{"id":"https://openalex.org/W7117602798","doi":"https://doi.org/10.1109/mswim67937.2025.11308990","title":"FedDTKG: Federated Temporal Graph Learning with Adaptive Loss for Robust 5G Attack Detection under Extreme Class Imbalance","display_name":"FedDTKG: Federated Temporal Graph Learning with Adaptive Loss for Robust 5G Attack Detection under Extreme Class Imbalance","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W7117602798","doi":"https://doi.org/10.1109/mswim67937.2025.11308990"},"language":null,"primary_location":{"id":"doi:10.1109/mswim67937.2025.11308990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mswim67937.2025.11308990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057569676","display_name":"Saeid Sheikhi","orcid":"https://orcid.org/0000-0002-3600-966X"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Saeid Sheikhi","raw_affiliation_strings":["University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051101152","display_name":"Lauri Lov\u00e9n","orcid":"https://orcid.org/0000-0001-9475-4839"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Lauri Loven","raw_affiliation_strings":["University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000765468","display_name":"Susanna Pirttikangas","orcid":"https://orcid.org/0000-0003-2428-9948"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Susanna Pirttikangas","raw_affiliation_strings":["University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121531473","display_name":"Panos Kostakos","orcid":null},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Panos Kostakos","raw_affiliation_strings":["University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Center for Ubiquitous Computing Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014","institution_ids":["https://openalex.org/I98381234"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057569676"],"corresponding_institution_ids":["https://openalex.org/I98381234"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66133557,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"803","last_page":"806"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.23240000009536743,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.23240000009536743,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.09319999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.0794999971985817,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5799000263214111},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4361000061035156},{"id":"https://openalex.org/keywords/regularization","display_name":"Regularization (linguistics)","score":0.4300000071525574},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4293999969959259},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.421999990940094},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41850000619888306},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.4049000144004822},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3950999975204468}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8046000003814697},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5799000263214111},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4361000061035156},{"id":"https://openalex.org/C2776135515","wikidata":"https://www.wikidata.org/wiki/Q17143721","display_name":"Regularization (linguistics)","level":2,"score":0.4300000071525574},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4293999969959259},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.421999990940094},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41850000619888306},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4162999987602234},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.4049000144004822},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3950999975204468},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3833000063896179},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.373199999332428},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3422999978065491},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2955000102519989},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2930999994277954},{"id":"https://openalex.org/C196083921","wikidata":"https://www.wikidata.org/wiki/Q7915758","display_name":"Variance (accounting)","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26100000739097595},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.2549000084400177},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mswim67937.2025.11308990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mswim67937.2025.11308990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4287538230419159,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320328501","display_name":"Business Finland","ror":"https://ror.org/05bgf9v38"},{"id":"https://openalex.org/F4320336704","display_name":"Infotech Oulu","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2148143831","https://openalex.org/W2926701059","https://openalex.org/W2944046640","https://openalex.org/W2963351448","https://openalex.org/W3021654819","https://openalex.org/W3043758338","https://openalex.org/W3113595157","https://openalex.org/W3208773001","https://openalex.org/W4297984369","https://openalex.org/W4385269797","https://openalex.org/W4402811674"],"related_works":[],"abstract_inverted_index":{"The":[0,75,192],"distributed":[1],"architecture":[2],"and":[3,95,101,118,159,199],"massive":[4],"connectivity":[5],"of":[6,98,139,153,178],"5G":[7,140,210],"networks":[8],"create":[9],"significant":[10],"security":[11,206],"vulnerabilities":[12],"that":[13,89,109,163],"are":[14,44],"challenging":[15,73],"to":[16,22,65,125,165,189],"address":[17],"with":[18],"centralized":[19,145],"monitoring":[20],"due":[21],"data":[23,29],"privacy":[24],"restrictions.":[25],"Furthermore,":[26],"the":[27,92,170],"traffic":[28,49,141],"in":[30,208],"such":[31],"environments":[32],"is":[33],"characterized":[34],"by":[35,47,113],"extreme":[36],"class":[37,111,128],"imbalance,":[38],"where":[39],"critical":[40],"but":[41],"rare":[42],"attacks":[43],"vastly":[45],"outnumbered":[46],"benign":[48],"(with":[50],"observed":[51],"ratios":[52],"exceeding":[53],"1:200).":[54],"This":[55],"paper":[56],"introduces":[57],"FedDTKG,":[58],"a":[59,82,120,132,136,144,149,175],"novel":[60],"federated":[61,171],"learning":[62],"framework":[63,76],"designed":[64],"provide":[66],"robust,":[67],"privacy-preserving":[68],"intrusion":[69],"detection":[70],"under":[71],"these":[72],"conditions.":[74],"features":[77],"two":[78],"key":[79],"innovations:":[80],"(1)":[81],"Temporal-Aware":[83],"Self-Adaptive":[84],"Graph":[85],"Attention":[86],"Network":[87],"(TASA-GAT)":[88],"explicitly":[90],"models":[91],"temporal":[93],"dynamics":[94],"relational":[96],"structure":[97],"network":[99],"flows":[100],"(2)":[102],"an":[103,197],"Adaptive":[104],"Synthetic":[105],"Focal":[106],"Loss":[107],"(ASFL)":[108],"counters":[110],"imbalance":[112],"dynamically":[114],"tuning":[115],"its":[116],"focus":[117],"incorporating":[119],"feature-level":[121],"variance":[122],"regularization":[123],"term":[124],"improve":[126],"minority":[127,167],"representation.":[129],"We":[130],"conduct":[131],"comprehensive":[133],"evaluation":[134],"on":[135],"non-IID":[137],"distribution":[138],"data.":[142],"In":[143,169],"setting,":[146,172],"FedDTKG":[147,173,195],"achieves":[148],"state-of-the-art":[150],"F1-macro":[151,177],"score":[152],"0.8756,":[154],"significantly":[155],"outperforming":[156],"traditional":[157],"ML":[158],"standard":[160],"GNN":[161],"baselines":[162],"fail":[164,183],"detect":[166],"classes.":[168],"maintains":[174],"high":[176],"0.7546,":[179],"whereas":[180],"conventional":[181],"GNNs":[182],"completely,":[184],"demonstrating":[185],"our":[186],"model\u2019s":[187],"resilience":[188],"statistical":[190],"heterogeneity.":[191],"findings":[193],"validate":[194],"as":[196],"effective":[198],"practical":[200],"solution":[201],"for":[202],"building":[203],"collaborative,":[204],"privacy-first":[205],"systems":[207],"real-world":[209],"edge":[211],"networks.":[212]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-30T00:00:00"}
