{"id":"https://openalex.org/W4416249610","doi":"https://doi.org/10.1109/cscn67557.2025.11230695","title":"EXSIMAS-6G: Explainable AI-driven Secured Intelligent Multi-Stage Auto Scaling for Cloud-native 6G Resource Management","display_name":"EXSIMAS-6G: Explainable AI-driven Secured Intelligent Multi-Stage Auto Scaling for Cloud-native 6G Resource Management","publication_year":2025,"publication_date":"2025-09-15","ids":{"openalex":"https://openalex.org/W4416249610","doi":"https://doi.org/10.1109/cscn67557.2025.11230695"},"language":null,"primary_location":{"id":"doi:10.1109/cscn67557.2025.11230695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscn67557.2025.11230695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Standards for Communications and Networking (CSCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120354458","display_name":"Sandeewani Swarnapali","orcid":null},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Sandeewani Swarnapali","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048493557","display_name":"Tharaka Hewa","orcid":"https://orcid.org/0000-0002-4520-6542"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Tharaka Hewa","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069043129","display_name":"Yushan Siriwardhana","orcid":"https://orcid.org/0000-0001-5992-891X"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Yushan Siriwardhana","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059694865","display_name":"Mika Ylianttila","orcid":"https://orcid.org/0000-0002-8079-5514"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Mika Ylianttila","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5120354458"],"corresponding_institution_ids":["https://openalex.org/I98381234"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38794222,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.321399986743927,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.321399986743927,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.19249999523162842,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12808","display_name":"Ferroelectric and Negative Capacitance Devices","score":0.12620000541210175,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6991999745368958},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6229000091552734},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5781000256538391},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5759000182151794},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.5037000179290771},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4262999892234802},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4059000015258789},{"id":"https://openalex.org/keywords/scaling","display_name":"Scaling","score":0.3896999955177307}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8032000064849854},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6991999745368958},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6229000091552734},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5781000256538391},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5759000182151794},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.5037000179290771},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4262999892234802},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4059000015258789},{"id":"https://openalex.org/C99844830","wikidata":"https://www.wikidata.org/wiki/Q102441924","display_name":"Scaling","level":2,"score":0.3896999955177307},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3587999939918518},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.357699990272522},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.35120001435279846},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3472000062465668},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C3017813396","wikidata":"https://www.wikidata.org/wiki/Q17078173","display_name":"Resource constraints","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28619998693466187},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28360000252723694},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27399998903274536},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2655999958515167},{"id":"https://openalex.org/C2778774385","wikidata":"https://www.wikidata.org/wiki/Q4437810","display_name":"Power management","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscn67557.2025.11230695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscn67557.2025.11230695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Standards for Communications and Networking (CSCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320328501","display_name":"Business Finland","ror":"https://ror.org/05bgf9v38"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1982980578","https://openalex.org/W2018671131","https://openalex.org/W2097178527","https://openalex.org/W2099419573","https://openalex.org/W2143991132","https://openalex.org/W2931122162","https://openalex.org/W2998827957","https://openalex.org/W3005086430","https://openalex.org/W3146736019","https://openalex.org/W3184215115","https://openalex.org/W4293744062","https://openalex.org/W4293795122","https://openalex.org/W4296437592","https://openalex.org/W4384157889","https://openalex.org/W4392523536","https://openalex.org/W4400135851"],"related_works":[],"abstract_inverted_index":{"Communication":[0],"technologies":[1],"in":[2,20,34],"the":[3,91],"6th":[4],"Generation":[5],"(6G)":[6],"rely":[7],"on":[8,68],"cloud-native,":[9],"microservice-oriented":[10],"architectures,":[11],"where":[12],"AI":[13],"and":[14,38,50,58,86,93],"ML":[15],"play":[16],"a":[17,47,69],"key":[18],"role":[19],"automating":[21],"resource":[22,36],"scaling.":[23],"However,":[24],"adversarially":[25],"manipulated":[26],"training":[27],"data":[28],"can":[29],"mislead":[30],"ML-based":[31],"auto-scalers,":[32],"resulting":[33],"inefficient":[35],"usage":[37],"increased":[39],"costs.":[40],"To":[41],"address":[42],"this,":[43],"we":[44],"propose":[45],"EXSIMAS6G,":[46],"multi-stage,":[48],"explainable,":[49],"fault-tolerant":[51],"auto-scaling":[52],"framework":[53],"that":[54,75],"detects":[55],"adversarial":[56],"impact":[57],"ensures":[59],"resilience":[60],"against":[61],"malicious":[62],"Kubernetes":[63],"clusters.":[64],"Our":[65],"rigorous":[66],"evaluation":[67],"real-world":[70],"5G":[71],"cloud":[72],"dataset":[73],"demonstrates":[74],"EXSIMAS6G":[76],"improves":[77],"scaling":[78],"accuracy":[79],"(+5.1%),":[80],"under-provisioning":[81],"(12.4%),":[82],"QoS":[83],"violations":[84],"(-7.13%),":[85],"CPU":[87],"costs":[88],"(-16.06%),":[89],"confirming":[90],"effectiveness":[92],"cost-efficiency":[94],"for":[95],"6G":[96],"systems.":[97]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
