{"id":"https://openalex.org/W7125952715","doi":"https://doi.org/10.1109/smc58881.2025.11343130","title":"Adaptive Heterogeneous Ensemble Learning for Attack Detection in IoT Networks","display_name":"Adaptive Heterogeneous Ensemble Learning for Attack Detection in IoT Networks","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125952715","doi":"https://doi.org/10.1109/smc58881.2025.11343130"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343130","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124076909","display_name":"Ousmane Alassane Soultana","orcid":null},"institutions":[{"id":"https://openalex.org/I33217400","display_name":"Universit\u00e9 du Qu\u00e9bec en Outaouais","ror":"https://ror.org/011pqxa69","country_code":"CA","type":"education","lineage":["https://openalex.org/I33217400","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ousmane Alassane Soultana","raw_affiliation_strings":["Universit&#x00E9; du Qu&#x00E9;bec en Outaouais (UQO),Department of Computer Science and Engineering,Canada"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; du Qu&#x00E9;bec en Outaouais (UQO),Department of Computer Science and Engineering,Canada","institution_ids":["https://openalex.org/I33217400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027414521","display_name":"Hajar Moudoud","orcid":"https://orcid.org/0000-0003-2979-0862"},"institutions":[{"id":"https://openalex.org/I33217400","display_name":"Universit\u00e9 du Qu\u00e9bec en Outaouais","ror":"https://ror.org/011pqxa69","country_code":"CA","type":"education","lineage":["https://openalex.org/I33217400","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hajar Moudoud","raw_affiliation_strings":["Universit&#x00E9; du Qu&#x00E9;bec en Outaouais (UQO),Department of Computer Science and Engineering,Canada"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; du Qu&#x00E9;bec en Outaouais (UQO),Department of Computer Science and Engineering,Canada","institution_ids":["https://openalex.org/I33217400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5124076909"],"corresponding_institution_ids":["https://openalex.org/I33217400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74675775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.859499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.859499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.019300000742077827,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.01549999974668026,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.6097999811172485},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6033999919891357},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5085999965667725},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.44620001316070557},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4250999987125397},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.4235000014305115},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4163999855518341},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.4016000032424927}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8033000230789185},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.6097999811172485},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6033999919891357},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5347999930381775},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5338000059127808},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5085999965667725},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.44620001316070557},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4250999987125397},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.4235000014305115},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4163999855518341},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.4016000032424927},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.37950000166893005},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.36059999465942383},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.3564000129699707},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.3474000096321106},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33379998803138733},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.30869999527931213},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.2728999853134155},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.26489999890327454},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.2565000057220459}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343130","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2768229290","https://openalex.org/W2965552844","https://openalex.org/W2989974604","https://openalex.org/W3015471529","https://openalex.org/W3097179687","https://openalex.org/W3208810397","https://openalex.org/W4377699780","https://openalex.org/W4380995531","https://openalex.org/W4387172140","https://openalex.org/W4387870047","https://openalex.org/W4388097684","https://openalex.org/W4388295728","https://openalex.org/W4398205886","https://openalex.org/W4399989640","https://openalex.org/W4401387542","https://openalex.org/W4402475093","https://openalex.org/W4407763615","https://openalex.org/W4409156599","https://openalex.org/W4409261498","https://openalex.org/W6940826805"],"related_works":[],"abstract_inverted_index":{"The":[0,98,169,177],"proliferation":[1],"of":[2,4],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7],"has":[8],"introduced":[9],"significant":[10],"security":[11],"vulnerabilities,":[12],"particularly":[13],"in":[14,102],"detecting":[15],"zero-day":[16],"attacks":[17],"within":[18],"highly":[19],"dynamic":[20],"and":[21,36,77,87,96,190],"heterogeneous":[22],"environments.":[23],"Traditional":[24],"machine":[25],"learning":[26,47],"models":[27,54],"often":[28],"fall":[29],"short":[30],"due":[31],"to":[32,59,165],"their":[33],"static":[34],"nature":[35],"computational":[37,65],"demands.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42,151],"propose":[43,152],"an":[44],"adaptive":[45],"ensemble":[46,82],"framework":[48,171],"that":[49,108,134,141,156,180],"dynamically":[50],"selects":[51,157],"optimal":[52],"detection":[53,61,167],"on":[55],"a":[56,103,123,153],"per-attack-class":[57],"basis":[58],"improve":[60,166],"accuracy":[62],"while":[63],"maintaining":[64],"efficiency.":[66],"Our":[67],"approach":[68,132,182],"combines":[69],"multiple":[70],"base":[71],"classifiers":[72],"(Random":[73],"Forest,":[74],"K-Nearest":[75],"Neighbors,":[76],"Support":[78],"Vector":[79],"Machine)":[80],"using":[81],"techniques":[83,90],"including":[84],"bagging,":[85],"boosting,":[86],"stacking.":[88],"Ensemble":[89],"such":[91],"as":[92],"Bagging,":[93],"Boosting,":[94],"Voting,":[95],"Stacking.":[97],"key":[99],"innovation":[100],"lies":[101],"class-aware":[104],"model":[105,125,160],"selection":[106],"mechanism":[107,155],"identifies":[109],"the":[110,158],"most":[111],"effective":[112],"classifier-ensemble":[113],"combination":[114],"for":[115,161,188],"each":[116,162],"specific":[117],"attack":[118,136,163,192],"category,":[119],"rather":[120],"than":[121],"applying":[122],"single":[124],"across":[126],"all":[127],"threat":[128],"types.":[129,193],"This":[130],"targeted":[131],"recognizes":[133],"different":[135,147],"patterns":[137],"exhibit":[138],"distinct":[139],"characteristics":[140],"may":[142],"be":[143],"better":[144],"captured":[145],"by":[146],"algorithmic":[148],"approaches.":[149],"Finally,":[150],"decision-rule":[154],"best-performing":[159],"class":[164],"accuracy.":[168],"proposed":[170],"is":[172],"evaluated":[173],"through":[174],"extensive":[175],"experiments.":[176],"results":[178],"show":[179],"our":[181],"significantly":[183],"enhances":[184],"classification":[185],"performance,":[186],"especially":[187],"complex":[189],"rare":[191]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
