{"id":"https://openalex.org/W7141589244","doi":"https://doi.org/10.1109/icce67443.2026.11449678","title":"Lightweight Feature Bridging for On-Device Cross-Domain Intrusion Detection in IoT Environments","display_name":"Lightweight Feature Bridging for On-Device Cross-Domain Intrusion Detection in IoT Environments","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7141589244","doi":"https://doi.org/10.1109/icce67443.2026.11449678"},"language":null,"primary_location":{"id":"doi:10.1109/icce67443.2026.11449678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094023355","display_name":"Jedidah Mwaura","orcid":null},"institutions":[{"id":"https://openalex.org/I207014233","display_name":"Kyushu Institute of Technology","ror":"https://ror.org/02278tr80","country_code":"JP","type":"education","lineage":["https://openalex.org/I207014233"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Jedidah Mwaura","raw_affiliation_strings":["Kyushu Institute of Technology,Graduate School of Computer Science and Systems Engineering,Fukuoka,Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu Institute of Technology,Graduate School of Computer Science and Systems Engineering,Fukuoka,Japan","institution_ids":["https://openalex.org/I207014233"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130768822","display_name":"Shunsuke Araki","orcid":null},"institutions":[{"id":"https://openalex.org/I207014233","display_name":"Kyushu Institute of Technology","ror":"https://ror.org/02278tr80","country_code":"JP","type":"education","lineage":["https://openalex.org/I207014233"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shunsuke Araki","raw_affiliation_strings":["Kyushu Institute of Technology,Faculty of Computer Science and Systems Engineering,Fukuoka,Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu Institute of Technology,Faculty of Computer Science and Systems Engineering,Fukuoka,Japan","institution_ids":["https://openalex.org/I207014233"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130766572","display_name":"S. M. Shamim","orcid":null},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"S. M. Shamim","raw_affiliation_strings":["Okayama University,Graduate School of Environmental, Life, Natural Science and Technology,Okayama,Japan"],"affiliations":[{"raw_affiliation_string":"Okayama University,Graduate School of Environmental, Life, Natural Science and Technology,Okayama,Japan","institution_ids":["https://openalex.org/I163770644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113322489","display_name":"Samsul Huda","orcid":null},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Samsul Huda","raw_affiliation_strings":["Okayama University,Interdisciplinary Education and Research Field,Okayama,Japan"],"affiliations":[{"raw_affiliation_string":"Okayama University,Interdisciplinary Education and Research Field,Okayama,Japan","institution_ids":["https://openalex.org/I163770644"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128650594","display_name":"Y. Nogami","orcid":null},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuyuki Nogami","raw_affiliation_strings":["Okayama University,Graduate School of Environmental, Life, Natural Science and Technology,Okayama,Japan"],"affiliations":[{"raw_affiliation_string":"Okayama University,Graduate School of Environmental, Life, Natural Science and Technology,Okayama,Japan","institution_ids":["https://openalex.org/I163770644"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5094023355"],"corresponding_institution_ids":["https://openalex.org/I207014233"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.94571464,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6315000057220459,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6315000057220459,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.06159999966621399,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.0406000018119812,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.698199987411499},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5231999754905701},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4765999913215637},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.44690001010894775},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.31220000982284546}],"concepts":[{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.698199987411499},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6348000168800354},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5231999754905701},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4765999913215637},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.44690001010894775},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.31220000982284546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2833999991416931},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25600001215934753},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce67443.2026.11449678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2296509296","https://openalex.org/W2789828921","https://openalex.org/W2883554196","https://openalex.org/W2909444216","https://openalex.org/W2944140322","https://openalex.org/W3085955590","https://openalex.org/W4224282503","https://openalex.org/W4392248638","https://openalex.org/W4396497899","https://openalex.org/W4405566672","https://openalex.org/W4405697399","https://openalex.org/W4408862157","https://openalex.org/W4409321544"],"related_works":[],"abstract_inverted_index":{"In":[0,56],"the":[1,90,110],"advancing":[2],"of":[3,19,92],"AI-driven":[4],"IoT":[5,13,70,101],"security,":[6],"reliable":[7],"intrusion":[8],"detection":[9,54,124],"is":[10],"essential":[11],"as":[12],"devices":[14],"face":[15],"a":[16,61,82,115],"growing":[17],"variety":[18],"complex":[20],"and":[21,28,53,122],"evolving":[22],"threats.":[23],"Cross-domain":[24],"datasets":[25],"where":[26],"training":[27],"testing":[29],"data":[30],"come":[31],"from":[32],"distinct":[33],"feature":[34,63],"spaces,":[35],"distributions,":[36],"or":[37],"label":[38],"sets":[39],"pose":[40],"significant":[41],"challenges":[42],"to":[43,50,67,80],"traditional":[44],"machine":[45],"learning":[46],"models,":[47],"often":[48],"leading":[49],"poor":[51],"generalization":[52],"accuracy.":[55],"this":[57,93],"study,":[58],"we":[59,95],"proposed":[60],"cross-domain":[62],"bridging":[64],"technique":[65,76],"designed":[66],"work":[68],"in":[69],"Intrusion":[71],"Detection":[72],"Systems":[73],"(IDS).":[74],"This":[75],"adopts":[77],"tiny":[78],"autoencoder":[79],"map":[81],"shared":[83],"latent":[84],"space":[85],"between":[86],"domains.":[87],"To":[88],"evaluate":[89],"effectiveness":[91],"approach,":[94],"conducted":[96],"experiments":[97],"on":[98],"five":[99],"diverse":[100],"datasets.":[102],"The":[103],"results":[104],"show":[105],"that":[106],"our":[107],"method":[108],"reduces":[109],"domain":[111],"gap":[112],"while":[113],"maintaining":[114],"compact":[116],"model":[117],"size,":[118],"low":[119],"inference":[120],"times,":[121],"effective":[123],"performance.":[125]},"counts_by_year":[],"updated_date":"2026-03-29T06:01:01.467347","created_date":"2026-03-28T00:00:00"}
