{"id":"https://openalex.org/W3008631145","doi":"https://doi.org/10.1109/bigdata47090.2019.9005507","title":"Federated Wireless Network Intrusion Detection","display_name":"Federated Wireless Network Intrusion Detection","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3008631145","doi":"https://doi.org/10.1109/bigdata47090.2019.9005507","mag":"3008631145"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata47090.2019.9005507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9005507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046053737","display_name":"Burak Cetin","orcid":null},"institutions":[{"id":"https://openalex.org/I161203489","display_name":"Youngstown State University","ror":"https://ror.org/038zf2n28","country_code":"US","type":"education","lineage":["https://openalex.org/I161203489"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Burak Cetin","raw_affiliation_strings":["Youngstown State University, Youngstown, OH"],"affiliations":[{"raw_affiliation_string":"Youngstown State University, Youngstown, OH","institution_ids":["https://openalex.org/I161203489"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056799505","display_name":"Alina Lazar","orcid":"https://orcid.org/0000-0002-2096-1541"},"institutions":[{"id":"https://openalex.org/I161203489","display_name":"Youngstown State University","ror":"https://ror.org/038zf2n28","country_code":"US","type":"education","lineage":["https://openalex.org/I161203489"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alina Lazar","raw_affiliation_strings":["Youngstown State University, Youngstown, OH"],"affiliations":[{"raw_affiliation_string":"Youngstown State University, Youngstown, OH","institution_ids":["https://openalex.org/I161203489"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101877231","display_name":"Jinoh Kim","orcid":"https://orcid.org/0000-0002-9835-1866"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinoh Kim","raw_affiliation_strings":["Texas A&M University-Commerce, Commerce, TX"],"affiliations":[{"raw_affiliation_string":"Texas A&M University-Commerce, Commerce, TX","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068293431","display_name":"Alex Sim","orcid":"https://orcid.org/0000-0002-6295-1982"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Sim","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA","institution_ids":["https://openalex.org/I148283060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043129695","display_name":"Kesheng Wu","orcid":"https://orcid.org/0000-0002-6907-3393"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kesheng Wu","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA","institution_ids":["https://openalex.org/I148283060"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046053737"],"corresponding_institution_ids":["https://openalex.org/I161203489"],"apc_list":null,"apc_paid":null,"fwci":3.1863,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.92835167,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"6004","last_page":"6006"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8410868644714355},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7841063737869263},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5839859843254089},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.554405927658081},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5196881890296936},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4955347776412964},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46301883459091187},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4397142231464386},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4237658679485321},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4190948009490967},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4141119122505188},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3410760760307312},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.22955158352851868},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20599541068077087},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.16683095693588257},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13086095452308655},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11612820625305176}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8410868644714355},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7841063737869263},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5839859843254089},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.554405927658081},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5196881890296936},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4955347776412964},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46301883459091187},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4397142231464386},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4237658679485321},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4190948009490967},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4141119122505188},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3410760760307312},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.22955158352851868},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20599541068077087},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.16683095693588257},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13086095452308655},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11612820625305176},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata47090.2019.9005507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9005507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2028070713","https://openalex.org/W2278186031","https://openalex.org/W2541884796","https://openalex.org/W2557842949","https://openalex.org/W2612398564","https://openalex.org/W2613480438","https://openalex.org/W2772386872","https://openalex.org/W2902113386","https://openalex.org/W2903872466","https://openalex.org/W2908432131","https://openalex.org/W2955040443","https://openalex.org/W2969804742","https://openalex.org/W4289147229","https://openalex.org/W4318619660","https://openalex.org/W6756950679","https://openalex.org/W6767114730"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Wi-Fi":[0,23,57],"has":[1,25],"become":[2],"the":[3,18,22,39,63,161],"wireless":[4,47],"networking":[5],"standard":[6],"that":[7,28,116,169],"allows":[8],"short-":[9],"to":[10,13,38,55,69,88,95,110,143],"medium-range":[11],"device":[12],"connect":[14,37],"without":[15,150],"wires.":[16],"For":[17],"last":[19],"20":[20],"year,":[21],"technology":[24],"so":[26],"pervasive":[27],"most":[29],"devices":[30,142],"in":[31,130,175],"use":[32],"today":[33],"are":[34,67],"mobile":[35],"and":[36,80,100],"internet":[40],"through":[41],"Wi-Fi.":[42],"Unlike":[43],"wired":[44],"network,":[45],"a":[46,50,112,131,156],"network":[48,58,90],"lacks":[49],"clear":[51],"boundary,":[52],"which":[53],"leads":[54],"significant":[56],"security":[59,65],"concerns,":[60],"especially":[61],"because":[62],"current":[64],"measures":[66],"prone":[68],"several":[70],"types":[71],"of":[72,106,158,177],"intrusion.":[73],"To":[74],"address":[75],"this":[76,107,137],"problem,":[77],"machine":[78],"learning":[79,82,114],"deep":[81],"methods":[83],"have":[84],"been":[85],"successfully":[86],"developed":[87],"identify":[89],"attacks.":[91],"However,":[92],"collecting":[93],"data":[94,165],"develop":[96],"models":[97],"is":[98,109,128,173],"expensive":[99],"raises":[101],"privacy":[102,120],"concerns.":[103,121],"The":[104],"goal":[105],"paper":[108],"evaluate":[111],"federated":[113,171],"approach":[115,172],"would":[117,139],"alleviate":[118],"such":[119],"This":[122],"initial":[123],"work":[124],"on":[125],"intrusion":[126,163],"detection":[127,148,164],"performed":[129],"simulated":[132],"environment.":[133],"Once":[134],"proven":[135],"feasible,":[136],"process":[138],"allow":[140],"edge":[141],"collaboratively":[144],"update":[145],"global":[146],"anomaly":[147],"models,":[149],"sharing":[151],"sensitive":[152],"training":[153],"data.":[154],"On":[155],"set":[157],"tests":[159],"with":[160],"AWID":[162],"set,":[166],"we":[167],"show":[168],"our":[170],"effective":[174],"terms":[176],"classification":[178],"accuracy,":[179],"computation":[180],"cost,":[181],"as":[182,184],"well":[183],"communication":[185],"cost.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
