018"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107784"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc51644.2023.10060381"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103839"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc61514.2024.10592364"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/icra48891.2023.10161183"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469116.3470012"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Edge AI: On-Demand Accelerating Deep Neural Network Inference via Edge Computing","volume":"19","author":"Li En","year":"2020","unstructured":"En Li, Liekang Zeng, Zhi Zhou, and Xu Chen. 2020. Edge AI: On-Demand Accelerating Deep Neural Network Inference via Edge Computing. IEEE Transactions on Wireless Communications 19, 1 (Jan. 2020), 447\u2013457.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148944"},{"key":"e_1_3_2_1_14_1","unstructured":"MAWI. 2023. MAWI Working Group Traffic Archive - Samplepoint F. https:\/\/mawi.wide.ad.jp\/mawi\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3016246"},{"key":"e_1_3_2_1_17_1","volume-title":"Dept. Comput. Sci., Univ.","author":"Moore A.","unstructured":"A. Moore. 2005. Discriminators for use in flow-based classification. In Dept. Comput. Sci., Univ. London, London, U.K., Rep. RR-05-13."},{"key":"e_1_3_2_1_18_1","volume-title":"Dynamic Hierarchical Neural Network Offloading in IoT Edge Networks. In 2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN). IEEE.","author":"Seifeddine Wassim","year":"2021","unstructured":"Wassim Seifeddine, Cedric Adjih, and Nadjib Achir. 2021. Dynamic Hierarchical Neural Network Offloading in IoT Edge Networks. In 2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN). IEEE."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/iros55552.2023.10342460"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/icpr.2016.7900006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254495"},{"key":"e_1_3_2_1_22_1","volume-title":"A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization. Multimedia Tools and Applications (June","author":"Wang Yingqing","year":"2023","unstructured":"Yingqing Wang, Guihe Qin, Mi Zou, Yanhua Liang, Guofeng Wang, Kunpeng Wang, Yao Feng, and Zizhan Zhang. 2023. A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization. Multimedia Tools and Applications (June 2023)."},{"key":"e_1_3_2_1_23_1","volume-title":"An Ensemble-based Network Intrusion Detection Scheme with Bayesian Deep Learning. In IEEE International Conference on Communications (ICC). IEEE.","author":"Zhang Jielun","year":"2020","unstructured":"Jielun Zhang, Fuhao Li, and Feng Ye. 2020. An Ensemble-based Network Intrusion Detection Scheme with Bayesian Deep Learning. In IEEE International Conference on Communications (ICC). IEEE."}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:37Z","timestamp":1750298257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":23,"alternative-id":["10.1145\/3672608.3707974","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707974","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}