{"id":"https://openalex.org/W4414461509","doi":"https://doi.org/10.1007/s43926-025-00203-8","title":"Lightweight intrusion detection system for IoT with improved feature engineering and advanced dynamic quantization","display_name":"Lightweight intrusion detection system for IoT with improved feature engineering and advanced dynamic quantization","publication_year":2025,"publication_date":"2025-09-24","ids":{"openalex":"https://openalex.org/W4414461509","doi":"https://doi.org/10.1007/s43926-025-00203-8"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00203-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00203-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00203-8.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00203-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119713930","display_name":"Semachew Fasika Misrak","orcid":null},"institutions":[{"id":"https://openalex.org/I4210129636","display_name":"Addis Ababa Science and Technology University","ror":"https://ror.org/02psd9228","country_code":"ET","type":"education","lineage":["https://openalex.org/I4210129636"]}],"countries":["ET"],"is_corresponding":true,"raw_author_name":"Semachew Fasika Misrak","raw_affiliation_strings":["College of Technology and Built Environment, School of Information Technology and Engineering (SiTE), Addis Ababa University, Addis Ababa, Ethiopia"],"affiliations":[{"raw_affiliation_string":"College of Technology and Built Environment, School of Information Technology and Engineering (SiTE), Addis Ababa University, Addis Ababa, Ethiopia","institution_ids":["https://openalex.org/I4210129636"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023048306","display_name":"Henock Mulugeta Melaku","orcid":"https://orcid.org/0000-0002-0467-8121"},"institutions":[{"id":"https://openalex.org/I4210129636","display_name":"Addis Ababa Science and Technology University","ror":"https://ror.org/02psd9228","country_code":"ET","type":"education","lineage":["https://openalex.org/I4210129636"]}],"countries":["ET"],"is_corresponding":false,"raw_author_name":"Henock Mulugeta Melaku","raw_affiliation_strings":["College of Technology and Built Environment, School of Information Technology and Engineering (SiTE), Addis Ababa University, Addis Ababa, Ethiopia"],"affiliations":[{"raw_affiliation_string":"College of Technology and Built Environment, School of Information Technology and Engineering (SiTE), Addis Ababa University, Addis Ababa, Ethiopia","institution_ids":["https://openalex.org/I4210129636"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5119713930"],"corresponding_institution_ids":["https://openalex.org/I4210129636"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":5.5062,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96081402,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.618399977684021},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5763000249862671},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.572700023651123},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5128999948501587},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.444599986076355},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4339999854564667},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4277999997138977},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.3871000111103058},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.37599998712539673}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7836999893188477},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.618399977684021},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5769000053405762},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5763000249862671},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.572700023651123},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5128999948501587},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.444599986076355},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4339999854564667},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4277999997138977},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4253000020980835},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.3871000111103058},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.37599998712539673},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3747999966144562},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3634999990463257},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3490999937057495},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32829999923706055},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C93768804","wikidata":"https://www.wikidata.org/wiki/Q2518735","display_name":"Artificial immune system","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.3068999946117401},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.30660000443458557},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2930000126361847},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.28600001335144043},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.27459999918937683},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2718999981880188}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00203-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00203-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00203-8.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:20368a3a02a24d55a6291feace10f8d1","is_oa":true,"landing_page_url":"https://doaj.org/article/20368a3a02a24d55a6291feace10f8d1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-34 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00203-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00203-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00203-8.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414461509.pdf","grobid_xml":"https://content.openalex.org/works/W4414461509.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W2392395307","https://openalex.org/W2765644447","https://openalex.org/W2904960397","https://openalex.org/W2921708219","https://openalex.org/W2941608808","https://openalex.org/W2982625477","https://openalex.org/W2991435551","https://openalex.org/W3000480569","https://openalex.org/W3010454395","https://openalex.org/W3014145587","https://openalex.org/W3045149779","https://openalex.org/W3107008310","https://openalex.org/W3117906366","https://openalex.org/W3143394933","https://openalex.org/W3160455160","https://openalex.org/W3179950556","https://openalex.org/W3180273110","https://openalex.org/W3202417356","https://openalex.org/W3206674745","https://openalex.org/W3208626829","https://openalex.org/W3208693819","https://openalex.org/W4200245370","https://openalex.org/W4200602311","https://openalex.org/W4205136287","https://openalex.org/W4205989500","https://openalex.org/W4280523910","https://openalex.org/W4280606225","https://openalex.org/W4283028053","https://openalex.org/W4283445646","https://openalex.org/W4285166740","https://openalex.org/W4285611593","https://openalex.org/W4289333755","https://openalex.org/W4303644396","https://openalex.org/W4310676095","https://openalex.org/W4313890394","https://openalex.org/W4320478486","https://openalex.org/W4366771283","https://openalex.org/W4380483109","https://openalex.org/W4383890096","https://openalex.org/W4386963944","https://openalex.org/W4387501456","https://openalex.org/W4393242440","https://openalex.org/W4402989299","https://openalex.org/W4406102205","https://openalex.org/W4406267888","https://openalex.org/W4409660086"],"related_works":[],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"IoT":[3,15,52,72,118,128,279],"devices":[4,16,119],"have":[5],"surged":[6],"globally,":[7],"enhancing":[8],"businesses,":[9],"industries,":[10],"and":[11,29,67,78,90,102,113,163,191,209,222,273],"daily":[12],"life.":[13],"Nevertheless,":[14],"are":[17,174],"not":[18],"immune":[19],"to":[20,36,65,127,176,194,213],"cyber":[21,275],"attacks.":[22,38],"On":[23],"the":[24,93,107,124,189,196,225,245,248,265],"contrary,":[25],"their":[26],"limited":[27],"memory":[28],"processing":[30],"power":[31],"make":[32],"them":[33],"more":[34],"susceptible":[35],"malicious":[37],"Therefore,":[39],"developing":[40],"a":[41,48,100,146,199,228,236,250,256],"lightweight":[42,59],"yet":[43],"efficient":[44,58,272],"attack":[45,111,276],"detection":[46,182,207,229,251,277],"is":[47,233,253],"critical":[49],"issue":[50],"for":[51,117,171,271],"systems.":[53,280],"This":[54],"research":[55,131],"proposes":[56],"an":[57,71],"hybrid":[60,83],"deep":[61,84],"learning":[62,85],"model":[63,86,204,237,257,270],"(DNN-BiLSTM)":[64],"detect":[66],"classify":[68],"attacks":[69],"in":[70,99,106],"system":[73],"utilizing":[74],"improved":[75,133],"feature":[76,134],"engineering":[77,135],"advanced":[79,155,169],"quantization.":[80],"Although":[81],"leveraging":[82],"that":[87],"combines":[88],"DNN":[89],"BiLSTM":[91],"facilitates":[92],"extraction":[94],"of":[95,109,198,231,239,259,267],"intricate":[96],"network":[97],"features":[98],"nonlinear":[101],"bidirectional":[103],"manner,":[104],"aiding":[105],"identification":[108],"complex":[110],"patterns":[112],"behaviors,":[114],"tailoring":[115],"this":[116,130],"remains":[120],"challenging.":[121],"To":[122],"address":[123],"constraints":[125],"inherent":[126],"devices,":[129],"incorporates":[132],"techniques,":[136,157],"specifically":[137],"Redundancy-Adjusted":[138],"Logistic":[139],"Mutual":[140],"Information":[141],"Feature":[142],"Selection":[143],"(RAL-MIFS)":[144],"with":[145,235,255],"two-stage":[147],"Incremental":[148],"Principal":[149],"Component":[150],"Analysis":[151],"(IPCA)":[152],"algorithm.":[153],"Additionally,":[154],"quantization":[156],"including":[158,216],"Quantization":[159,166],"Aware":[160],"Training":[161],"(QAT)":[162],"Post-Training":[164],"Dynamic":[165],"(PTDQ),":[167],"alongside":[168],"Optuna":[170],"hyperparameter":[172],"optimization,":[173],"utilized":[175],"enhance":[177],"computational":[178,210],"efficiency":[179,211],"without":[180],"compromising":[181],"accuracy.":[183],"Experimental":[184],"evaluations":[185],"were":[186],"conducted":[187],"on":[188,244,278],"CIC-IDS2017":[190,226],"CIC-IoT2023":[192,246],"datasets":[193],"assess":[195],"performance":[197],"quantized":[200,268],"DNN-BiLSTMQ":[201,269],"model.":[202],"The":[203],"demonstrated":[205],"competitive":[206],"accuracy":[208,230,252],"compared":[212],"state-of-the-art":[214],"methods,":[215],"autoencoder":[217],"+":[218],"ensamble":[219],"learning,":[220],"LNN":[221],"CNN-BiLSTM.":[223],"Using":[224],"dataset,":[227,247],"99.73%":[232],"achieved":[234,249],"size":[238,258],"just":[240],"25.6":[241],"KB,":[242],"while":[243],"93.95%":[254],"31.3":[260],"KB.":[261],"These":[262],"results":[263],"highlight":[264],"potential":[266],"accurate":[274]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
