{"id":"https://openalex.org/W4200051683","doi":"https://doi.org/10.1109/pst52912.2021.9647771","title":"Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks","display_name":"Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200051683","doi":"https://doi.org/10.1109/pst52912.2021.9647771"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647771","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647771","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083198181","display_name":"Lav Gupta","orcid":"https://orcid.org/0000-0002-0524-654X"},"institutions":[{"id":"https://openalex.org/I208333798","display_name":"University of Missouri\u2013St. Louis","ror":"https://ror.org/037cnag11","country_code":"US","type":"education","lineage":["https://openalex.org/I208333798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lav Gupta","raw_affiliation_strings":["Department of Computer Science, University of Missouri \u2013 St. Louis, St. Louis, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Missouri \u2013 St. Louis, St. Louis, USA","institution_ids":["https://openalex.org/I208333798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5083198181"],"corresponding_institution_ids":["https://openalex.org/I208333798"],"apc_list":null,"apc_paid":null,"fwci":0.32,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63187294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8260392546653748},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7483372092247009},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6756847500801086},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.50006103515625},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.47725293040275574},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4760051667690277},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.466599702835083},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4487159550189972},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4323301911354065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40972283482551575}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8260392546653748},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7483372092247009},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6756847500801086},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.50006103515625},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.47725293040275574},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4760051667690277},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.466599702835083},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4487159550189972},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4323301911354065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40972283482551575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst52912.2021.9647771","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647771","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:irl.umsl.edu:cmpsci-faculty-1051","is_oa":false,"landing_page_url":"https://irl.umsl.edu/cmpsci-faculty/39","pdf_url":null,"source":{"id":"https://openalex.org/S4377196466","display_name":"IRL - University of Missouri, St. Louis (University of Missouri\u2013St. Louis)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I208333798","host_organization_name":"University of Missouri\u2013St. Louis","host_organization_lineage":["https://openalex.org/I208333798"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Faculty Works","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W2548398461","https://openalex.org/W2783741806","https://openalex.org/W2795147830","https://openalex.org/W2803881474","https://openalex.org/W2809932464","https://openalex.org/W2890474333","https://openalex.org/W2909665293","https://openalex.org/W2916487850","https://openalex.org/W2926701059","https://openalex.org/W2939779455","https://openalex.org/W2962829655","https://openalex.org/W2963748489","https://openalex.org/W3089881118","https://openalex.org/W3119595909","https://openalex.org/W3134069806","https://openalex.org/W3157450643","https://openalex.org/W4289300273","https://openalex.org/W6631190155","https://openalex.org/W6637549440","https://openalex.org/W6749806285","https://openalex.org/W6756592394","https://openalex.org/W6761671334","https://openalex.org/W6783518590"],"related_works":["https://openalex.org/W4313339048","https://openalex.org/W3201779876","https://openalex.org/W4386004629","https://openalex.org/W3176734149","https://openalex.org/W3113627641","https://openalex.org/W4238142035","https://openalex.org/W2885461866","https://openalex.org/W3191964704","https://openalex.org/W2901937988","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Multi-clouds":[0],"are":[1,216],"becoming":[2],"central":[3],"to":[4,24,58,84,110,156,203,236],"large":[5,75,132],"and":[6,14,36,53,55,70,86,98,114,134,144,152,163,191,195,200,239,261,282],"modern":[7],"applications":[8],"including":[9],"those":[10],"in":[11,107,118,142,173,213,229,241,290],"business,":[12],"industry":[13],"critical":[15,93,174],"infrastructure":[16,175],"sectors.":[17],"Designers":[18],"usually":[19],"deploy":[20],"these":[21],"clouds":[22,35,50],"hierarchically":[23],"get":[25],"the":[26,33,41,49,112,119,122,167,189,192,196,230,234,249,265,283,291],"best":[27],"advantage":[28],"of":[29,32,40,116,124,149,159,161,185,198,285,287],"low":[30],"latency":[31],"edge":[34,190],"high":[37,208],"processing":[38,52],"capabilities":[39],"core":[42,193,243,251],"clouds.":[43,120],"The":[44],"data":[45,199,257],"that":[46,221,272],"flows":[47],"into":[48],"for":[51,62,256],"storage":[54],"moves":[56],"out":[57],"other":[59],"system":[60],"domains":[61],"further":[63,263],"use":[64,123,172,184],"must":[65],"cross":[66],"multiple":[67],"trust":[68],"boundaries,":[69],"as":[71],"a":[72],"result,":[73],"face":[74],"attack":[76],"surfaces.":[77],"This":[78,169],"gives":[79],"malicious":[80],"actors":[81],"abundant":[82],"opportunity":[83],"penetrate":[85],"potentially":[87],"harm":[88],"organizations":[89],"or":[90],"bring":[91],"down":[92],"services":[94],"causing":[95],"widespread":[96],"disruptions":[97],"mayhem.":[99],"Deep":[100],"neural":[101],"network":[102],"models":[103,139,151,281],"can":[104],"be":[105,237],"used":[106],"innovative":[108,179],"ways":[109],"protect":[111],"confidentiality":[113],"integrity":[115],"dataflows":[117],"However,":[121],"deep":[125,137,224],"learning":[126,138,225],"comes":[127],"with":[128,207,253],"some":[129],"challenges.":[130],"In":[131],"multi-location":[133],"multi-cloud":[135],"environments,":[136],"grow":[140],"rapidly":[141],"size":[143],"complexity,":[145],"inhibiting":[146],"fast":[147],"training":[148,187,206,245,248,266],"cloud":[150,244],"making":[153],"it":[154],"difficult":[155],"maintain":[157],"accuracy":[158,284],"detection":[160,286],"known":[162],"unknown":[164,288],"attacks":[165,289],"on":[166,259],"data-in-motion.":[168],"impedes":[170],"their":[171],"services.":[176],"We":[177,269],"propose":[178],"distributed-hierarchical-merged":[180],"models,":[181,226],"which":[182],"make":[183],"cooperative":[186],"at":[188],"clouds,":[194],"power":[197],"model":[201,252],"parallelisms,":[202],"achieve":[204],"rapid":[205],"accuracy.":[209],"Our":[210],"broad":[211],"objectives":[212],"this":[214],"paper":[215],"twofold:":[217],"Firstly,":[218],"we":[219],"show":[220,271],"merged":[222,250],"hierarchical":[223],"working":[227],"cooperatively":[228],"multi-cloud,":[231],"significantly":[232],"reduce":[233],"parameters":[235],"trained":[238],"results":[240],"faster":[242],"time.":[246],"Secondly,":[247],"distribute":[254],"strategy":[255],"parallelism":[258],"CPUs":[260],"GPUs":[262],"reduces":[264],"time":[267],"significantly.":[268],"also":[270],"while":[273],"achieving":[274],"improvement":[275],"by":[276],"about":[277],"25%":[278],"over":[279],"unmerged":[280],"range":[292],"96.9-99.5%.":[293]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
