{"id":"https://openalex.org/W7127038313","doi":"https://doi.org/10.1007/s12065-025-01133-8","title":"GA-optimized deep learning intrusion detection framework with LIME explainability for IoT networks","display_name":"GA-optimized deep learning intrusion detection framework with LIME explainability for IoT networks","publication_year":2026,"publication_date":"2026-02-01","ids":{"openalex":"https://openalex.org/W7127038313","doi":"https://doi.org/10.1007/s12065-025-01133-8"},"language":"en","primary_location":{"id":"doi:10.1007/s12065-025-01133-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12065-025-01133-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12065-025-01133-8.pdf","source":{"id":"https://openalex.org/S182392644","display_name":"Evolutionary Intelligence","issn_l":"1864-5909","issn":["1864-5909","1864-5917"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Evolutionary Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s12065-025-01133-8.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124698724","display_name":"Elijah M. Maseno","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Elijah M. Maseno","raw_affiliation_strings":["Department of Electrical and Electronic Engineering Science, University of Johannesburg, 5 Kingsway Ave, Rossmore, Johannesburg, 2092, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering Science, University of Johannesburg, 5 Kingsway Ave, Rossmore, Johannesburg, 2092, South Africa","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124719394","display_name":"Yanxia Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Yanxia Sun","raw_affiliation_strings":["Department of Electrical and Electronic Engineering Science, University of Johannesburg, 5 Kingsway Ave, Rossmore, Johannesburg, 2092, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering Science, University of Johannesburg, 5 Kingsway Ave, Rossmore, Johannesburg, 2092, South Africa","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124727576","display_name":"Zenghui Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Zenghui Wang","raw_affiliation_strings":["Department of Electrical Engineering, University of South Africa, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of South Africa, Johannesburg, South Africa","institution_ids":["https://openalex.org/I165390105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5124698724"],"corresponding_institution_ids":["https://openalex.org/I24027795"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24441466,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.003800000064074993,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.003000000026077032,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6444000005722046},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6362000107765198},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.6352999806404114},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5382999777793884},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4851999878883362},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.48089998960494995},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4803999960422516},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46480000019073486},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.44440001249313354}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8949999809265137},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6444000005722046},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6362000107765198},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.6352999806404114},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5927000045776367},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5547000169754028},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5382999777793884},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4851999878883362},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.48089998960494995},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4803999960422516},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46480000019073486},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.44440001249313354},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.40459999442100525},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40380001068115234},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.3928000032901764},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.34290000796318054},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.33230000734329224},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3124000132083893},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.29980000853538513},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.29440000653266907},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.29339998960494995},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C147494362","wikidata":"https://www.wikidata.org/wiki/Q2078905","display_name":"Troubleshooting","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2540999948978424}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12065-025-01133-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12065-025-01133-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12065-025-01133-8.pdf","source":{"id":"https://openalex.org/S182392644","display_name":"Evolutionary Intelligence","issn_l":"1864-5909","issn":["1864-5909","1864-5917"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Evolutionary Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s12065-025-01133-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12065-025-01133-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12065-025-01133-8.pdf","source":{"id":"https://openalex.org/S182392644","display_name":"Evolutionary Intelligence","issn_l":"1864-5909","issn":["1864-5909","1864-5917"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Evolutionary Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4133239786","display_name":null,"funder_award_id":"CPRR240327211161","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"},{"id":"https://openalex.org/G4416489423","display_name":null,"funder_award_id":"AJCR230704126719","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"},{"id":"https://openalex.org/G5730002282","display_name":null,"funder_award_id":"CHN231229201835","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"},{"id":"https://openalex.org/G6830701770","display_name":null,"funder_award_id":"RA22112976288","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7127038313.pdf","grobid_xml":"https://content.openalex.org/works/W7127038313.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W2064675550","https://openalex.org/W2296509296","https://openalex.org/W2516809705","https://openalex.org/W2964199361","https://openalex.org/W3106741970","https://openalex.org/W3162956350","https://openalex.org/W4206931805","https://openalex.org/W4310398258","https://openalex.org/W4322774127","https://openalex.org/W4383218272","https://openalex.org/W4386282861","https://openalex.org/W4387704148","https://openalex.org/W4388440524","https://openalex.org/W4388633833","https://openalex.org/W4390545322","https://openalex.org/W4392202892","https://openalex.org/W4392246839","https://openalex.org/W4392578304","https://openalex.org/W4400135851","https://openalex.org/W4401250365","https://openalex.org/W4401832876","https://openalex.org/W4402673533","https://openalex.org/W4403238454","https://openalex.org/W4404720270","https://openalex.org/W4405216410","https://openalex.org/W4406115562","https://openalex.org/W4406230518","https://openalex.org/W4408860867","https://openalex.org/W4409172933","https://openalex.org/W4409856275","https://openalex.org/W4410191145","https://openalex.org/W4410769353","https://openalex.org/W4411112203","https://openalex.org/W4411188833","https://openalex.org/W4411364785","https://openalex.org/W4411482852","https://openalex.org/W4411506391","https://openalex.org/W4411515411"],"related_works":[],"abstract_inverted_index":{"The":[0,97,152],"rapid":[1],"expansion":[2],"of":[3,6,120,132,158],"the":[4,129,133,143,196,219],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9],"generated":[10],"complex,":[11],"high-volume":[12],"network":[13,124],"traffic":[14,112],"that":[15,139],"traditional":[16],"signature-based":[17],"Intrusion":[18],"Detection":[19],"Systems":[20],"(IDS)":[21],"struggle":[22],"to":[23,30,32,79],"analyze":[24],"effectively.":[25],"Conventional":[26],"systems":[27],"often":[28],"fail":[29],"adapt":[31],"evolving":[33],"attack":[34],"behaviors":[35],"and":[36,43,56,60,76,87,106,117,122,149,171,194,216,226],"high-dimensional":[37],"data,":[38],"resulting":[39],"in":[40,64,182],"reduced":[41,142],"accuracy":[42,157],"explainability.":[44,217],"This":[45,126],"study":[46],"presents":[47],"Genetic":[48],"Algorithm":[49],"(GA)-optimized":[50],"deep":[51],"learning":[52],"models,":[53],"namely":[54],"GA-GRU":[55,153],"GA-LSTM,":[57],"for":[58,70,109,192,231],"efficient":[59],"interpretable":[61],"intrusion":[62],"detection":[63],"IoT":[65,121,233],"ecosystem.":[66],"GA":[67,140,186],"was":[68],"employed":[69],"dual":[71],"optimization,":[72],"simultaneous":[73],"feature":[74,115,144,190],"selection":[75,201],"hyperparameter":[77],"tuning,":[78],"achieve":[80],"a":[81,223],"balance":[82],"between":[83],"accuracy,":[84],"computational":[85],"efficiency,":[86],"interpretability,":[88],"distinguishing":[89],"this":[90],"work":[91],"from":[92],"prior":[93],"GA-based":[94],"IDS":[95,162,228],"approaches.":[96],"models":[98],"were":[99],"evaluated":[100],"using":[101],"two":[102],"benchmark":[103],"datasets,":[104],"IoT-ToN":[105],"UNSW-NB15,":[107],"selected":[108],"their":[110,180],"diverse":[111],"patterns,":[113],"heterogeneous":[114],"spaces,":[116],"complementary":[118],"representation":[119],"enterprise":[123],"behavior.":[125],"combination":[127],"supports":[128],"cross-domain":[130],"generalizability":[131],"proposed":[134,220],"framework.":[135],"Experimental":[136],"findings":[137],"show":[138],"significantly":[141],"space":[145],"while":[146],"improving":[147],"runtime":[148],"memory":[150],"efficiency.":[151],"model":[154,212],"achieved":[155],"an":[156],"95.8%,":[159],"outperforming":[160],"state-of-the-art":[161],"models.":[163],"Both":[164],"GA-optimized":[165],"architectures":[166],"recorded":[167],"high":[168],"precision,":[169],"recall,":[170],"F1-scores,":[172],"with":[173],"low":[174],"False":[175],"Positive":[176],"Rates":[177],"(FPR),":[178],"confirming":[179],"robustness":[181],"real-world":[183],"detection.":[184],"Although":[185],"identified":[187],"different":[188],"optimal":[189],"subsets":[191],"GRU":[193],"LSTM,":[195],"recurring":[197],"key":[198],"features":[199],"indicate":[200],"stability":[202],"across":[203],"architectures.":[204],"Moreover,":[205],"LIME-based":[206],"interpretability":[207],"analysis":[208],"provided":[209],"transparency":[210],"into":[211],"decision-making,":[213],"enhancing":[214],"trust":[215],"Overall,":[218],"framework":[221],"delivers":[222],"novel,":[224],"generalizable,":[225],"resource-efficient":[227],"solution":[229],"tailored":[230],"next-generation":[232],"environments.":[234]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-03T00:00:00"}
