{"id":"https://openalex.org/W4406262280","doi":"https://doi.org/10.1109/access.2025.3528214","title":"Transferability Evaluation in Wi-Fi Intrusion Detection Systems Through Machine Learning and Deep Learning Approaches","display_name":"Transferability Evaluation in Wi-Fi Intrusion Detection Systems Through Machine Learning and Deep Learning Approaches","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406262280","doi":"https://doi.org/10.1109/access.2025.3528214"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3528214","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3528214","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3528214","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031758867","display_name":"Saud Yonbawi","orcid":"https://orcid.org/0000-0001-7720-8246"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"Jeddah University","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Saud Yonbawi","raw_affiliation_strings":["Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","Assistant Professor at Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]},{"raw_affiliation_string":"Assistant Professor at Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103977368","display_name":"Adil Afzal","orcid":"https://orcid.org/0009-0006-3307-6345"},"institutions":[{"id":"https://openalex.org/I172780181","display_name":"University of the Punjab","ror":"https://ror.org/011maz450","country_code":"PK","type":"education","lineage":["https://openalex.org/I172780181"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Adil Afzal","raw_affiliation_strings":["XeroAI, Lahore, Punjab, Pakistan","XeroAI, G.T. Road, Lahore, Punjab, Pakistan"],"affiliations":[{"raw_affiliation_string":"XeroAI, Lahore, Punjab, Pakistan","institution_ids":["https://openalex.org/I172780181"]},{"raw_affiliation_string":"XeroAI, G.T. Road, Lahore, Punjab, Pakistan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092498995","display_name":"M Hammad Yasir","orcid":"https://orcid.org/0009-0006-6078-7599"},"institutions":[{"id":"https://openalex.org/I142732210","display_name":"University of Engineering and Technology Lahore","ror":"https://ror.org/0051w2v06","country_code":"PK","type":"education","lineage":["https://openalex.org/I142732210"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Yasir","raw_affiliation_strings":["Department of Computer Science, University of Engineering and Technology Lahore, Lahore, Punjab, Pakistan","Department of Computer Science - UET Lahore, Lahore, Punjab, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Engineering and Technology Lahore, Lahore, Punjab, Pakistan","institution_ids":["https://openalex.org/I142732210"]},{"raw_affiliation_string":"Department of Computer Science - UET Lahore, Lahore, Punjab, Pakistan","institution_ids":["https://openalex.org/I142732210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108089136","display_name":"Muhammad Rizwan","orcid":"https://orcid.org/0009-0004-9735-1743"},"institutions":[{"id":"https://openalex.org/I22128151","display_name":"University of Derby","ror":"https://ror.org/02yhrrk59","country_code":"GB","type":"education","lineage":["https://openalex.org/I22128151"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Rizwan","raw_affiliation_strings":["College of Science and Engineering, University of Derby, Derby, U.K","College of Science and Engineering, University of Derby, Derby, UK"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, University of Derby, Derby, U.K","institution_ids":[]},{"raw_affiliation_string":"College of Science and Engineering, University of Derby, Derby, UK","institution_ids":["https://openalex.org/I22128151"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086107524","display_name":"Natalia Kryvinska","orcid":"https://orcid.org/0000-0003-3678-9229"},"institutions":[{"id":"https://openalex.org/I74788687","display_name":"Comenius University Bratislava","ror":"https://ror.org/0587ef340","country_code":"SK","type":"education","lineage":["https://openalex.org/I74788687"]}],"countries":["SK"],"is_corresponding":false,"raw_author_name":"Natalia Kryvinska","raw_affiliation_strings":["Department of Information Management and Business Systems, Faculty of Management, Comenius University Bratislava, Bratislava, Slovakia","Department of Information Management and Business Systems Faculty of Management Comenius, University Bratislava Odboj&#x00E1;rov10, Bratislava 25, Slovakia"],"affiliations":[{"raw_affiliation_string":"Department of Information Management and Business Systems, Faculty of Management, Comenius University Bratislava, Bratislava, Slovakia","institution_ids":["https://openalex.org/I74788687"]},{"raw_affiliation_string":"Department of Information Management and Business Systems Faculty of Management Comenius, University Bratislava Odboj&#x00E1;rov10, Bratislava 25, Slovakia","institution_ids":["https://openalex.org/I74788687"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5031758867"],"corresponding_institution_ids":["https://openalex.org/I4210099699"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.7522,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.9368529,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"11248","last_page":"11264"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10575","display_name":"Wireless Communication Networks Research","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.8345044851303101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8199499845504761},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6885250806808472},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6731119155883789},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6618088483810425},{"id":"https://openalex.org/keywords/f1-score","display_name":"F1 score","score":0.6410859823226929},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6028705835342407},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.4680853486061096},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4623594880104065},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.42489734292030334},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39575159549713135},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3790995478630066}],"concepts":[{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.8345044851303101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8199499845504761},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6885250806808472},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6731119155883789},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6618088483810425},{"id":"https://openalex.org/C148524875","wikidata":"https://www.wikidata.org/wiki/Q6975395","display_name":"F1 score","level":2,"score":0.6410859823226929},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6028705835342407},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.4680853486061096},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4623594880104065},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.42489734292030334},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39575159549713135},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3790995478630066},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3528214","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3528214","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:573916f56a9c423d99a1ab3111fa3246","is_oa":true,"landing_page_url":"https://doaj.org/article/573916f56a9c423d99a1ab3111fa3246","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 11248-11264 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3528214","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3528214","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G4270673791","display_name":null,"funder_award_id":"UJ-22-DR-41","funder_id":"https://openalex.org/F4320329038","funder_display_name":"University of Jeddah"}],"funders":[{"id":"https://openalex.org/F4320329038","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W2028070713","https://openalex.org/W2610781055","https://openalex.org/W2767153057","https://openalex.org/W2787147777","https://openalex.org/W2803310278","https://openalex.org/W2900678839","https://openalex.org/W2903975938","https://openalex.org/W2939745396","https://openalex.org/W2940663155","https://openalex.org/W2991722918","https://openalex.org/W3004777721","https://openalex.org/W3012339090","https://openalex.org/W3016987480","https://openalex.org/W3117827099","https://openalex.org/W3126430657","https://openalex.org/W3130254936","https://openalex.org/W3132842072","https://openalex.org/W3136238191","https://openalex.org/W3137046892","https://openalex.org/W3164999323","https://openalex.org/W3168771234","https://openalex.org/W3197150995","https://openalex.org/W3214003809","https://openalex.org/W4200065521","https://openalex.org/W4220682970","https://openalex.org/W4220985823","https://openalex.org/W4223985382","https://openalex.org/W4285055378","https://openalex.org/W4289950852","https://openalex.org/W4310359614","https://openalex.org/W4311415244","https://openalex.org/W4318570869","https://openalex.org/W4385494113","https://openalex.org/W4387046648","https://openalex.org/W4387335033","https://openalex.org/W4387373365","https://openalex.org/W4388573952","https://openalex.org/W4390901017","https://openalex.org/W4391589697","https://openalex.org/W4393033446","https://openalex.org/W4393140440","https://openalex.org/W4394653160","https://openalex.org/W4400021465","https://openalex.org/W4401597896","https://openalex.org/W6772070325"],"related_works":["https://openalex.org/W4399895933","https://openalex.org/W2161221533","https://openalex.org/W4229699405","https://openalex.org/W1666484574","https://openalex.org/W2216382288","https://openalex.org/W2355491300","https://openalex.org/W4234629551","https://openalex.org/W2011110943","https://openalex.org/W2028856635","https://openalex.org/W3192962470"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"System":[2],"(IDS)":[3],"plays":[4],"a":[5,90,101],"pivotal":[6],"role":[7],"in":[8,145],"safeguarding":[9],"network":[10,116],"security.":[11],"The":[12],"efficacy":[13],"of":[14,78,108,154,167,181],"these":[15,79],"systems":[16],"is":[17,73],"rigorously":[18],"assessed":[19],"through":[20],"established":[21],"metrics":[22],"including":[23],"precision,":[24],"recall,":[25],"F1":[26,51],"score,":[27],"and":[28,41,58,129,142,149,190],"AUC":[29,59],"score.":[30],"When":[31],"subjected":[32],"to":[33,56,63,74,82,120,127,140,176],"rigorous":[34],"testing":[35],"on":[36,100,163],"well-known":[37],"datasets":[38,112,131,160],"like":[39],"AWID":[40,128,137],"AWID3,":[42],"individual":[43],"IDS":[44],"models":[45,81,195],"consistently":[46],"deliver":[47],"exceptional":[48],"performances,":[49],"boasting":[50],"scores":[52,60],"ranging":[53],"from":[54],"0.98":[55],"1":[57],"spanning":[61],"0.97":[62],"0.99.":[64],"However,":[65],"the":[66,71,76,96,106,122,133,152,164,178,204],"true":[67],"challenge":[68],"surfaces":[69],"when":[70],"objective":[72],"extend":[75],"transferability":[77,107],"high-performing":[80],"entirely":[83],"novel,":[84],"unseen":[85],"datasets.":[86],"This":[87],"endeavor":[88],"unravels":[89],"diverse":[91],"performance":[92,98],"landscape,":[93],"demonstrating":[94],"that":[95,200],"outstanding":[97],"observed":[99],"particular":[102],"dataset":[103],"doesn\u2019t":[104],"guarantee":[105],"features":[109],"across":[110],"dissimilar":[111],"nestled":[113],"within":[114,151],"different":[115],"environments.":[117],"In":[118],"order":[119],"evaluate":[121],"feature":[123],"transferability,":[124],"we":[125],"turn":[126],"AWID3":[130,143,171],"as":[132],"main":[134],"distinction":[135],"between":[136],"(potentially":[138],"referring":[139],"AWID2)":[141],"lies":[144],"their":[146],"specific":[147,179],"focuses":[148],"contexts":[150],"field":[153],"Wi-Fi":[155,169],"intrusion":[156],"detection.":[157],"Although":[158],"both":[159],"are":[161],"centered":[162],"general":[165],"goal":[166],"detecting":[168],"intrusions,":[170],"has":[172,196],"been":[173,197],"carefully":[174],"designed":[175],"meet":[177],"needs":[180],"corporateWi-Fi":[182],"applications.":[183],"A":[184],"comprehensive":[185],"evaluation":[186],"involving":[187],"Multilayer":[188],"Perceptron(MLP),":[189],"Convolutional":[191],"Neural":[192],"Networks":[193],"(CNN)":[194],"executed,":[198],"uncovering":[199],"CNN":[201],"conspicuously":[202],"outshines":[203],"MLP":[205],"model.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
