{"id":"https://openalex.org/W3035918757","doi":"https://doi.org/10.1109/icccs49078.2020.9118577","title":"Fast Detection Model of Untrusted Nodes in Fog Computing Based on CGAN","display_name":"Fast Detection Model of Untrusted Nodes in Fog Computing Based on CGAN","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3035918757","doi":"https://doi.org/10.1109/icccs49078.2020.9118577","mag":"3035918757"},"language":"en","primary_location":{"id":"doi:10.1109/icccs49078.2020.9118577","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118577","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075841672","display_name":"Jingcheng Ye","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingcheng Ye","raw_affiliation_strings":["Bell Honors School, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Bell Honors School, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059047718","display_name":"Yunjie Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunjie Fang","raw_affiliation_strings":["Bell Honors School, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Bell Honors School, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090323802","display_name":"Xingda Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingda Bao","raw_affiliation_strings":["Bell Honors School, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Bell Honors School, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075841672"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06803045,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1 10","issue":null,"first_page":"504","last_page":"509"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8048404455184937},{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.7881788611412048},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5934353470802307},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.540805459022522},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.525182843208313},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4882409870624542},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.46929413080215454},{"id":"https://openalex.org/keywords/rate-of-convergence","display_name":"Rate of convergence","score":0.4214848577976227},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33576613664627075},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2050095796585083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18168336153030396},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.12290120124816895},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08071935176849365},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06281042098999023}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8048404455184937},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.7881788611412048},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5934353470802307},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.540805459022522},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.525182843208313},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4882409870624542},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.46929413080215454},{"id":"https://openalex.org/C57869625","wikidata":"https://www.wikidata.org/wiki/Q1783502","display_name":"Rate of convergence","level":3,"score":0.4214848577976227},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33576613664627075},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2050095796585083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18168336153030396},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.12290120124816895},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08071935176849365},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06281042098999023},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs49078.2020.9118577","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118577","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2103972037","https://openalex.org/W2136922672","https://openalex.org/W2201885641","https://openalex.org/W2262390119","https://openalex.org/W2333543981","https://openalex.org/W2523317907","https://openalex.org/W2594536436","https://openalex.org/W2769084017","https://openalex.org/W2803971618","https://openalex.org/W2902581743","https://openalex.org/W3026790608"],"related_works":["https://openalex.org/W4293202849","https://openalex.org/W1980965563","https://openalex.org/W1489300767","https://openalex.org/W2387995142","https://openalex.org/W4380714744","https://openalex.org/W4319453655","https://openalex.org/W2089959425","https://openalex.org/W2057775761","https://openalex.org/W2964074194","https://openalex.org/W2800597160"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"the":[2,5,11,35,44,53,71,75,86,114],"problem":[3],"that":[4,85],"existing":[6],"network":[7,29,48],"nodes":[8,13,77,95],"can't":[9],"detect":[10,74],"untrusted":[12,22,76,94],"quickly.":[14,80],"In":[15],"this":[16,50],"paper,":[17],"a":[18],"condition":[19],"generated":[20],"fast":[21,90],"node":[23],"detection":[24,36,91],"model":[25,51,92],"(FUNM)":[26],"for":[27,113],"enemy":[28],"(CGAN)":[30],"is":[31],"proposed,":[32],"which":[33,109],"improves":[34],"efficiency":[37],"greatly":[38],"with":[39],"high":[40],"accuracy.":[41],"Different":[42],"from":[43],"traditional":[45],"generative":[46],"adversary":[47],"(GAN),":[49],"limits":[52],"degree":[54],"of":[55,57,59,93,101,116],"freedom":[56],"convergence":[58,72],"generator":[60],"and":[61,73,79,106],"discriminator":[62],"by":[63],"adding":[64],"constraints,":[65],"so":[66],"as":[67],"to":[68],"speed":[69],"up":[70],"accurately":[78],"The":[81],"experimental":[82],"results":[83],"show":[84],"CGAN":[87],"based":[88],"on":[89],"has":[96],"obvious":[97],"advantages":[98],"in":[99],"terms":[100],"accuracy,":[102],"false":[103],"alarm":[104],"rate":[105],"real":[107],"rate,":[108],"provides":[110],"great":[111],"help":[112],"security":[115],"edge":[117],"networks.":[118]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
