{"id":"https://openalex.org/W4416323915","doi":"https://doi.org/10.1109/tce.2025.3634160","title":"SwarmSense-DNN: A Trustworthy and Decentralized Neural Framework for Proactive Anomaly Defense in Consumer IoT","display_name":"SwarmSense-DNN: A Trustworthy and Decentralized Neural Framework for Proactive Anomaly Defense in Consumer IoT","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W4416323915","doi":"https://doi.org/10.1109/tce.2025.3634160"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3634160","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634160","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://infoscience.epfl.ch/handle/20.500.14299/256488","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106484204","display_name":"Jing Yang","orcid":"https://orcid.org/0009-0008-0467-5984"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Jing Yang","raw_affiliation_strings":["Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112250026","display_name":"V. S. Govindarajan","orcid":"https://orcid.org/0009-0004-1915-1519"},"institutions":[{"id":"https://openalex.org/I4210106647","display_name":"Expedia Group (United States)","ror":"https://ror.org/01sh85g09","country_code":"US","type":"company","lineage":["https://openalex.org/I4210106647"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijay Govindarajan","raw_affiliation_strings":["Distribution and Supply Technology, Expedia Group, Seattle, WA, USA","Expedia Group, Seattle, WA, United States"],"affiliations":[{"raw_affiliation_string":"Distribution and Supply Technology, Expedia Group, Seattle, WA, USA","institution_ids":["https://openalex.org/I4210106647"]},{"raw_affiliation_string":"Expedia Group, Seattle, WA, United States","institution_ids":["https://openalex.org/I4210106647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046983752","display_name":"Saad Arif","orcid":"https://orcid.org/0000-0002-8905-7294"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Saad Arif","raw_affiliation_strings":["Department of Mechanical Engineering, College of Engineering, King Faisal University, Al Ahsa, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical Engineering, College of Engineering, King Faisal University, Al Ahsa, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100416688","display_name":"Xu Xu","orcid":"https://orcid.org/0000-0002-3934-9096"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Xu","raw_affiliation_strings":["School of Computer Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015999607","display_name":"Mohamed Kallel","orcid":"https://orcid.org/0009-0003-3208-224X"},"institutions":[{"id":"https://openalex.org/I118590987","display_name":"Northern Border University","ror":"https://ror.org/03j9tzj20","country_code":"SA","type":"education","lineage":["https://openalex.org/I118590987"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohamed Kallel","raw_affiliation_strings":["Department of Physics, College of Science, Northern Border University, Arar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Physics, College of Science, Northern Border University, Arar, Saudi Arabia","institution_ids":["https://openalex.org/I118590987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101789974","display_name":"Zaffar Ahmed Shaikh","orcid":"https://orcid.org/0000-0003-0323-2061"},"institutions":[{"id":"https://openalex.org/I1308893265","display_name":"Shaheed Benazir Bhutto University","ror":"https://ror.org/02zwhz281","country_code":"PK","type":"education","lineage":["https://openalex.org/I1308893265"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Zaffar Ahmed Shaikh","raw_affiliation_strings":["Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Pakistan","institution_ids":["https://openalex.org/I1308893265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462376","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0002-8580-9655"},"institutions":[{"id":"https://openalex.org/I4210109434","display_name":"Xinyu University","ror":"https://ror.org/021xwcd05","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210109434"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["College of Mathematics and Computer, Xinyu University, Xinyu, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer, Xinyu University, Xinyu, China","institution_ids":["https://openalex.org/I4210109434"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084513745","display_name":"C. Z. Yuan","orcid":"https://orcid.org/0009-0004-6507-0496"},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Chunhong Yuan","raw_affiliation_strings":["Faculty of Control Systems and Robotics, National Research University for Information Technology, Mechanics and Optics (ITMO), Saint Petersburg, Russia","Faculty of Control Systems and Robotics, National Research University for Information Technology, Mechanics and Optics (ITMO), St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Control Systems and Robotics, National Research University for Information Technology, Mechanics and Optics (ITMO), Saint Petersburg, Russia","institution_ids":["https://openalex.org/I173089394"]},{"raw_affiliation_string":"Faculty of Control Systems and Robotics, National Research University for Information Technology, Mechanics and Optics (ITMO), St. Petersburg, Russia","institution_ids":["https://openalex.org/I173089394"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003091988","display_name":"Lip Yee Por","orcid":"https://orcid.org/0000-0001-5865-1533"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Lip Yee Por","raw_affiliation_strings":["Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]}],"institutions":[],"countries_distinct_count":6,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5106484204"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18868036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1997","last_page":"2006"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2485000044107437,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2485000044107437,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.19380000233650208,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.12449999898672104,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6983000040054321},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6173999905586243},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5367000102996826},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5223000049591064},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4099000096321106},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.3952000141143799},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.38510000705718994},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.38190001249313354},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.36329999566078186}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7799999713897705},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6983000040054321},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6173999905586243},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5792999863624573},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5367000102996826},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5223000049591064},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4099000096321106},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.3952000141143799},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.38510000705718994},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.38190001249313354},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.36329999566078186},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.3625999987125397},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.361299991607666},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.33730000257492065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.328900009393692},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3278999924659729},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.32019999623298645},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3021000027656555},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2953000068664551},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.2946000099182129},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tce.2025.3634160","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634160","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:oai:infoscience.epfl.ch:20.500.14299/256488","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/256488","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"research article"}],"best_oa_location":{"id":"pmh:oai:infoscience.epfl.ch:20.500.14299/256488","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/256488","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"research article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,67,134],"rapid":[1],"growth":[2],"of":[3,37],"consumer":[4,45],"IoT":[5,65],"devices":[6],"has":[7],"introduced":[8],"unprecedented":[9],"challenges":[10],"in":[11],"trustworthy":[12],"anomaly":[13,61,106],"detection":[14,62,122],"against":[15,139],"AI-enabled":[16,155],"cyber":[17],"threats,":[18],"requiring":[19],"real-time,":[20],"privacy-preserving,":[21],"and":[22,39,98,104,146,154],"scalable":[23],"defense":[24,80],"mechanisms.":[25],"Traditional":[26],"centralized":[27,87],"strategies":[28],"face":[29],"critical":[30],"limitations,":[31],"including":[32],"communication":[33,130],"bottlenecks,":[34],"single":[35],"points":[36],"failure,":[38],"privacy":[40,144],"vulnerabilities":[41],"when":[42],"processing":[43],"distributed":[44,64],"data.":[46],"We":[47],"propose":[48],"SwarmSense-DNN,":[49],"a":[50,78],"novel":[51],"decentralized":[52],"neural":[53,74,96],"framework":[54,68,135],"employing":[55],"swarm":[56],"intelligence":[57],"for":[58],"secure,":[59],"cooperative":[60],"across":[63,124],"environments.":[66],"integrates":[69],"autonomous":[70],"agents":[71],"with":[72,94],"deep":[73],"networks":[75,97],"to":[76,101],"form":[77],"self-organizing":[79],"system":[81],"that":[82],"detects":[83],"evolving":[84],"anomalies":[85],"without":[86],"coordination.":[88],"It":[89],"utilizes":[90],"hierarchical":[91],"federated":[92],"learning":[93],"graph":[95],"attention":[99],"mechanisms":[100],"capture":[102],"local":[103],"global":[105],"behaviors":[107],"while":[108,128],"ensuring":[109],"data":[110],"privacy.":[111],"Extensive":[112],"experiments":[113],"demonstrate":[114],"SwarmSense-DNN\u2019s":[115],"superior":[116],"performance:":[117],"it":[118],"achieves":[119],"95.44%":[120],"average":[121],"accuracy":[123],"five":[125],"benchmark":[126],"datasets":[127],"reducing":[129],"overhead":[131],"by":[132],"67%.":[133],"maintains":[136],"robust":[137],"resilience":[138],"adversarial":[140],"threats":[141],"through":[142],"differential":[143],"safeguards":[145],"demonstrates":[147],"strong":[148],"fault":[149],"tolerance":[150],"under":[151],"node":[152],"failures":[153],"attacks.":[156]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-18T00:00:00"}
