{"id":"https://openalex.org/W7104910196","doi":"https://doi.org/10.1109/tce.2025.3631965","title":"Robust AI-Driven Intrusion Detection and Defense for Next-Generation Consumer Services","display_name":"Robust AI-Driven Intrusion Detection and Defense for Next-Generation Consumer Services","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7104910196","doi":"https://doi.org/10.1109/tce.2025.3631965"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3631965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3631965","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yufeng Li","orcid":"https://orcid.org/0000-0002-8795-7408"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yufeng Li","raw_affiliation_strings":["College of Mechanical and Electrical Engineering, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Mechanical and Electrical Engineering, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yang Li","orcid":"https://orcid.org/0000-0002-4268-4004"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Li","raw_affiliation_strings":["College of Mechanical and Electrical Engineering, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Mechanical and Electrical Engineering, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jing Nie","orcid":"https://orcid.org/0000-0002-3763-9559"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Nie","raw_affiliation_strings":["College of Mechanical and Electrical Engineering, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Mechanical and Electrical Engineering, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"last","author":{"id":null,"display_name":"Sezai Ercisli","orcid":"https://orcid.org/0000-0001-5006-5687"},"institutions":[{"id":"https://openalex.org/I64134780","display_name":"Atat\u00fcrk University","ror":"https://ror.org/03je5c526","country_code":"TR","type":"education","lineage":["https://openalex.org/I64134780"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Sezai Ercisli","raw_affiliation_strings":["Faculty of Agriculture, Atat&#x00FC;rk University, Erzurum, T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Faculty of Agriculture, Atat&#x00FC;rk University, Erzurum, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I64134780"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I102208913"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.59491001,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1544","last_page":"1553"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5453000068664551,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5453000068664551,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.09480000287294388,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.08269999921321869,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.707099974155426},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6941999793052673},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5406000018119812},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.461899995803833},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4083000123500824},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.4052000045776367},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4027999937534332},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.3959999978542328},{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.3668000102043152},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.36419999599456787}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7832000255584717},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.707099974155426},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6941999793052673},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5406000018119812},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.461899995803833},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44620001316070557},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42989999055862427},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4083000123500824},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.4052000045776367},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4027999937534332},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.3959999978542328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3833000063896179},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37560001015663147},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.3668000102043152},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.36419999599456787},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3546000123023987},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35100001096725464},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.3463999927043915},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3215000033378601},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.321399986743927},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30889999866485596},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.30640000104904175},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2937000095844269},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tce.2025.3631965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3631965","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:bd81fcd5-ca44-4459-9622-f46e1a3e5e16","is_oa":false,"landing_page_url":"https://avesis.atauni.edu.tr/publication/details/bd81fcd5-ca44-4459-9622-f46e1a3e5e16/oai","pdf_url":null,"source":{"id":"https://openalex.org/S7407055159","display_name":"Ataturk University - AVESIS","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,6,101,110,122,151,166,173,218,245],"deep":[2],"integration":[3],"of":[4,8,96,175,198,202,211,227,249],"6G,":[5],"Internet":[7],"Things,":[9],"and":[10,19,33,44,64,70,98,103,108,143,157,184,200,208,231,239,247],"artificial":[11],"intelligence,":[12],"this":[13,170],"paper":[14],"proposes":[15],"an":[16,161],"intrusion":[17],"detection":[18,55],"defense":[20,36,212],"framework":[21,220],"that":[22,217],"combines":[23],"robust":[24],"AI":[25],"kernel":[26],"reconstruction,":[27],"a":[28,34,53,82,117,127,137,147,176,196,240],"cross-layer":[29,154],"collaborative":[30],"perception":[31],"architecture,":[32],"dynamic":[35],"closed-loop":[37],"mechanism":[38,205],"to":[39,75,113,191],"address":[40],"advanced":[41],"persistent":[42],"threats":[43],"dynamically":[45],"evolving":[46],"attacks":[47],"targeting":[48],"next-generation":[49,250],"consumer":[50,251],"services.":[51,252],"First,":[52],"lightweight":[54],"model":[56,93,111,132,152],"ATF-KDBC":[57],"is":[58,133],"designed":[59],"based":[60,135],"on":[61,100,136,165],"adversarial":[62,79],"training":[63],"online":[65],"knowledge":[66],"distillation.":[67],"Gradient":[68],"masking":[69],"noise":[71],"injection":[72],"are":[73,189],"employed":[74,190],"enhance":[76],"robustness":[77],"against":[78],"samples,":[80],"while":[81,195],"drift-aware":[83],"module":[84],"enables":[85,153,206],"adaptive":[86],"optimization":[87],"under":[88],"concept":[89],"drift":[90],"scenarios.":[91],"The":[92],"achieves":[94],"accuracies":[95],"99.25%":[97],"99.84%":[99],"NSL-KDD":[102],"IoT-23":[104],"hybrid":[105],"datasets,":[106],"respectively,":[107],"compresses":[109],"size":[112],"1.08":[114],"MB,":[115],"representing":[116],"97.6%":[118],"reduction":[119],"compared":[120],"with":[121,146],"BERT":[123],"teacher":[124],"model.":[125],"Second,":[126],"multidimensional":[128],"attack":[129],"chain":[130],"analysis":[131],"developed":[134],"STHGN.":[138],"By":[139],"integrating":[140,181],"semantic,":[141],"structural,":[142],"temporal":[144],"features":[145],"multi-head":[148],"self-attention":[149],"mechanism,":[150],"threat":[155],"tracing":[156],"millisecond-level":[158],"response,":[159],"achieving":[160],"F1-score":[162],"exceeding":[163],"97.0%":[164],"DARPA":[167],"dataset.":[168],"Furthermore,":[169],"study":[171],"explores":[172],"construction":[174],"distributed":[177],"CTIS":[178],"network":[179],"by":[180],"federated":[182],"learning":[183],"blockchain":[185],"technology.":[186],"Zero-knowledge":[187],"proofs":[188],"ensure":[192],"privacy":[193],"preservation,":[194],"Quality":[197,201],"Data":[199],"Model":[203],"scoring":[204],"efficient":[207],"precise":[209],"deployment":[210],"strategies.":[213],"Experimental":[214],"results":[215],"demonstrate":[216],"proposed":[219],"significantly":[221],"outperforms":[222],"traditional":[223],"methods":[224],"in":[225],"terms":[226],"robustness,":[228],"environmental":[229],"adaptability,":[230],"computational":[232],"efficiency,":[233],"thereby":[234],"providing":[235],"both":[236],"theoretical":[237],"support":[238],"technical":[241],"pathway":[242],"for":[243],"enhancing":[244],"resilience":[246],"security":[248]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-12T00:00:00"}
