{"id":"https://openalex.org/W4321608114","doi":"https://doi.org/10.1109/jiot.2023.3248259","title":"ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks","display_name":"ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks","publication_year":2023,"publication_date":"2023-02-23","ids":{"openalex":"https://openalex.org/W4321608114","doi":"https://doi.org/10.1109/jiot.2023.3248259"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3248259","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3248259","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbit.dtu.dk/en/publications/80b9b9d0-2f51-41e3-b0c6-5409cc3f4bae","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061910468","display_name":"Zuchao Ma","orcid":"https://orcid.org/0000-0002-7439-2823"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Zuchao Ma","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005298264","display_name":"Liang Liu","orcid":"https://orcid.org/0000-0002-4903-2666"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Liu","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085755018","display_name":"Weizhi Meng","orcid":"https://orcid.org/0000-0003-4384-5786"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Weizhi Meng","raw_affiliation_strings":["Department of Applied Mathematics and Computer Science, Technical University of Denmark, Copenhagen, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics and Computer Science, Technical University of Denmark, Copenhagen, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027355692","display_name":"Lisong Wang","orcid":"https://orcid.org/0000-0003-1403-6760"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lisong Wang","raw_affiliation_strings":["Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100757040","display_name":"Wenjuan Li","orcid":"https://orcid.org/0000-0003-3745-5669"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wenjuan Li","raw_affiliation_strings":["Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5061910468"],"corresponding_institution_ids":["https://openalex.org/I14243506","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":3.36,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.92537365,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"10","issue":"14","first_page":"12521","last_page":"12536"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8254603147506714},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7085337042808533},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5650847554206848},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4484637677669525},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35795778036117554},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3494020104408264},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3377839922904968},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2855818569660187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8254603147506714},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7085337042808533},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5650847554206848},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4484637677669525},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35795778036117554},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3494020104408264},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3377839922904968},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2855818569660187}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2023.3248259","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3248259","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:223516","is_oa":false,"landing_page_url":"https://eprints.lancs.ac.uk/id/eprint/223516/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:pure.atira.dk:publications/80b9b9d0-2f51-41e3-b0c6-5409cc3f4bae","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/80b9b9d0-2f51-41e3-b0c6-5409cc3f4bae","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ma , Z , Liu , L , Meng , W , Luo , X , Wang , L &amp; Li , W 2023 , ' ADCL: Towards An Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks ' , IEEE Internet of Things Journal , vol. 10 , no. 14 , pp. 12521 - 12536 . https://doi.org/10.1109/JIOT.2023.3248259","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/80b9b9d0-2f51-41e3-b0c6-5409cc3f4bae","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/80b9b9d0-2f51-41e3-b0c6-5409cc3f4bae","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ma , Z , Liu , L , Meng , W , Luo , X , Wang , L &amp; Li , W 2023 , ' ADCL: Towards An Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks ' , IEEE Internet of Things Journal , vol. 10 , no. 14 , pp. 12521 - 12536 . https://doi.org/10.1109/JIOT.2023.3248259","raw_type":"article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G107330294","display_name":null,"funder_award_id":"U20B2050","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2439268379","display_name":null,"funder_award_id":"2021YFB2700500","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2624229489","display_name":null,"funder_award_id":"TC210804A","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G470886357","display_name":null,"funder_award_id":"2021YFB2700502","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5549739569","display_name":null,"funder_award_id":"No. U20B2050","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5848258319","display_name":null,"funder_award_id":"0 and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7024710602","display_name":null,"funder_award_id":"SATS202206","funder_id":"https://openalex.org/F4320321565","funder_display_name":"Civil Aviation University of China"},{"id":"https://openalex.org/G8126170492","display_name":null,"funder_award_id":"202206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321565","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2296509296","https://openalex.org/W2751702912","https://openalex.org/W2887731362","https://openalex.org/W2892556724","https://openalex.org/W2945594226","https://openalex.org/W2946427082","https://openalex.org/W2947334153","https://openalex.org/W2949830777","https://openalex.org/W2961448107","https://openalex.org/W2963197901","https://openalex.org/W2965378538","https://openalex.org/W2997442262","https://openalex.org/W3006903471","https://openalex.org/W3014732532","https://openalex.org/W3021219025","https://openalex.org/W3022604549","https://openalex.org/W3026481078","https://openalex.org/W3047845857","https://openalex.org/W3106312933","https://openalex.org/W3108785997","https://openalex.org/W3118220620","https://openalex.org/W3131438039","https://openalex.org/W3138381676","https://openalex.org/W3153597313","https://openalex.org/W3157680283","https://openalex.org/W3162352308","https://openalex.org/W3163301462","https://openalex.org/W3179054875","https://openalex.org/W3201617817","https://openalex.org/W3201640968","https://openalex.org/W3202083238","https://openalex.org/W3204162860","https://openalex.org/W3206674745","https://openalex.org/W3208773001","https://openalex.org/W3212280553","https://openalex.org/W3213574824","https://openalex.org/W3214829575","https://openalex.org/W3215575541","https://openalex.org/W4214819121","https://openalex.org/W4220747501","https://openalex.org/W4220810976","https://openalex.org/W4220912180","https://openalex.org/W4224331011","https://openalex.org/W4225014873","https://openalex.org/W4225622006","https://openalex.org/W4226050909","https://openalex.org/W4226125749","https://openalex.org/W4281397870","https://openalex.org/W4285127639","https://openalex.org/W4285138763","https://openalex.org/W4285157251","https://openalex.org/W4285199572","https://openalex.org/W4293208285","https://openalex.org/W4293879918","https://openalex.org/W4296268039","https://openalex.org/W4315630101","https://openalex.org/W6765617790","https://openalex.org/W6803508477","https://openalex.org/W6839562912"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"With":[0],"the":[1,31,37,40,49,53,63,71,74,80,83,86,96,105,120,123,179,189,202],"widespread":[2],"of":[3,21,39,68,76,82,88,125,192],"cyber":[4],"attacks,":[5],"network":[6],"intrusion":[7],"detection":[8,41,106,113,190],"system":[9],"(NIDS)":[10],"is":[11,27],"becoming":[12],"an":[13,78],"important":[14],"and":[15,52,73,103,137,200],"essential":[16],"tool":[17],"to":[18,61,172,198],"protect":[19],"Internet":[20],"Things":[22],"(IoT)":[23],"environments.":[24],"However,":[25],"it":[26],"well":[28],"known":[29],"that":[30,148],"NIDS":[32],"performance":[33,153],"depends":[34],"heavily":[35],"on":[36,91,122,159,181],"effectiveness":[38],"model,":[42],"which":[43,117],"can":[44,118,150],"be":[45],"influenced":[46],"significantly":[47],"by":[48,129,170,204],"learning":[50,84,182],"mechanism":[51],"available":[54],"training":[55],"data.":[56],"Many":[57],"existing":[58],"studies":[59],"try":[60],"mitigate":[62,119],"above":[64],"challenges,":[65],"but":[66],"few":[67],"them":[69],"consider":[70],"adaptability":[72],"cost":[75],"deploying":[77],"NIDS,":[79],"integrity":[81],"process,":[85],"capacity":[87],"model":[89,128,158,186],"based":[90],"concrete":[92],"traffic":[93],"samples":[94],"at":[95],"same":[97],"time.":[98],"To":[99],"fill":[100],"this":[101],"gap":[102],"improve":[104],"performance,":[107],"we":[108],"propose":[109],"a":[110,126,141,156],"collaborative":[111,142],"learning-based":[112],"framework":[114],"called":[115],"ADCL,":[116],"limitations":[121],"knowledge":[124],"single":[127,157,196],"leveraging":[130],"multiple":[131],"models":[132,197],"trained":[133],"in":[134,140,163,177],"similar":[135],"environments":[136],"detecting":[138,160],"intrusions":[139],"manner.":[143],"Our":[144],"evaluation":[145],"results":[146,191],"indicate":[147],"ADCL":[149,167,193],"provide":[151],"better":[152],"compared":[154],"with":[155],"various":[161],"attacks":[162],"IoT":[164],"networks.":[165],"Specifically,":[166],"improves":[168],"F-score":[169,203],"up":[171],"80%":[173],"for":[174,185],"adaptability,":[175],"42%":[176],"mitigating":[178],"reliance":[180],"integrity,":[183],"85%":[184],"capacity.":[187],"Furthermore,":[188],"guide":[194],"those":[195],"update":[199],"increase":[201],"15%.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":5}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
