{"id":"https://openalex.org/W3090327961","doi":"https://doi.org/10.1109/ijcnn48605.2020.9207094","title":"Intrusion Detection with Segmented Federated Learning for Large-Scale Multiple LANs","display_name":"Intrusion Detection with Segmented Federated Learning for Large-Scale Multiple LANs","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3090327961","doi":"https://doi.org/10.1109/ijcnn48605.2020.9207094","mag":"3090327961"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn48605.2020.9207094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9207094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041151881","display_name":"Yuwei Sun","orcid":"https://orcid.org/0000-0001-7315-8034"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yuwei Sun","raw_affiliation_strings":["Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045456657","display_name":"Hideya Ochiai","orcid":"https://orcid.org/0000-0002-4568-6726"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideya Ochiai","raw_affiliation_strings":["Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052106822","display_name":"Hiroshi Esaki","orcid":"https://orcid.org/0000-0001-5657-9216"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroshi Esaki","raw_affiliation_strings":["Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041151881"],"corresponding_institution_ids":["https://openalex.org/I74801974"],"apc_list":null,"apc_paid":null,"fwci":3.2377,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.9246534,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8585084676742554},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6803877353668213},{"id":"https://openalex.org/keywords/segmentation","display_name":"Segmentation","score":0.5427054166793823},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5019998550415039},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4920150935649872},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.488727331161499},{"id":"https://openalex.org/keywords/collaborative-learning","display_name":"Collaborative learning","score":0.43423473834991455},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4315067529678345},{"id":"https://openalex.org/keywords/learning-network","display_name":"Learning network","score":0.43089044094085693},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4284968376159668}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8585084676742554},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6803877353668213},{"id":"https://openalex.org/C89600930","wikidata":"https://www.wikidata.org/wiki/Q1423946","display_name":"Segmentation","level":2,"score":0.5427054166793823},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5019998550415039},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4920150935649872},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.488727331161499},{"id":"https://openalex.org/C138020889","wikidata":"https://www.wikidata.org/wiki/Q2349659","display_name":"Collaborative learning","level":2,"score":0.43423473834991455},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4315067529678345},{"id":"https://openalex.org/C2987015589","wikidata":"https://www.wikidata.org/wiki/Q1040098","display_name":"Learning network","level":2,"score":0.43089044094085693},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4284968376159668},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn48605.2020.9207094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9207094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W111228695","https://openalex.org/W391985582","https://openalex.org/W1893133781","https://openalex.org/W2215862420","https://openalex.org/W2283463896","https://openalex.org/W2342408547","https://openalex.org/W2579603034","https://openalex.org/W2734718015","https://openalex.org/W2786075294","https://openalex.org/W2804338997","https://openalex.org/W2919021187","https://openalex.org/W2944209762","https://openalex.org/W2963276095","https://openalex.org/W6695838908","https://openalex.org/W6732411214"],"related_works":["https://openalex.org/W4298221930","https://openalex.org/W2777914285","https://openalex.org/W4378677776","https://openalex.org/W3013363440","https://openalex.org/W4287823391","https://openalex.org/W2357468538","https://openalex.org/W2133389611","https://openalex.org/W2116694234","https://openalex.org/W2364690917","https://openalex.org/W2147854095"],"abstract_inverted_index":{"Traditional":[0],"approaches":[1],"to":[2,24,30,45,68,109,138],"cybersecurity":[3],"issues":[4],"usually":[5],"protect":[6],"users":[7],"from":[8,83,149],"attacks":[9],"after":[10],"the":[11,35,56,62,116,154,178],"occurrence":[12],"of":[13,16,20,32,58,107,118,164,186],"specific":[14],"types":[15,163],"attacks.":[17],"Besides,":[18],"patterns":[19],"recent":[21],"cyberattacks":[22],"tend":[23],"be":[25],"changeable,":[26],"which":[27,103],"add":[28],"up":[29],"unpredictability":[31],"them.":[33],"On":[34],"other":[36,131],"hand,":[37],"machine":[38],"learning,":[39],"as":[40,121],"a":[41,70,76,84,93,173],"new":[42],"method":[43],"used":[44],"detect":[46],"intrusion,":[47],"is":[48,80,158],"attracting":[49],"more":[50,52],"and":[51,114,171,189],"attention.":[53],"Moreover,":[54],"through":[55],"sharing":[57],"local":[59],"training":[60],"data,":[61],"centralized":[63],"learning":[64,79,86,96,112],"approach":[65],"has":[66],"proven":[67],"improve":[69],"model's":[71],"performance.":[72],"In":[73],"this":[74],"research,":[75],"segmented":[77],"federated":[78,95],"proposed,":[81],"different":[82],"collaborative":[85,111],"based":[87,176],"on":[88,177],"single":[89],"global":[90,101,126],"model":[91,175],"in":[92,153],"traditional":[94],"model,":[97],"it":[98],"keeps":[99],"multiple":[100,125],"models":[102,127],"allow":[104],"each":[105,130],"segment":[106],"participants":[108,119],"conduct":[110],"separately":[113],"rearranges":[115],"segmentation":[117],"dynamically":[120],"well.":[122],"Furthermore,":[123],"these":[124,193],"interact":[128],"with":[129,192],"for":[132,167],"updating":[133],"parameters,":[134],"thus":[135],"being":[136],"adaptable":[137],"various":[139],"participants'":[140,151],"LANs.":[141],"A":[142],"dataset":[143],"covering":[144],"two":[145],"months'":[146],"traffic":[147],"data":[148],"20":[150],"LANs":[152],"LAN-Security":[155],"Monitoring":[156],"Project":[157],"used.":[159],"We":[160],"adopt":[161],"three":[162],"knowledge-based":[165],"methods":[166],"labeling":[168,194],"network":[169],"events":[170],"train":[172],"CNN":[174],"dataset.":[179],"At":[180],"last,":[181],"we":[182],"achieve":[183],"validation":[184],"accuracies":[185],"0.923,":[187],"0.813":[188],"0.877":[190],"individually":[191],"methods.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
