{"id":"https://openalex.org/W4402159346","doi":"https://doi.org/10.1109/icc51166.2024.10622942","title":"Multiple-Input Auto-Encoder for IoT Intrusion Detection Systems with Heterogeneous Data","display_name":"Multiple-Input Auto-Encoder for IoT Intrusion Detection Systems with Heterogeneous Data","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4402159346","doi":"https://doi.org/10.1109/icc51166.2024.10622942"},"language":"en","primary_location":{"id":"doi:10.1109/icc51166.2024.10622942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10622942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015445287","display_name":"Phai Vu Dinh","orcid":"https://orcid.org/0000-0001-5000-258X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Phai Vu Dinh","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney,Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108148081","display_name":"Dinh Thai Hoang","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Thai Hoang","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney,Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030957027","display_name":"Nguyen Quang Uy","orcid":null},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Nguyen Quang Uy","raw_affiliation_strings":["Le Quy Don Technical University,Hanoi,Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University,Hanoi,Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111229171","display_name":"Diep N. Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Diep N. Nguyen","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney,Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000004841","display_name":"Son Pham Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Son Pham Bao","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney,Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063537942","display_name":"Eryk Dutkiewicz","orcid":"https://orcid.org/0000-0002-4268-9286"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Eryk Dutkiewicz","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney,Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5015445287"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":1.6305,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.84887544,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2707","last_page":"2712"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8084381818771362},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6606786251068115},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5822498202323914},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4787161350250244},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37720075249671936},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3310618996620178},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20445170998573303},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09434875845909119}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8084381818771362},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6606786251068115},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5822498202323914},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4787161350250244},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37720075249671936},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3310618996620178},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20445170998573303},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09434875845909119}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc51166.2024.10622942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10622942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G8900174045","display_name":null,"funder_award_id":"DE210100651","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2296509296","https://openalex.org/W2490420619","https://openalex.org/W2560674852","https://openalex.org/W2783741806","https://openalex.org/W2789828921","https://openalex.org/W2885070483","https://openalex.org/W2935633365","https://openalex.org/W2981318525","https://openalex.org/W2997574889","https://openalex.org/W3004777721","https://openalex.org/W3008195198","https://openalex.org/W3035528764","https://openalex.org/W3096581086","https://openalex.org/W4307821210","https://openalex.org/W4312685069","https://openalex.org/W4382318785","https://openalex.org/W4389988095","https://openalex.org/W6681096077","https://openalex.org/W6686207219"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Machine":[0],"learning":[1,116,179],"is":[2,26,30,65,111,226,235],"a":[3,17,85],"core":[4],"component":[5],"of":[6,35,45,139,161,167,200,245],"many":[7],"Intrusion":[8],"Detection":[9],"Systems":[10],"(IDS)":[11],"for":[12,21,60,181,214],"IoT":[13,24,36,49,55,63],"networks.":[14,50],"However,":[15],"developing":[16],"robust":[18],"machine-learning":[19],"model":[20,110,233,248],"IDSs":[22,61],"on":[23,62,144],"networks":[25,64],"very":[27],"challenging.":[28],"This":[29,240],"due":[31],"to":[32,128,131],"the":[33,40,57,108,122,134,145,158,162,190,210,232,243],"diversity":[34],"devices":[37],"resulting":[38],"in":[39,54,113,198,202,251],"inconsistency":[41],"and":[42,118,137,155,176],"high":[43],"dimensions":[44],"data":[46,59],"collected":[47,71],"from":[48,72],"In":[51,208],"other":[52],"words,":[53],"environments,":[56],"training":[58],"often":[66],"heterogeneous":[67,123],"since":[68],"they":[69],"are":[70],"multiple":[73,96,101,182],"sources":[74,103],"with":[75,104,184,189,223],"different":[76,105,185],"characteristics.":[77],"To":[78],"tackle":[79],"these":[80],"problems,":[81],"this":[82],"paper":[83],"proposes":[84],"novel":[86],"neural":[87],"network":[88],"architecture":[89],"called":[90],"Multiple-Input":[91],"Auto-Encoder":[92],"(MIAE).":[93],"MIAE":[94,109,163,187,221],"has":[95],"sub-encoders":[97],"that":[98],"can":[99,120],"process":[100],"input":[102],"dimensions.":[106,186],"Moreover,":[107],"trained":[112],"an":[114,216],"unsupervised":[115,177],"mode,":[117],"it":[119],"transfer":[121],"inputs":[124,183],"into":[125],"lower-dimensional":[126],"representation":[127,178],"facilitate":[129],"classifiers":[130],"distinguish":[132],"between":[133],"normal":[135],"samples":[136],"types":[138],"attacks.":[140],"The":[141],"experimental":[142],"results":[143],"three":[146,165],"most":[147],"popular":[148],"benchmark":[149],"IDS":[150],"datasets,":[151],"i.e.,":[152],"NSLKDD,":[153],"UNSW-NB15,":[154],"IDS2017,":[156],"show":[157],"superior":[159],"performance":[160],"over":[164],"groups":[166],"methods":[168,180],"including":[169],"conventional":[170],"classifiers,":[171],"state-of-the-art":[172],"dimensionality":[173],"reduction":[174],"models,":[175],"combined":[188,222],"Random":[191],"Forest":[192],"(RF)":[193],"classifier":[194,225],"also":[195],"achieves":[196],"96.2%":[197],"terms":[199],"accuracy":[201],"detecting":[203,215],"sophisticated":[204],"attacks,":[205],"e.g.,":[206],"Slowloris.":[207],"addition,":[209],"average":[211],"running":[212],"time":[213],"attack":[217],"sample":[218],"obtained":[219],"by":[220],"RF":[224],"only":[227],"roughly":[228],"5E-7":[229],"seconds,":[230],"whilst":[231],"size":[234],"lower":[236],"than":[237],"1":[238],"MB.":[239],"clearly":[241],"shows":[242],"effectiveness":[244],"our":[246],"proposed":[247],"when":[249],"deployed":[250],"practice.":[252]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
