{"id":"https://openalex.org/W4394597291","doi":"https://doi.org/10.1109/cloudnet59005.2023.10490080","title":"Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks","display_name":"Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks","publication_year":2023,"publication_date":"2023-11-01","ids":{"openalex":"https://openalex.org/W4394597291","doi":"https://doi.org/10.1109/cloudnet59005.2023.10490080"},"language":"en","primary_location":{"id":"doi:10.1109/cloudnet59005.2023.10490080","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cloudnet59005.2023.10490080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101821040","display_name":"Yue Wu","orcid":"https://orcid.org/0000-0003-4097-9439"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yue Wu","raw_affiliation_strings":["Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391268","display_name":"Lin Ye","orcid":"https://orcid.org/0000-0002-9647-0271"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Ye","raw_affiliation_strings":["Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041639945","display_name":"Baisong Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baisong Li","raw_affiliation_strings":["Antiy Labs Antiy,Harbin,China","Antiy Labs Antiy, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Antiy Labs Antiy,Harbin,China","institution_ids":[]},{"raw_affiliation_string":"Antiy Labs Antiy, Harbin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100417312","display_name":"Hongli Zhang","orcid":"https://orcid.org/0000-0002-8167-7106"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongli Zhang","raw_affiliation_strings":["Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111200337","display_name":"Jing Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Cao","raw_affiliation_strings":["Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101821040"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26293553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"32","issue":null,"first_page":"443","last_page":"447"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9376000165939331,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7612336874008179},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7603461742401123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6478937268257141},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21656829118728638}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7612336874008179},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7603461742401123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6478937268257141},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21656829118728638}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudnet59005.2023.10490080","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cloudnet59005.2023.10490080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2025001960","https://openalex.org/W2965373594","https://openalex.org/W2970597249","https://openalex.org/W2978017171","https://openalex.org/W2984666763","https://openalex.org/W3034457371","https://openalex.org/W3105966348","https://openalex.org/W3180238884","https://openalex.org/W4223518423","https://openalex.org/W4225934689","https://openalex.org/W4300819682","https://openalex.org/W4385571287","https://openalex.org/W6763701032","https://openalex.org/W6766673545","https://openalex.org/W6768021236","https://openalex.org/W6768851824","https://openalex.org/W6810840224"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214"],"abstract_inverted_index":{"The":[0],"rapid":[1],"development":[2],"of":[3,27,94,97,100,116,120,145,154,164,187,197],"cloud":[4,73],"networks":[5],"has":[6,31],"created":[7],"a":[8,91,98,169],"complex":[9],"cybersecurity":[10,108],"landscape,":[11],"with":[12,41],"new":[13],"challenges":[14],"and":[15,38,62,148],"threats":[16],"arising":[17],"from":[18,105],"the":[19,36,95,114,117,121,126,131,152,175,195,198],"shift":[20],"to":[21,112,150],"cloud-based":[22],"systems.":[23],"Efficient":[24],"on-device":[25],"processing":[26],"network":[28,54,74,79,156,179],"security":[29,80,157,180],"reports":[30,81,158],"become":[32],"essential":[33],"for":[34,178],"handling":[35],"distributed":[37],"edge-oriented":[39],"scenario":[40],"substantial":[42],"data":[43],"volumes.":[44],"Pre-trained":[45],"models,":[46,147],"like":[47],"BERT,":[48],"have":[49],"been":[50],"extensively":[51],"used":[52],"in":[53,72,130],"security,":[55],"but":[56],"their":[57,70],"high":[58],"computational":[59],"resource":[60],"demands":[61],"limited":[63],"input":[64,118],"length":[65,119],"(512":[66],"tokens)":[67],"can":[68],"hinder":[69],"performance":[71,96],"environments,":[75],"particularly":[76],"when":[77],"classifying":[78,155],"that":[82,140,173],"often":[83],"exceed":[84],"this":[85,88,190],"limit.":[86],"Consequently,":[87],"paper":[89],"presents":[90],"comparative":[92,165],"analysis":[93],"series":[99,163],"lightweight":[101],"pre-trained":[102,146],"models":[103],"derived":[104],"BERT":[106,200],"on":[107,159,168],"corpus.":[109],"In":[110],"order":[111],"solve":[113],"limitation":[115],"BERT-derived":[122],"model,":[123],"we":[124],"leverage":[125],"latest":[127],"research":[128],"advancements":[129],"Natural":[132],"Language":[133],"Processing":[134],"(NLP)":[135],"domain,":[136],"adopting":[137],"an":[138,184],"approach":[139],"involves":[141],"abstract":[142],"extraction,":[143],"application":[144],"fine-tuning,":[149],"accomplish":[151],"task":[153],"edge":[160],"devices.":[161],"A":[162],"experiments":[166],"conducted":[167],"real-world":[170],"dataset":[171],"revealed":[172],"employing":[174],"BRIO-TinyBERT-Fine-tuning":[176],"architecture":[177],"report":[181],"classification":[182],"achieved":[183],"accuracy":[185],"rate":[186],"82%.":[188],"Remarkably,":[189],"model":[191],"utilized":[192],"only":[193],"half":[194],"parameters":[196],"standard":[199],"model.":[201]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
