{"id":"https://openalex.org/W4390401817","doi":"https://doi.org/10.1109/itnac59571.2023.10368564","title":"Sharing, Licensing, Buying, Selling and Operationalizing ML Models: A Deep Learning based Co-operative and Co-ordinated Security usecase","display_name":"Sharing, Licensing, Buying, Selling and Operationalizing ML Models: A Deep Learning based Co-operative and Co-ordinated Security usecase","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4390401817","doi":"https://doi.org/10.1109/itnac59571.2023.10368564"},"language":"en","primary_location":{"id":"doi:10.1109/itnac59571.2023.10368564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093489251","display_name":"Deven Panchal","orcid":"https://orcid.org/0000-0001-6431-6328"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Deven Panchal","raw_affiliation_strings":["AT&#x0026;T,Middletown,NJ,USA"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T,Middletown,NJ,USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093489253","display_name":"Dan Musgrove","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dan Musgrove","raw_affiliation_strings":["AT&#x0026;T,Middletown,NJ,USA"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T,Middletown,NJ,USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093489252","display_name":"Isilay Baran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Isilay Baran","raw_affiliation_strings":["AT&#x0026;T,Middletown,NJ,USA"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T,Middletown,NJ,USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084368894","display_name":"David Lu","orcid":"https://orcid.org/0000-0002-3263-4476"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"David Lu","raw_affiliation_strings":["AT&#x0026;T,Dallas,TX,USA"],"affiliations":[{"raw_affiliation_string":"AT&#x0026;T,Dallas,TX,USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093489251"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.049,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.82085867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"118","last_page":"123"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/operationalization","display_name":"Operationalization","score":0.8994588851928711},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5220829844474792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48545771837234497},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.40980401635169983}],"concepts":[{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.8994588851928711},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5220829844474792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48545771837234497},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.40980401635169983},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac59571.2023.10368564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2473418344","https://openalex.org/W2982682021","https://openalex.org/W4389724966","https://openalex.org/W4391148892","https://openalex.org/W4392015278","https://openalex.org/W4392489992"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2944277854","https://openalex.org/W2258359646","https://openalex.org/W2493324121","https://openalex.org/W4234402960","https://openalex.org/W4210958110","https://openalex.org/W2483613126","https://openalex.org/W4210994448"],"abstract_inverted_index":{"Many":[0],"problems":[1,271],"that":[2,181],"utilize":[3,28],"Machine":[4],"Learning":[5],"in":[6,41,83,128,130,166,185,216,276],"fact":[7,84],"require":[8],"multiple":[9],"cooperative":[10,256,260,278],"efforts":[11],"to":[12,23,27,36,51,104,114,136,196,232,240],"train":[13],"models":[14,34,56,81,103,162,237],"on":[15,18,59],"different":[16,19,78,229],"data":[17,61,133,137,140,146],"targets":[20],"so":[21],"as":[22],"then":[24,205],"be":[25,63,72,164],"able":[26],"all":[29,124],"these":[30,102],"results":[31],"or":[32,69,91,107,227],"the":[33,99,125,132,161,174,217,236],"themselves":[35,48],"do":[37],"certain":[38],"tasks.":[39],"Problems":[40],"Remote":[42],"sensing,":[43],"Cybersecurity,":[44],"Network":[45],"analytics":[46],"lend":[47],"very":[49,168],"well":[50],"this":[52],"co-operative":[53],"paradigm":[54],"where":[55],"built":[57,184,238],"elsewhere":[58,239],"other":[60,89],"can":[62,163,250],"of":[64,101,158,160,200,270],"direct":[65],"and":[66,74,139,170,177,204,234,255,264],"immediate":[67],"use":[68,235],"at":[70,76],"least":[71],"retrained":[73],"used":[75],"a":[77,167,253,259,268,277],"site.":[79],"These":[80],"could":[82,223],"also":[85],"come":[86],"from":[87],"some":[88],"organization":[90,106],"company":[92,108],"(model":[93,109],"supplier)":[94],"who":[95,111],"might":[96],"charge":[97],"(monetize)":[98],"usage":[100],"another":[105],"consumer)":[110],"may":[112],"want":[113],"deploy":[115],"them":[116],"for":[117,219],"their":[118,189],"own":[119],"use.":[120],"Model":[121],"sharing":[122],"becomes":[123],"more":[126,265],"important":[127],"scenarios":[129],"which":[131,222],"is":[134],"subject":[135],"sovereignty":[138],"location":[141],"requirements":[142,144],"and,":[143],"over":[145],"transfer":[147],"like":[148,262],"GDPR,":[149],"CCPA,":[150],"etc.":[151],"This":[152,245],"sharing,":[153],"monetizing,":[154],"licensing,":[155],"writing":[156],"terms":[157],"sale":[159],"done":[165],"easy":[169],"streamlined":[171],"fashion":[172,279],"using":[173,274],"Acumos":[175,178,213],"Federation":[176],"Licensing":[179],"components":[180],"we":[182,191,249],"have":[183],"Acumos.":[186,281],"To":[187],"demonstrate":[188],"usage,":[190],"build":[192],"an":[193],"ML":[194,275],"model":[195],"classify":[197,241],"Distributed":[198],"Denial":[199],"Service":[201],"(DDoS)":[202],"attacks":[203],"set":[206,251],"up":[207,252],"N-site":[208],"wide":[209],"federation":[210],"across":[211,272],"\u2018N\u2019":[212],"instances":[214],"(N=3":[215],"paper":[218,246],"demo":[220],"purposes,":[221],"represent":[224],"3":[225,228],"companies":[226],"physical":[230],"sites)":[231],"share":[233],"DDoS":[242],"attack":[243,261],"types.":[244],"shows":[247],"how":[248],"coordinated":[254],"defense":[257],"against":[258],"DDoS,":[263],"generally":[266],"solve":[267],"variety":[269],"domains":[273],"with":[280]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
