{"id":"https://openalex.org/W4416366627","doi":"https://doi.org/10.1109/tce.2025.3634753","title":"Adaptive Federated Reinforcement Learning With Temporal Hybrid Deep Model for Consumer Internet of Vehicles Intrusion Detection","display_name":"Adaptive Federated Reinforcement Learning With Temporal Hybrid Deep Model for Consumer Internet of Vehicles Intrusion Detection","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416366627","doi":"https://doi.org/10.1109/tce.2025.3634753"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3634753","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634753","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068739772","display_name":"Hamad Naeem","orcid":"https://orcid.org/0000-0003-1511-218X"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Hamad Naeem","raw_affiliation_strings":["Department of Computer Science, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia","Department of Computer Science, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Al-Ahsa, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]},{"raw_affiliation_string":"Department of Computer Science, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Al-Ahsa, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051912609","display_name":"Amjad Alsirhani","orcid":"https://orcid.org/0000-0001-8145-2575"},"institutions":[{"id":"https://openalex.org/I199702508","display_name":"Jouf University","ror":"https://ror.org/02zsyt821","country_code":"SA","type":"education","lineage":["https://openalex.org/I199702508"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Amjad Alsirhani","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Sciences, Jouf University, Sakakah, Al Jouf, Saudi Arabia","Department of Computer Science, College of Computer and Information Sciences, Jouf University, Al Jouf, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Sciences, Jouf University, Sakakah, Al Jouf, Saudi Arabia","institution_ids":["https://openalex.org/I199702508"]},{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Sciences, Jouf University, Al Jouf, Saudi Arabia","institution_ids":["https://openalex.org/I199702508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046591880","display_name":"Faeiz Alserhani","orcid":"https://orcid.org/0000-0002-0161-7147"},"institutions":[{"id":"https://openalex.org/I199702508","display_name":"Jouf University","ror":"https://ror.org/02zsyt821","country_code":"SA","type":"education","lineage":["https://openalex.org/I199702508"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Faeiz M. Alserhani","raw_affiliation_strings":["Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University, Sakakah, Al Jouf, Saudi Arabia","Department of Computer Engineering &#x0026; Networks, College of Computer and Information Sciences, Jouf University, Al Jouf, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University, Sakakah, Al Jouf, Saudi Arabia","institution_ids":["https://openalex.org/I199702508"]},{"raw_affiliation_string":"Department of Computer Engineering &#x0026; Networks, College of Computer and Information Sciences, Jouf University, Al Jouf, Saudi Arabia","institution_ids":["https://openalex.org/I199702508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045910571","display_name":"Maha M. Althobaiti","orcid":"https://orcid.org/0000-0001-6322-3963"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Maha M. Althobaiti","raw_affiliation_strings":["Department of Computer Science, College of Computing and Information Technology, Taif University, Taif, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing and Information Technology, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081328154","display_name":"Eatedal Alabdulkreem","orcid":"https://orcid.org/0000-0002-3001-6818"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Eatedal Alabdulkreem","raw_affiliation_strings":["Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]},{"raw_affiliation_string":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068739772"],"corresponding_institution_ids":["https://openalex.org/I4626487"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40398133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"2036","last_page":"2048"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.39430001378059387,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.39430001378059387,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.16439999639987946,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.14329999685287476,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7520999908447266},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6861000061035156},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.541100025177002},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5006999969482422},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4634000062942505},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.44279998540878296},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.4359999895095825},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4018000066280365},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.3749000132083893}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8259000182151794},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7520999908447266},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6861000061035156},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.541100025177002},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5006999969482422},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4634000062942505},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.44279998540878296},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.4359999895095825},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4244999885559082},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41449999809265137},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4101000130176544},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4018000066280365},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.3749000132083893},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.364300012588501},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.3515999913215637},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3474000096321106},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33809998631477356},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.3183000087738037},{"id":"https://openalex.org/C89074322","wikidata":"https://www.wikidata.org/wiki/Q485669","display_name":"Telematics","level":2,"score":0.3174000084400177},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2985000014305115},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.28679999709129333},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.27129998803138733},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.25769999623298645},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2574999928474426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3634753","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634753","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2888757899","https://openalex.org/W2917425811","https://openalex.org/W2931084620","https://openalex.org/W2971329741","https://openalex.org/W3033995680","https://openalex.org/W3036425307","https://openalex.org/W3114244868","https://openalex.org/W3138010649","https://openalex.org/W3154310484","https://openalex.org/W3189867955","https://openalex.org/W3200504675","https://openalex.org/W4210629969","https://openalex.org/W4282836908","https://openalex.org/W4288075785","https://openalex.org/W4292348061","https://openalex.org/W4296065799","https://openalex.org/W4306755957","https://openalex.org/W4379740938","https://openalex.org/W4379743892","https://openalex.org/W4379880682","https://openalex.org/W4387986831","https://openalex.org/W4396707597","https://openalex.org/W4400585973","https://openalex.org/W4403182783"],"related_works":[],"abstract_inverted_index":{"Consumer":[0],"devices":[1],"that":[2],"are":[3,12,22,145],"integrated":[4],"into":[5],"the":[6,17,30,34,50,135,192,227],"Internet":[7],"of":[8,33,52,117,187],"Vehicles":[9],"(IoV)":[10],"systems":[11],"becoming":[13],"more":[14],"susceptible":[15],"to":[16,26,63,87,147,205],"sophisticated":[18],"intrusion":[19,181,210],"attacks,":[20],"which":[21,83,170],"a":[23,41,75,148,152,175,207],"major":[24],"threat":[25],"user":[27],"safety":[28],"and":[29,72,81,110,113,142,189,196,219],"overall":[31],"integrity":[32],"system.":[35],"Federated":[36],"Learning":[37,154],"(FL)":[38],"has":[39,84],"been":[40],"prominent":[42],"technique":[43],"for":[44,213],"collaborative":[45],"training":[46],"models":[47,141],"while":[48],"maintaining":[49],"confidentiality":[51],"sensitive":[53],"information.":[54],"In":[55],"addition,":[56],"conventional":[57],"FL-based":[58],"IDS":[59],"approaches":[60],"have":[61],"problems":[62],"handle":[64],"non-identical":[65],"IID":[66,111],"(IID)":[67],"data":[68,118],"distributions":[69],"across":[70],"clients,":[71],"usually":[73],"use":[74],"fixed":[76],"aggregation":[77,164,178],"method":[78,201],"like":[79,217],"FedAvg":[80],"FedProx,":[82],"poor":[85],"adaptability":[86],"changeable":[88],"client":[89,131,140,168],"behaviors.":[90],"To":[91],"tackle":[92],"these":[93],"limitations,":[94],"this":[95],"research":[96],"proposes":[97],"an":[98],"adaptive":[99],"federated":[100,225],"learning":[101],"framework":[102],"by":[103],"preprocessing":[104],"IoVs":[105],"network":[106],"traffic":[107],"through":[108],"standardization":[109],"(independent":[112],"identical":[114],"distributed)":[115],"distribution":[116],"among":[119],"clients.":[120],"A":[121],"Temporal":[122],"Hybrid":[123],"Deep":[124,159],"Model":[125],"(CNN-LSTM-Attention)":[126],"is":[127],"trained":[128],"on":[129,158,167,191],"each":[130],"locally":[132],"(starting":[133],"from":[134],"global":[136,172],"model).":[137],"After":[138],"training,":[139],"performance":[143],"metrics":[144],"updated":[146],"central":[149],"server,":[150],"where":[151],"Reinforcement":[153],"(RL)":[155],"agent":[156],"based":[157,166],"Q-Network":[160],"(DQN)":[161],"optimally":[162],"decides":[163],"weights":[165],"Q-values,":[169],"maximizes":[171],"accuracy":[173],"as":[174],"reward.":[176],"Iterative":[177],"greatly":[179],"improves":[180],"detection":[182,185,211],"performance,":[183],"with":[184],"accuracies":[186],"99.85%":[188],"95.18%":[190],"benchmark":[193],"datasets":[194],"CICIOV2024":[195],"CICEVSE2024,":[197],"respectively.":[198],"The":[199],"proposed":[200],"makes":[202],"it":[203],"possible":[204],"develop":[206],"lightweight,":[208],"edge-deployable":[209],"system":[212],"consumer":[214],"IoV":[215],"device":[216],"telematics":[218],"electric":[220],"car":[221],"chargers.":[222],"By":[223],"leveraging":[224],"learning,":[226],"approach":[228],"provides":[229],"real-time,":[230],"privacy-preserving":[231],"protection.":[232]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-19T00:00:00"}
