{"id":"https://openalex.org/W4392982031","doi":"https://doi.org/10.1109/icaiic60209.2024.10463374","title":"Bit-by-Bit: A Quantization-Aware Training Framework with XAI for Robust Metaverse Cybersecurity","display_name":"Bit-by-Bit: A Quantization-Aware Training Framework with XAI for Robust Metaverse Cybersecurity","publication_year":2024,"publication_date":"2024-02-19","ids":{"openalex":"https://openalex.org/W4392982031","doi":"https://doi.org/10.1109/icaiic60209.2024.10463374"},"language":"en","primary_location":{"id":"doi:10.1109/icaiic60209.2024.10463374","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icaiic60209.2024.10463374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088813714","display_name":"Ebuka Chinaechetam Nkoro","orcid":"https://orcid.org/0000-0001-6958-4073"},"institutions":[{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ebuka Chinaechetam Nkoro","raw_affiliation_strings":["IT Convergence Engineering"],"affiliations":[{"raw_affiliation_string":"IT Convergence Engineering","institution_ids":["https://openalex.org/I4210147194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078533150","display_name":"Cosmas Ifeanyi Nwakanma","orcid":"https://orcid.org/0000-0003-3614-2687"},"institutions":[{"id":"https://openalex.org/I113409471","display_name":"Kumoh National Institute of Technology","ror":"https://ror.org/05dkjfz60","country_code":"KR","type":"education","lineage":["https://openalex.org/I113409471"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Cosmas Ifeanyi Nwakanma","raw_affiliation_strings":["Kumoh National Institute of Technology,ICT Convergence Research Center,Korea","ICT Convergence Research Center, Kumoh National Institute of Technology, Korea"],"affiliations":[{"raw_affiliation_string":"Kumoh National Institute of Technology,ICT Convergence Research Center,Korea","institution_ids":["https://openalex.org/I113409471"]},{"raw_affiliation_string":"ICT Convergence Research Center, Kumoh National Institute of Technology, Korea","institution_ids":["https://openalex.org/I113409471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100702253","display_name":"Jae\u2010Min Lee","orcid":"https://orcid.org/0000-0001-6885-5185"},"institutions":[{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jae-Min Lee","raw_affiliation_strings":["IT Convergence Engineering"],"affiliations":[{"raw_affiliation_string":"IT Convergence Engineering","institution_ids":["https://openalex.org/I4210147194"]}]},{"author_position":"last","author":{"id":null,"display_name":"Dong-Seong Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dong-Seong Kim","raw_affiliation_strings":["IT Convergence Engineering"],"affiliations":[{"raw_affiliation_string":"IT Convergence Engineering","institution_ids":["https://openalex.org/I4210147194"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088813714"],"corresponding_institution_ids":["https://openalex.org/I4210147194"],"apc_list":null,"apc_paid":null,"fwci":0.6725,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63517881,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"12","issue":null,"first_page":"832","last_page":"837"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.7718794345855713},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7634943723678589},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.7029418349266052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5043107271194458},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4154142737388611},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13623052835464478}],"concepts":[{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.7718794345855713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7634943723678589},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.7029418349266052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5043107271194458},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4154142737388611},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13623052835464478},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaiic60209.2024.10463374","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icaiic60209.2024.10463374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2343828539","https://openalex.org/W2529525882","https://openalex.org/W3082465740","https://openalex.org/W3132986466","https://openalex.org/W3193303850","https://openalex.org/W4205413245","https://openalex.org/W4283459051","https://openalex.org/W4285106051","https://openalex.org/W4290065450","https://openalex.org/W4294691140","https://openalex.org/W4296079341","https://openalex.org/W4309157242","https://openalex.org/W4312441490","https://openalex.org/W4315928996","https://openalex.org/W4386453656"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2411923897","https://openalex.org/W4285347720","https://openalex.org/W4200259850","https://openalex.org/W2333831899","https://openalex.org/W2484894494","https://openalex.org/W2367385042","https://openalex.org/W4381186982","https://openalex.org/W2040781570","https://openalex.org/W2390279801"],"abstract_inverted_index":{"In":[0],"this":[1,69],"work,":[2],"a":[3,36,72,147],"novel":[4],"framework":[5],"for":[6],"detecting":[7],"mali-cious":[8],"networks":[9,14,46,82],"in":[10,44,94],"the":[11,33,42,55,88,129,140],"IoT-enabled":[12],"Metaverse":[13,28,45,95],"to":[15,25,41,53,121,133],"ensure":[16],"that":[17],"malicious":[18],"network":[19,61],"traffic":[20],"is":[21,30,101],"identified":[22],"and":[23,47,59,91,115,126],"integrated":[24],"suit":[26],"optimal":[27],"cybersecurity":[29],"presented.":[31],"First,":[32],"study":[34,70],"raises":[35],"core":[37],"security":[38],"issue":[39],"related":[40],"cyberthreats":[43],"its":[48],"privacy":[49],"breaching":[50],"risks.":[51],"Second,":[52],"address":[54],"shortcomings":[56],"of":[57,65,90,150],"efficient":[58],"effective":[60],"intrusion":[62],"detection":[63],"(NIDS)":[64],"dark":[66],"web":[67],"traffic,":[68],"employs":[71],"quantization-aware":[73],"trained":[74],"(QAT)":[75],"1D":[76],"CNN":[77],"followed":[78],"by":[79],"fully":[80],"con-nected":[81],"(ID":[83],"CNNs-GRU-FCN)":[84],"model,":[85],"which":[86],"addresses":[87],"issues":[89],"memory":[92],"contingencies":[93],"NIDS":[96],"models.":[97],"The":[98],"QAT":[99],"model":[100,124,142],"made":[102],"interpretable":[103,117],"using":[104],"eXplainable":[105],"artificial":[106],"intelligence":[107],"(XAI)":[108],"methods":[109],"namely,":[110],"SHapley":[111],"additive":[112],"exPlanations":[113],"(SHAP)":[114],"local":[116],"model-agnostic":[118],"ex-planations":[119],"(LIME),":[120],"provide":[122],"trustworthy":[123],"transparency":[125],"interpretability.":[127],"Overall,":[128],"proposed":[130],"method":[131],"contributes":[132],"storage":[134],"benefits":[135],"four":[136],"times":[137],"higher":[138],"than":[139],"original":[141],"without":[143],"quantization":[144],"while":[145],"attaining":[146],"high":[148],"accuracy":[149],"99.82":[151],"%.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
