{"id":"https://openalex.org/W4386072146","doi":"https://doi.org/10.1109/smartnets58706.2023.10216144","title":"Attack Detection in IoT-Based Healthcare Networks Using Hybrid Federated Learning","display_name":"Attack Detection in IoT-Based Healthcare Networks Using Hybrid Federated Learning","publication_year":2023,"publication_date":"2023-07-25","ids":{"openalex":"https://openalex.org/W4386072146","doi":"https://doi.org/10.1109/smartnets58706.2023.10216144"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets58706.2023.10216144","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10216144","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026046839","display_name":"May Itani","orcid":"https://orcid.org/0000-0002-0738-0822"},"institutions":[{"id":"https://openalex.org/I36314861","display_name":"Beirut Arab University","ror":"https://ror.org/02jya5567","country_code":"LB","type":"education","lineage":["https://openalex.org/I36314861"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"May Itani","raw_affiliation_strings":["Beirut Arab University,Department of Computer Science,Beirut,Lebanon,1101-2809"],"affiliations":[{"raw_affiliation_string":"Beirut Arab University,Department of Computer Science,Beirut,Lebanon,1101-2809","institution_ids":["https://openalex.org/I36314861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068593475","display_name":"Hanaa Basheer","orcid":"https://orcid.org/0000-0002-0900-090X"},"institutions":[{"id":"https://openalex.org/I135120706","display_name":"University of Baghdad","ror":"https://ror.org/007f1da21","country_code":"IQ","type":"education","lineage":["https://openalex.org/I135120706"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Hanaa Basheer","raw_affiliation_strings":["University of Baghdad,Photonics Unit Laser Institute,Baghdad,Iraq,10001"],"affiliations":[{"raw_affiliation_string":"University of Baghdad,Photonics Unit Laser Institute,Baghdad,Iraq,10001","institution_ids":["https://openalex.org/I135120706"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092675678","display_name":"Fouad Eddine","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fouad Eddine","raw_affiliation_strings":["Security Operation Center, Monty Mobile,AbdulKhaleq Information Security Department,Beirut,Lebanon,1003"],"affiliations":[{"raw_affiliation_string":"Security Operation Center, Monty Mobile,AbdulKhaleq Information Security Department,Beirut,Lebanon,1003","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026046839"],"corresponding_institution_ids":["https://openalex.org/I36314861"],"apc_list":null,"apc_paid":null,"fwci":2.0471,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87543029,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8512119054794312},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5851740837097168},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5377957820892334},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5354165434837341},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.490579754114151},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4894167482852936},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4385656416416168},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4195697009563446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35514652729034424},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3361644148826599},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2581135332584381}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8512119054794312},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5851740837097168},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5377957820892334},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5354165434837341},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.490579754114151},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4894167482852936},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4385656416416168},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4195697009563446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35514652729034424},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3361644148826599},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2581135332584381}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets58706.2023.10216144","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10216144","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W3000307855","https://openalex.org/W3033120446","https://openalex.org/W3085955590","https://openalex.org/W3098620325","https://openalex.org/W3103802018","https://openalex.org/W3121493031","https://openalex.org/W3154485088","https://openalex.org/W3159463057","https://openalex.org/W3159885303","https://openalex.org/W3169649651","https://openalex.org/W3184526416","https://openalex.org/W3189453937","https://openalex.org/W3203932036","https://openalex.org/W3206162503","https://openalex.org/W4205126185","https://openalex.org/W4214573696","https://openalex.org/W4283209462","https://openalex.org/W6786061324","https://openalex.org/W7008830979"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2091483479"],"abstract_inverted_index":{"Cybercrimes":[0],"are":[1,44],"increasing":[2],"rapidly":[3],"throughout":[4],"the":[5,13,103,121,125,168,172,179,184,189],"world,":[6],"leading":[7],"to":[8,25,54,84,115,124,132],"financial":[9],"losses":[10,26],"and":[11,15,134,147,176,199,214,222],"compromising":[12],"integrity":[14],"confidentiality":[16],"of":[17,27,48,87,191],"private":[18],"data.":[19,186],"Statistics":[20],"showed":[21],"that":[22,41,157],"cybercrimes":[23],"led":[24],"around":[28],"$6":[29],"trillion":[30],"in":[31,73,160,236],"2021":[32],"based":[33,194],"on":[34,80,195,239],"a":[35,46,81,93,130,155,206,226],"survey":[36],"by":[37,164,182],"Cybersecurity":[38],"Ventures.":[39],"Knowing":[40],"IoT":[42,67,117,136,240],"networks":[43],"considered":[45],"source":[47],"identifiable":[49],"data":[50,114,137],"for":[51,66,97],"vicious":[52],"attackers":[53],"carry":[55],"out":[56],"criminal":[57],"actions":[58],"using":[59,141,232],"automated":[60],"processes,":[61],"machine":[62,144,233],"learning":[63,145,151,234],"(ML)-assisted":[64],"methods":[65],"security":[68],"have":[69],"gained":[70],"much":[71],"attention":[72],"recent":[74],"years.":[75],"While":[76],"conventional":[77],"ML":[78],"relies":[79],"single":[82],"server":[83,181],"store":[85],"all":[86],"its":[88],"data,":[89,175],"which":[90,110],"makes":[91],"it":[92],"less":[94],"desirable":[95],"option":[96],"domains":[98],"concerned":[99],"about":[100],"user":[101],"privacy,":[102],"Federated":[104],"Learning":[105],"(FL)-based":[106],"anomaly":[107],"detection":[108,208],"technique,":[109],"utilizes":[111],"decentralized":[112],"on-device":[113],"identify":[116],"network":[118,140],"intrusions,":[119],"represents":[120],"proposed":[122],"solution":[123,228],"aforementioned":[126],"problem.":[127],"We":[128,187],"propose":[129],"framework":[131,156],"train":[133],"test":[135],"from":[138],"health":[139],"different":[142,192,202,216],"classical":[143],"algorithms":[146,193],"an":[148,161],"enhanced":[149],"federated":[150],"model.":[152],"FL":[153],"is":[154],"learns":[158],"continuously":[159],"iterative":[162],"manner":[163],"training":[165],"locally":[166],"at":[167],"client":[169],"side":[170],"with":[171],"client\u015b":[173],"individual":[174],"then":[177],"updating":[178],"central":[180],"forwarding":[183],"required":[185],"evaluated":[188],"performance":[190],"accuracy,":[196],"precision,":[197],"recall":[198],"F1-score":[200],"via":[201],"iterations.":[203],"To":[204],"develop":[205],"strong":[207],"system,":[209],"we":[210],"used":[211],"multiple":[212],"datasets":[213],"generated":[215],"results.":[217],"These":[218],"results":[219],"show":[220],"decent":[221],"promising":[223,227],"accuracy":[224],"hence":[225],"towards":[229],"telehealth":[230],"application":[231],"techniques":[235],"detecting":[237],"threats":[238],"networks.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-04T07:04:00.330322","created_date":"2025-10-10T00:00:00"}
