{"id":"https://openalex.org/W3185537526","doi":"https://doi.org/10.1109/infocomwkshps51825.2021.9484545","title":"Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated Learning","display_name":"Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated Learning","publication_year":2021,"publication_date":"2021-05-10","ids":{"openalex":"https://openalex.org/W3185537526","doi":"https://doi.org/10.1109/infocomwkshps51825.2021.9484545","mag":"3185537526"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps51825.2021.9484545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps51825.2021.9484545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103187217","display_name":"Jibo Shi","orcid":"https://orcid.org/0000-0001-9694-0790"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jibo Shi","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101616897","display_name":"Bin Ge","orcid":"https://orcid.org/0000-0002-1491-2364"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Ge","raw_affiliation_strings":["College of Mathematical Sciences, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematical Sciences, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355692","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0001-7300-9215"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Beijing Institute of Astronautical Systems Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Astronautical Systems Engineering, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101501976","display_name":"Yu Yan","orcid":"https://orcid.org/0000-0002-2271-961X"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Yan","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100415892","display_name":"Shuang Li","orcid":"https://orcid.org/0000-0001-9142-5036"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Li","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103187217"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":1.6002,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.84217258,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8589992523193359},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7769961357116699},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5176013708114624},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.501500129699707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4505796432495117},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4344596564769745},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4208759665489197},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36978214979171753},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11517560482025146}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8589992523193359},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7769961357116699},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5176013708114624},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.501500129699707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4505796432495117},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4344596564769745},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4208759665489197},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36978214979171753},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11517560482025146},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps51825.2021.9484545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps51825.2021.9484545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321939","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1491873892","https://openalex.org/W1544101352","https://openalex.org/W2117002131","https://openalex.org/W2124365372","https://openalex.org/W2153363952","https://openalex.org/W2153919695","https://openalex.org/W2535838896","https://openalex.org/W2775103799","https://openalex.org/W2784621220","https://openalex.org/W2982426954","https://openalex.org/W3048859808","https://openalex.org/W4245460974","https://openalex.org/W4297687186","https://openalex.org/W6747855403"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2065457896","https://openalex.org/W2117112636","https://openalex.org/W2001981265"],"abstract_inverted_index":{"With":[0],"the":[1,6,38,43,50,56,60,63,67,71,76,109,167,191,202,213],"development":[2],"of":[3,8,24,52,62,73,78,126,145,169,215,219],"computer":[4],"software,":[5],"amount":[7,23,72,125],"network":[9,25,179],"data":[10,61,74,80,118,135,151,161,171,210],"has":[11],"increased":[12],"geometrically.":[13],"Therefore,":[14],"how":[15],"to":[16,41,108,134,152,165],"quickly":[17],"identify":[18],"attacks":[19],"from":[20,45,59],"a":[21,28,132,142,178],"large":[22],"information":[26],"is":[27,37,82],"meaningful":[29],"research":[30],"direction.":[31],"The":[32,116,197],"intrusion":[33,53,57,173,180,220],"detection":[34,181],"system":[35],"(IDS)":[36],"core":[39],"contributor":[40],"protecting":[42],"host":[44],"attack.":[46],"It":[47],"can":[48,208],"distinguish":[49],"characteristics":[51,81],"behavior":[54],"and":[55,85,97,103,137,187,194],"action":[58],"host.":[64],"However,":[65],"with":[66],"huge":[68,124],"increase":[69],"in":[70,172,205],"now,":[75],"efficiency":[77],"identifying":[79],"getting":[83],"lower":[84],"lower.":[86],"In":[87,163],"addition,":[88],"smart":[89,95],"terminal":[90,121],"equipment":[91,122],"such":[92],"as":[93,141],"notebooks,":[94],"phones":[96],"wearable":[98],"devices":[99,105],"are":[100,106],"also":[101],"emerging,":[102],"these":[104],"connected":[107],"internet":[110],"through":[111],"wireless":[112],"or":[113],"wired":[114],"means.":[115],"physical":[117],"generated":[119],"by":[120],"involves":[123],"personal":[127],"sensitive":[128],"data,":[129],"which":[130],"poses":[131],"challenge":[133],"privacy":[136,170,211],"security.":[138],"Federated":[139],"learning,":[140],"new":[143],"type":[144],"distributed":[146],"learning":[147,186],"framework,":[148],"allows":[149],"training":[150],"be":[153],"shared":[154],"among":[155],"multiple":[156],"participants":[157],"without":[158],"revealing":[159],"their":[160],"privacy.":[162],"order":[164],"solve":[166],"problem":[168],"detection,,":[174],"this":[175,206],"paper":[176,207],"proposes":[177],"method":[182,203],"based":[183],"on":[184,190],"federated":[185],"conducting":[188],"experiments":[189],"UNSW-NB15":[192],"dataset":[193],"CICIDS2018":[195],"dataset.":[196],"simulation":[198],"results":[199],"show":[200],"that":[201],"proposed":[204],"protect":[209],"under":[212],"premise":[214],"achieving":[216],"acceptable":[217],"accuracy":[218],"traffic":[221],"identification.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
