{"id":"https://openalex.org/W4416366465","doi":"https://doi.org/10.1109/tce.2025.3634568","title":"FusedBoostNet: A Lightweight Hybrid Model for Consumer-Grade Intrusion Detection","display_name":"FusedBoostNet: A Lightweight Hybrid Model for Consumer-Grade Intrusion Detection","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416366465","doi":"https://doi.org/10.1109/tce.2025.3634568"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3634568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634568","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112890649","display_name":"Abhilash Sharma","orcid":"https://orcid.org/0000-0002-5523-052X"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ankita Sharma","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004251248","display_name":"Shalli Rani","orcid":"https://orcid.org/0000-0002-8474-9435"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shalli Rani","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India","institution_ids":["https://openalex.org/I74319210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112890649"],"corresponding_institution_ids":["https://openalex.org/I74319210"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40381263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1524","last_page":"1531"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6626999974250793,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6626999974250793,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1906999945640564,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.03370000049471855,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6407999992370605},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.614300012588501},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5730999708175659},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5554999709129333},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5342000126838684},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.5134000182151794},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4724999964237213},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.44850000739097595},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4101000130176544},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3968999981880188}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7213000059127808},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6407999992370605},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.614300012588501},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5730999708175659},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5554999709129333},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5342000126838684},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.5134000182151794},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48100000619888306},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4724999964237213},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.44850000739097595},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4185999929904938},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4101000130176544},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3968999981880188},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.35740000009536743},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3564999997615814},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.349700003862381},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3476000130176544},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.32089999318122864},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.30730000138282776},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.3043000102043152},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.2994999885559082},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.28220000863075256},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.273499995470047},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.2696000039577484},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.26910001039505005},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.2662000060081482},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25450000166893005}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3634568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634568","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2914206419","https://openalex.org/W2941288225","https://openalex.org/W3046697349","https://openalex.org/W3081255579","https://openalex.org/W3139008799","https://openalex.org/W3154213948","https://openalex.org/W3172408309","https://openalex.org/W3190454471","https://openalex.org/W3208773001","https://openalex.org/W3214148834","https://openalex.org/W3217748719","https://openalex.org/W4210302431","https://openalex.org/W4280606225","https://openalex.org/W4281817087","https://openalex.org/W4283209462","https://openalex.org/W4310206563","https://openalex.org/W4313408599","https://openalex.org/W4321503206","https://openalex.org/W4384834203","https://openalex.org/W4391881576","https://openalex.org/W4399181772","https://openalex.org/W4403759002","https://openalex.org/W4404639181","https://openalex.org/W4407859745","https://openalex.org/W4408100192","https://openalex.org/W4408323749","https://openalex.org/W4408520071","https://openalex.org/W4410973753"],"related_works":[],"abstract_inverted_index":{"The":[0,67,145],"rapid":[1],"accumulation":[2],"of":[3,13,75,132,136],"AI-enabled":[4,179],"cyberattacks":[5],"poses":[6],"a":[7,38,93,129,139,154,184],"significant":[8],"threat":[9,65],"to":[10,28,59,178],"the":[11,70,89,105,113,175],"security":[12],"consumer":[14,192],"applications":[15,193],"and":[16,22,32,63,72,125,138,161,186],"smart":[17],"devices.":[18],"Traditional":[19],"intrusion":[20],"detection":[21,130],"prevention":[23],"systems":[24],"(IDPS)":[25],"often":[26],"struggle":[27],"balance":[29],"accuracy,":[30],"efficiency,":[31],"deployability":[33],"in":[34,194],"resource-constrained":[35],"environments.":[36],"FusedBoostNet,":[37],"novel":[39],"hybrid":[40],"framework":[41],"that":[42,117],"fuses":[43],"Gradient":[44],"Boosting":[45],"Machines":[46],"(GBM)":[47],"with":[48,153],"an":[49,134,195],"attention-augmented":[50],"one-dimensional":[51],"Convolutional":[52],"Neural":[53],"Network":[54],"(1D-CNN)":[55],"has":[56],"been":[57],"proposed":[58],"deliver":[60],"accurate,":[61],"robust,":[62],"lightweight":[64],"detection.":[66],"system":[68],"leverages":[69],"interpretability":[71],"decision":[73],"strength":[74],"GBM":[76],"on":[77,112],"tabular":[78],"network":[79],"features":[80],"while":[81],"capturing":[82],"temporal":[83],"patterns":[84],"from":[85],"sequential":[86],"traffic":[87],"using":[88],"1D-CNN,":[90],"enhanced":[91],"by":[92],"channel-level":[94],"attention":[95],"mechanism.":[96],"A":[97],"score-level":[98],"fusion":[99],"strategy":[100],"ensures":[101],"optimal":[102],"synergy":[103],"between":[104],"models":[106],"for":[107,150,189],"final":[108],"classification.":[109],"Extensive":[110],"experiments":[111],"CIC-IDS2018":[114],"dataset":[115],"demonstrate":[116],"FusedBoostNet":[118,182],"outperforms":[119],"classical":[120],"machine":[121],"learning,":[122,124],"deep":[123],"ensemble-based":[126],"techniques,":[127],"achieving":[128],"accuracy":[131],"96.8%,":[133],"F1-score":[135],"96.0%,":[137],"false":[140],"positive":[141],"rate":[142],"below":[143],"3%.":[144],"model":[146],"is":[147],"further":[148],"validated":[149],"edge":[151],"deployment":[152],"compact":[155],"footprint":[156],"(less":[157],"than":[158],"5":[159],"MB)":[160],"inference":[162],"latency":[163],"under":[164],"10":[165],"ms.":[166],"In":[167],"addition,":[168],"robustness":[169],"testing":[170],"against":[171],"adversarial":[172,197],"perturbations":[173],"highlights":[174],"system\u2019s":[176],"resilience":[177],"evasion":[180],"attacks.":[181],"offers":[183],"practical":[185],"scalable":[187],"solution":[188],"securing":[190],"next-generation":[191],"increasingly":[196],"digital":[198],"landscape.":[199]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-19T00:00:00"}
