{"id":"https://openalex.org/W3046042764","doi":"https://doi.org/10.1109/icc40277.2020.9148632","title":"Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing","display_name":"Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3046042764","doi":"https://doi.org/10.1109/icc40277.2020.9148632","mag":"3046042764"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9148632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029265001","display_name":"Danni Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Danni Yuan","raw_affiliation_strings":["State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106707877","display_name":"Kaoru Ota","orcid":"https://orcid.org/0000-0002-3382-1652"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kaoru Ota","raw_affiliation_strings":["Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061453937","display_name":"Mianxiong Dong","orcid":"https://orcid.org/0000-0002-2788-3451"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mianxiong Dong","raw_affiliation_strings":["Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100671245","display_name":"Xiaoyan Zhu","orcid":"https://orcid.org/0000-0003-3741-9158"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Zhu","raw_affiliation_strings":["State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011438608","display_name":"Tao Wu","orcid":"https://orcid.org/0000-0003-1344-835X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Wu","raw_affiliation_strings":["State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100697216","display_name":"Lin\u2010Jie Zhang","orcid":"https://orcid.org/0000-0001-6702-8313"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linjie Zhang","raw_affiliation_strings":["State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services State, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5029265001"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":4.6253,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.95075363,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8222887516021729},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5892981886863708},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.579882800579071},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.575623631477356},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5728135704994202},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5440073013305664},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5040677785873413},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4658554196357727},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.45002254843711853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.349279522895813},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2629660367965698},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19617649912834167},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09334006905555725}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8222887516021729},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5892981886863708},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.579882800579071},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.575623631477356},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5728135704994202},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5440073013305664},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5040677785873413},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4658554196357727},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.45002254843711853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.349279522895813},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2629660367965698},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19617649912834167},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09334006905555725}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9148632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1970429723","https://openalex.org/W1994721878","https://openalex.org/W2105103777","https://openalex.org/W2163605009","https://openalex.org/W2296509296","https://openalex.org/W2338318698","https://openalex.org/W2416799949","https://openalex.org/W2529556398","https://openalex.org/W2562908385","https://openalex.org/W2739651313","https://openalex.org/W2739959530","https://openalex.org/W2761901817","https://openalex.org/W2762776925","https://openalex.org/W2767106145","https://openalex.org/W2782734143","https://openalex.org/W2783482415","https://openalex.org/W2786070938","https://openalex.org/W2797917356","https://openalex.org/W2902805725","https://openalex.org/W2950776302","https://openalex.org/W2963366538","https://openalex.org/W2963683434","https://openalex.org/W2963684088","https://openalex.org/W4245460974","https://openalex.org/W6684191040","https://openalex.org/W6685352114","https://openalex.org/W6729482032","https://openalex.org/W6745976546","https://openalex.org/W6747939174"],"related_works":["https://openalex.org/W3211931762","https://openalex.org/W2942586735","https://openalex.org/W4225757241","https://openalex.org/W4385414328","https://openalex.org/W2534668683","https://openalex.org/W4375928818","https://openalex.org/W4293812074","https://openalex.org/W4307482744","https://openalex.org/W4385586765","https://openalex.org/W3126507566"],"abstract_inverted_index":{"Smart":[0],"home":[1],"is":[2,39,56,141,172],"an":[3,60,100],"indispensable":[4],"part":[5],"of":[6,8,17,42,46,77,131,177],"Internet":[7],"Things(IoT)":[9],"owing":[10],"to":[11,29,58,69,90,105,115,120,127,143,147,174],"the":[12,21,44,49,88,129,149,156,165,185],"prompt":[13],"development":[14],"and":[15,81,167,195],"application":[16],"smart":[18,25,64,82],"devices.":[19],"However,":[20],"data":[22,68],"collected":[23],"from":[24],"homes":[26],"usually":[27],"need":[28],"be":[30,59,70,106,181],"processed":[31,71],"by":[32],"a":[33,40,122],"cloud":[34],"server,":[35],"which":[36,66,117,159,178],"means":[37],"there":[38],"risk":[41],"leaking":[43],"privacy":[45],"users":[47],"during":[48],"transmission.":[50],"In":[51],"this":[52,96],"situation,":[53],"edge":[54,73,84,109],"computing":[55],"considered":[57],"ideal":[61],"platform":[62],"for":[63],"home,":[65],"enable":[67],"at":[72],"nodes.":[74,110],"Unfortunately,":[75],"because":[76],"unsecured":[78],"Wi-Fi":[79],"connection":[80],"devices,":[83],"nodes":[85],"also":[86],"have":[87],"possibility":[89],"encounter":[91],"malicious":[92],"attacks.":[93],"Hence,":[94],"in":[95,190],"paper,":[97],"we":[98],"designed":[99],"intrusion":[101,150],"detection":[102,151],"system":[103],"(IDS)":[104],"deployed":[107],"on":[108,155],"We":[111,153],"convert":[112],"network":[113,125,132,162],"traffic":[114,163],"images":[116],"are":[118],"applied":[119],"train":[121],"convolutional":[123],"neural":[124],"(CNN)":[126],"classify":[128],"categories":[130,176],"traffic.":[133],"Furthermore,":[134],"Auxiliary":[135],"Classifier":[136],"Generative":[137],"Adversarial":[138],"Network":[139],"(AC-GAN)":[140],"adopted":[142],"generate":[144],"synthesized":[145],"samples":[146],"expand":[148],"dataset.":[152],"experiment":[154],"UNSW-NB15":[157],"dataset":[158],"contains":[160],"substantial":[161],"about":[164,193],"normal":[166,194],"anomalies.":[168],"The":[169],"proposed":[170],"scheme":[171],"effective":[173],"minor":[175],"precision":[179,186],"could":[180],"improved":[182],"12%.":[183],"Besides,":[184],"can":[187],"reach":[188],"96%":[189],"binary":[191],"classification":[192],"anomaly.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":9}],"updated_date":"2026-02-18T06:20:13.636215","created_date":"2025-10-10T00:00:00"}
