{"id":"https://openalex.org/W4416250904","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229034","title":"AI-Driven Detection and Mitigation of Backdoor Data Infiltration Among IoT Networks","display_name":"AI-Driven Detection and Mitigation of Backdoor Data Infiltration Among IoT Networks","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416250904","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229034"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11229034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111140051","display_name":"Syed Murtoza Mushrul Pasha","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Syed Murtoza Mushrul Pasha","raw_affiliation_strings":["Chongqing University,College of Computer Science,Chongqing,China"],"affiliations":[{"raw_affiliation_string":"Chongqing University,College of Computer Science,Chongqing,China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047737139","display_name":"Chunxiao Ye","orcid":"https://orcid.org/0000-0002-6736-1025"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunxiao Ye","raw_affiliation_strings":["Chongqing University,College of Computer Science,Chongqing,China"],"affiliations":[{"raw_affiliation_string":"Chongqing University,College of Computer Science,Chongqing,China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098903239","display_name":"Shahidur Rahoman Sohag","orcid":null},"institutions":[{"id":"https://openalex.org/I133999245","display_name":"University of Nevada, Las Vegas","ror":"https://ror.org/0406gha72","country_code":"US","type":"education","lineage":["https://openalex.org/I133999245"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shahidur Rahoman Sohag","raw_affiliation_strings":["University of Nevada, Las Vegas,Department of Computer Science,Las Vegas,USA"],"affiliations":[{"raw_affiliation_string":"University of Nevada, Las Vegas,Department of Computer Science,Las Vegas,USA","institution_ids":["https://openalex.org/I133999245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004062229","display_name":"Muhammad Ali","orcid":"https://orcid.org/0000-0003-0351-2864"},"institutions":[{"id":"https://openalex.org/I4210143550","display_name":"Taylor's University","ror":"https://ror.org/0498pcx51","country_code":"MY","type":"education","lineage":["https://openalex.org/I4210143550"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Muhammad Mahin Ali","raw_affiliation_strings":["Taylor&#x2019;s University,School of Computer Science,Subang Jaya,Malaysia"],"affiliations":[{"raw_affiliation_string":"Taylor&#x2019;s University,School of Computer Science,Subang Jaya,Malaysia","institution_ids":["https://openalex.org/I4210143550"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023117959","display_name":"Md Tanvir Islam","orcid":"https://orcid.org/0009-0007-9405-5684"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"MD Tanvir Islam","raw_affiliation_strings":["Chongqing University,College of Computer Science,Chongqing,China"],"affiliations":[{"raw_affiliation_string":"Chongqing University,College of Computer Science,Chongqing,China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111140051"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":3.3332,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.93775702,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6277999877929688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6277999877929688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.061900001019239426,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.04500000178813934,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9837999939918518},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.6187000274658203},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5504999756813049},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5170000195503235},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5002999901771545},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.41819998621940613},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4124999940395355}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9837999939918518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7059000134468079},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.6187000274658203},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5504999756813049},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5170000195503235},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5002999901771545},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.41819998621940613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4178999960422516},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4124999940395355},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.38440001010894775},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.37439998984336853},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3292999863624573},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32510000467300415},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28540000319480896},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.2761000096797943},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2757999897003174},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2689000070095062},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11229034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2003544295","https://openalex.org/W2127305011","https://openalex.org/W2134295053","https://openalex.org/W2594536436","https://openalex.org/W2885195348","https://openalex.org/W2892077825","https://openalex.org/W2946408872","https://openalex.org/W2966979469","https://openalex.org/W3005228016","https://openalex.org/W3009219618","https://openalex.org/W3021764406","https://openalex.org/W3026114500","https://openalex.org/W3036121403","https://openalex.org/W3080816325","https://openalex.org/W3088058100","https://openalex.org/W3088527522","https://openalex.org/W3099993444","https://openalex.org/W3123294966","https://openalex.org/W3128470182","https://openalex.org/W3159136237","https://openalex.org/W3160546232","https://openalex.org/W3186703302","https://openalex.org/W3194370204","https://openalex.org/W3211270451","https://openalex.org/W3214662093","https://openalex.org/W4214674051","https://openalex.org/W4245384076","https://openalex.org/W4285082635","https://openalex.org/W4287511941","https://openalex.org/W4297895153","https://openalex.org/W4313157780","https://openalex.org/W4367293043","https://openalex.org/W4387491243","https://openalex.org/W4388037625","https://openalex.org/W4391037432","https://openalex.org/W4400134761","https://openalex.org/W4400574640","https://openalex.org/W4401974513","https://openalex.org/W4402041023","https://openalex.org/W4404840185"],"related_works":[],"abstract_inverted_index":{"The":[0,52,90,157],"increasing":[1],"popularity":[2],"of":[3,5,32,45,71,134,138,159,176],"Internet":[4],"Things":[6],"(IoT)":[7],"networks":[8,237],"has":[9],"resulted":[10],"in":[11,16,49,126,165,174,230,235],"exposure":[12],"to":[13,26,67,97,136,171,179,223,232],"cyberattacks,":[14],"and":[15,30,43,63,86,101,115,150,167,181,198,210,227],"particular":[17],"backdoor":[18,46,139],"data":[19,47,140],"infiltration.":[20],"These":[21],"attacks":[22],"constitute":[23],"serious":[24],"threats":[25,183,234],"the":[27,69,127,132,160,177],"confidentiality,":[28],"integrity,":[29],"availability":[31],"IoT":[33,50,72,76,169,236,245],"systems.":[34],"This":[35],"research":[36],"proposes":[37],"an":[38],"AI-based":[39,217],"system":[40,54,128,162,197],"for":[41,108,131],"detection":[42,65,201,206],"mitigation":[44,124],"infiltration":[48,141],"networks.":[51],"proposed":[53,161,195],"employs":[55],"advanced":[56],"machine":[57,91],"learning":[58,62,92],"models,":[59],"including":[60],"deep":[61],"anomaly":[64],"methods":[66],"improve":[68],"security":[70,246],"ecosystems.":[73],"A":[74,123,191],"comprehensive":[75],"network":[77,189],"traffic":[78],"dataset":[79],"was":[80,129,163,219],"developed":[81],"that":[82,142,221,238],"incorporates":[83],"both":[84],"normal":[85,100],"malicious":[87,102],"(backdoor)":[88],"activities.":[89],"models":[93],"were":[94],"then":[95],"trained":[96],"distinguish":[98],"between":[99,194],"traffic,":[103],"achieving":[104],"overall":[105],"high":[106],"results":[107],"accuracy":[109],"(96.7%),":[110],"precision":[111],"(97.2%),":[112],"recall":[113,209],"(95.8%)":[114],"with":[116],"a":[117,215,225],"low":[118],"false":[119,212],"positive":[120],"rate":[121],"(3.2%).":[122],"framework":[125,218],"introduced":[130],"purpose":[133],"responding":[135],"incidents":[137],"deploys":[143],"automated":[144],"responses":[145],"such":[146],"as":[147],"device":[148],"isolation":[149],"remote":[151],"firmware":[152],"restoration":[153],"upon":[154],"attack":[155],"detection.":[156],"performance":[158],"evaluated":[164],"simulated":[166],"real-world":[168],"environments":[170],"demonstrate":[172],"effectiveness":[173],"terms":[175],"ability":[178],"detect":[180],"mitigate":[182],"while":[184],"minimizing":[185],"negative":[186],"impacts":[187],"on":[188],"performance.":[190],"comparative":[192],"analysis":[193],"AI":[196],"traditional":[199],"intrusion":[200],"systems,":[202],"which":[203],"demonstrated":[204],"improved":[205],"accuracy,":[207],"precision,":[208],"lower":[211],"negatives.":[213],"Therefore,":[214],"novel":[216],"created":[220],"proved":[222],"be":[224,241],"robust":[226],"scalable":[228],"design":[229],"response":[231],"cyber":[233],"could":[239],"potentially":[240],"integrated":[242],"into":[243],"existing":[244],"frameworks.":[247]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
