{"id":"https://openalex.org/W4414205827","doi":"https://doi.org/10.1049/ise2/8432654","title":"Enhancing IoT Security via Federated Learning: A Comprehensive Approach to Intrusion Detection","display_name":"Enhancing IoT Security via Federated Learning: A Comprehensive Approach to Intrusion Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414205827","doi":"https://doi.org/10.1049/ise2/8432654"},"language":"en","primary_location":{"id":"doi:10.1049/ise2/8432654","is_oa":true,"landing_page_url":"https://doi.org/10.1049/ise2/8432654","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/8432654","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/8432654","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100624459","display_name":"Ye Bai","orcid":"https://orcid.org/0009-0008-7793-7682"},"institutions":[{"id":"https://openalex.org/I4210100255","display_name":"Beijing Academy of Artificial Intelligence","ror":"https://ror.org/016a74861","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210100255"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ye Bai","raw_affiliation_strings":["School of Artificial Intelligence ,  China University of Mining and Technology-Beijing ,  Beijing ,  China ,  cumt.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence ,  China University of Mining and Technology-Beijing ,  Beijing ,  China ,  cumt.edu.cn","institution_ids":["https://openalex.org/I4210100255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100756528","display_name":"Weiwei Jiang","orcid":"https://orcid.org/0000-0003-0953-5047"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weiwei Jiang","raw_affiliation_strings":["School of Information and Communication Engineering ,  Beijing University of Posts and Telecommunications ,  Beijing ,  China ,  bupt.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering ,  Beijing University of Posts and Telecommunications ,  Beijing ,  China ,  bupt.edu.cn","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042670299","display_name":"Jianbin Mu","orcid":null},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbin Mu","raw_affiliation_strings":["College of Information Engineering ,  Zhejiang University of Technology ,  Hangzhou ,  Zhejiang ,  China ,  zjut.edu.cn"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering ,  Zhejiang University of Technology ,  Hangzhou ,  Zhejiang ,  China ,  zjut.edu.cn","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112118255","display_name":"Shang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I91125648","display_name":"Wuhan Institute of Technology","ror":"https://ror.org/04jcykh16","country_code":"CN","type":"education","lineage":["https://openalex.org/I91125648"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shang Liu","raw_affiliation_strings":["PKU-WUHAN Institute for Artificial Intelligence ,  Wuhan ,  Hubei ,  China ,  pku.edu.cn"],"affiliations":[{"raw_affiliation_string":"PKU-WUHAN Institute for Artificial Intelligence ,  Wuhan ,  Hubei ,  China ,  pku.edu.cn","institution_ids":["https://openalex.org/I91125648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054536028","display_name":"Weixi Gu","orcid":"https://orcid.org/0009-0005-5986-5716"},"institutions":[{"id":"https://openalex.org/I4210100200","display_name":"China Internet Network Information Center","ror":"https://ror.org/011t9p927","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210100200","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I4210130112","display_name":"China Academy of Information and Communications Technology","ror":"https://ror.org/038dte259","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210130112","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weixi Gu","raw_affiliation_strings":["China Academy of Industrial Internet ,  Beijing ,  China"],"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet ,  Beijing ,  China","institution_ids":["https://openalex.org/I4210100200","https://openalex.org/I4210130112"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037189942","display_name":"S.Y. Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuke Wang","raw_affiliation_strings":["Antai College of Economics and Management ,  Shanghai Jiao Tong University ,  Shanghai ,  China ,  sjtu.edu.cn"],"affiliations":[{"raw_affiliation_string":"Antai College of Economics and Management ,  Shanghai Jiao Tong University ,  Shanghai ,  China ,  sjtu.edu.cn","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100624459","https://openalex.org/A5100756528"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4210100255"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":{"value":2000,"currency":"EUR","value_usd":2200},"fwci":1.4888,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86938368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"2025","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7200000286102295},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6363000273704529},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4458000063896179},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.41370001435279846},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.39959999918937683},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.39750000834465027},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.37049999833106995},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.3702999949455261},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.34040001034736633}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8323000073432922},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7200000286102295},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6363000273704529},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4458000063896179},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.41370001435279846},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40369999408721924},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.39959999918937683},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.39750000834465027},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.37049999833106995},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.3702999949455261},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36039999127388},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.34040001034736633},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.33489999175071716},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32829999923706055},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2946999967098236},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2822999954223633},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28110000491142273},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.2703999876976013},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2581000030040741},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2574999928474426},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1049/ise2/8432654","is_oa":true,"landing_page_url":"https://doi.org/10.1049/ise2/8432654","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/8432654","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ccdef6231b7f4489ba549dfc0e5bb345","is_oa":true,"landing_page_url":"https://doaj.org/article/ccdef6231b7f4489ba549dfc0e5bb345","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IET Information Security, Vol 2025 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1049/ise2/8432654","is_oa":true,"landing_page_url":"https://doi.org/10.1049/ise2/8432654","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/8432654","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2436265822","display_name":null,"funder_award_id":"LQ24F030023","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8624775527","display_name":null,"funder_award_id":"62401070","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414205827.pdf","grobid_xml":"https://content.openalex.org/works/W4414205827.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W2296509296","https://openalex.org/W2935633365","https://openalex.org/W3006926329","https://openalex.org/W3042945059","https://openalex.org/W3093410479","https://openalex.org/W3108827348","https://openalex.org/W3169649651","https://openalex.org/W3171802458","https://openalex.org/W3191470662","https://openalex.org/W3203154561","https://openalex.org/W4210743106","https://openalex.org/W4226391572","https://openalex.org/W4281693015","https://openalex.org/W4283121551","https://openalex.org/W4310063752","https://openalex.org/W4320341434","https://openalex.org/W4362703719","https://openalex.org/W4378900947","https://openalex.org/W4385210255","https://openalex.org/W4386548584","https://openalex.org/W4387491243","https://openalex.org/W4388591328","https://openalex.org/W4389128909","https://openalex.org/W4390101654","https://openalex.org/W4391428919","https://openalex.org/W4394627293","https://openalex.org/W4396676238","https://openalex.org/W4399264644","https://openalex.org/W4400062116","https://openalex.org/W4401064620","https://openalex.org/W4401657815","https://openalex.org/W4402327304","https://openalex.org/W4402450949","https://openalex.org/W4402459534","https://openalex.org/W4403391438","https://openalex.org/W4403476495","https://openalex.org/W4403534166","https://openalex.org/W4404287993","https://openalex.org/W4404515204","https://openalex.org/W4404914591","https://openalex.org/W4405205311","https://openalex.org/W4405530392","https://openalex.org/W4407308627","https://openalex.org/W4409623169"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"proliferation":[2],"of":[3,5,48,90,105,183],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8,136],"has":[9,34],"revolutionized":[10],"various":[11],"industries":[12],"by":[13],"enabling":[14],"smart":[15,17],"grids,":[16],"cities,":[18],"and":[19,27,45,69,79,109,149,206],"other":[20],"applications":[21],"that":[22,115,132,160],"rely":[23],"on":[24],"seamless":[25],"connectivity":[26],"real\u2010time":[28],"data":[29,67,75,203],"processing.":[30],"However,":[31],"this":[32,85,161],"growth":[33],"also":[35],"introduced":[36],"significant":[37],"security":[38],"challenges":[39,61],"due":[40],"to":[41,58,137,175],"the":[42,88,116,121,156,167,181],"scale,":[43],"heterogeneity,":[44,205],"resource":[46],"constraints":[47],"IoT":[49,98,135,168,196],"systems.":[50],"Traditional":[51],"intrusion":[52,95,193],"detection":[53,96,194],"systems":[54],"(IDS)":[55],"often":[56],"struggle":[57],"address":[59,82],"these":[60,83],"effectively,":[62],"as":[63,186,202],"they":[64],"require":[65],"centralized":[66,176],"collection":[68],"processing,":[70],"which":[71],"raises":[72],"concerns":[73],"about":[74],"privacy,":[76,204],"communication":[77,151],"overhead,":[78],"scalability.":[80,207],"To":[81],"issues,":[84],"paper":[86],"investigates":[87],"application":[89],"federated":[91,129,184],"learning":[92,107,111,130,185],"for":[93,191],"network":[94,192],"in":[97,166,195],"environments.":[99],"We":[100,125],"first":[101],"evaluate":[102],"a":[103,128],"range":[104],"machine":[106],"(ML)":[108],"deep":[110],"(DL)":[112],"models,":[113],"finding":[114],"random":[117],"forest":[118],"model":[119],"achieves":[120,163],"highest":[122],"classification":[123],"accuracy.":[124],"then":[126],"propose":[127],"approach":[131,162],"allows":[133],"distributed":[134],"collaboratively":[138],"train":[139],"ML":[140],"models":[141],"without":[142],"sharing":[143],"raw":[144],"data,":[145],"thereby":[146],"preserving":[147],"privacy":[148],"reducing":[150],"costs.":[152],"Experimental":[153],"results":[154],"using":[155],"UNSW\u2010NB15":[157],"dataset":[158],"demonstrate":[159],"promising":[164],"outcomes":[165],"context,":[169],"with":[170],"minimal":[171],"performance":[172],"degradation":[173],"compared":[174],"learning.":[177],"Our":[178],"findings":[179],"highlight":[180],"potential":[182],"an":[187],"effective,":[188],"decentralized":[189],"solution":[190],"environments,":[197],"addressing":[198],"critical":[199],"challenges,":[200],"such":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
