{"id":"https://openalex.org/W4385269770","doi":"https://doi.org/10.1109/eucnc/6gsummit58263.2023.10188312","title":"Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks","display_name":"Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks","publication_year":2023,"publication_date":"2023-06-06","ids":{"openalex":"https://openalex.org/W4385269770","doi":"https://doi.org/10.1109/eucnc/6gsummit58263.2023.10188312"},"language":"en","primary_location":{"id":"doi:10.1109/eucnc/6gsummit58263.2023.10188312","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit58263.2023.10188312","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Joint European Conference on Networks and Communications &amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021047372","display_name":"Cheol-Hee Park","orcid":"https://orcid.org/0000-0002-3637-9951"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Cheolhee Park","raw_affiliation_strings":["Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101703446","display_name":"Kyungmin Park","orcid":"https://orcid.org/0000-0001-9049-3635"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyungmin Park","raw_affiliation_strings":["Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104148215","display_name":"Jihyeon Song","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jihyeon Song","raw_affiliation_strings":["Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016013197","display_name":"Jonghyun Kim","orcid":"https://orcid.org/0000-0002-5532-2117"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jonghyun Kim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021047372"],"corresponding_institution_ids":["https://openalex.org/I142401562"],"apc_list":null,"apc_paid":null,"fwci":2.0091,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87203553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"490","last_page":"495"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8156454563140869},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7812934517860413},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.704789936542511},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6213838458061218},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4380354881286621},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.42219844460487366},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4178362488746643},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32173237204551697},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30718427896499634}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8156454563140869},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7812934517860413},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.704789936542511},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6213838458061218},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4380354881286621},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.42219844460487366},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4178362488746643},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32173237204551697},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30718427896499634},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eucnc/6gsummit58263.2023.10188312","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit58263.2023.10188312","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Joint European Conference on Networks and Communications &amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1995678176","https://openalex.org/W2584408238","https://openalex.org/W2762776925","https://openalex.org/W2783741806","https://openalex.org/W2809471091","https://openalex.org/W2963209930","https://openalex.org/W2982426954","https://openalex.org/W2984419450","https://openalex.org/W3036078548","https://openalex.org/W3043459281","https://openalex.org/W3045398511","https://openalex.org/W3082551002","https://openalex.org/W3083130672","https://openalex.org/W3086579950","https://openalex.org/W3122137198","https://openalex.org/W3129836451","https://openalex.org/W3155962425","https://openalex.org/W3163895120","https://openalex.org/W3169649651","https://openalex.org/W4206724648","https://openalex.org/W4284959321","https://openalex.org/W4310746777","https://openalex.org/W4312384107","https://openalex.org/W6781689429","https://openalex.org/W6786678634","https://openalex.org/W6789145912","https://openalex.org/W6793503443","https://openalex.org/W6847207408","https://openalex.org/W6847209443"],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2987774938","https://openalex.org/W2566006169","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W4229499248","https://openalex.org/W4378874356","https://openalex.org/W2055733372","https://openalex.org/W2369811061"],"abstract_inverted_index":{"As":[0],"mobile":[1,20,176,194],"technology":[2],"has":[3,49],"evolved":[4],"over":[5],"generations,":[6],"communication":[7],"systems":[8,83,137,158],"have":[9,54,68,84,89],"advanced":[10],"along":[11],"with":[12,34,138,159],"it.":[13],"Moreover,":[14],"the":[15,40,168,182,192],"6th":[16],"generation":[17],"(6G)":[18],"of":[19,95],"networks":[21],"is":[22],"expected":[23],"to":[24,47,153],"evolve":[25],"into":[26],"a":[27,117,130,144,174],"more":[28,56],"decentralized":[29,131],"and":[30,51,88,102,133,179],"open":[31],"environment.":[32,195],"Meanwhile,":[33],"these":[35,63,96],"advancements":[36],"in":[37,109,129,136,156,173,191],"network":[38,60,80,177,189],"systems,":[39],"attack":[41],"surface":[42],"that":[43,123,181],"can":[44,124,185],"be":[45,105,154,186],"exposed":[46],"adversaries":[48],"expanded,":[50],"potential":[52,64],"threats":[53],"become":[55],"sophisticated.":[57],"To":[58],"secure":[59],"sys-tems":[61],"from":[62],"attacks,":[65],"various":[66],"studies":[67,76,97],"focused":[69],"on":[70,77,99],"intrusion":[71,81,120],"detection":[72,82,121],"systems.":[73,111],"In":[74,112,163],"particular,":[75],"artificial":[78],"intelligence-based":[79],"been":[85],"actively":[86],"conducted":[87],"shown":[90],"remarkable":[91],"results.":[92],"However,":[93],"most":[94],"concentrate":[98],"centralized":[100],"environments":[101],"may":[103],"not":[104],"suitable":[106],"for":[107,151,188],"deployment":[108],"distributed":[110,118,157],"this":[113],"paper,":[114],"we":[115,166],"propose":[116],"learning-based":[119],"system":[122,184],"efficiently":[125],"train":[126],"predictive":[127],"models":[128,152,169],"environment":[132,178],"enable":[134],"learning":[135,147],"varying":[139],"computing":[140,161],"capabilities.":[141],"We":[142],"leveraged":[143],"state-of-the-art":[145],"split":[146],"approach,":[148],"which":[149],"allows":[150],"trained":[155],"different":[160],"resources.":[162],"our":[164],"experiments,":[165],"evaluate":[167],"using":[170],"data":[171],"collected":[172],"5G":[175],"demonstrate":[180],"proposed":[183],"applied":[187],"security":[190],"next-generation":[193]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
