{"id":"https://openalex.org/W4399881395","doi":"https://doi.org/10.1109/tdsc.2024.3417853","title":"A Privacy-Preserving Graph Neural Network for Network Intrusion Detection","display_name":"A Privacy-Preserving Graph Neural Network for Network Intrusion Detection","publication_year":2024,"publication_date":"2024-06-21","ids":{"openalex":"https://openalex.org/W4399881395","doi":"https://doi.org/10.1109/tdsc.2024.3417853"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3417853","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3417853","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081440831","display_name":"Xinjun Pei","orcid":"https://orcid.org/0000-0003-4772-7525"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinjun Pei","raw_affiliation_strings":["School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","School of Electronic Information, Central South University, Changsha, China"],"raw_orcid":"https://orcid.org/0000-0003-4772-7525","affiliations":[{"raw_affiliation_string":"School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086816845","display_name":"Xiaoheng Deng","orcid":"https://orcid.org/0000-0003-2740-8025"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoheng Deng","raw_affiliation_strings":["School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","School of Electronic Information, Central South University, Changsha, China"],"raw_orcid":"https://orcid.org/0000-0003-2740-8025","affiliations":[{"raw_affiliation_string":"School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075221279","display_name":"Shengwei Tian","orcid":"https://orcid.org/0000-0003-3525-5102"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengwei Tian","raw_affiliation_strings":["School of Software, Xinjiang University, Wulumuqi, China"],"raw_orcid":"https://orcid.org/0000-0003-3525-5102","affiliations":[{"raw_affiliation_string":"School of Software, Xinjiang University, Wulumuqi, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033022901","display_name":"Ping Jiang","orcid":"https://orcid.org/0000-0002-3898-4303"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Jiang","raw_affiliation_strings":["School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","School of Electronic Information, Central South University, Changsha, China"],"raw_orcid":"https://orcid.org/0000-0002-3898-4303","affiliations":[{"raw_affiliation_string":"School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100574259","display_name":"Yunlong Zhao","orcid":"https://orcid.org/0000-0002-2038-6540"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunlong Zhao","raw_affiliation_strings":["School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","School of Electronic Information, Central South University, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronic Information, Shenzhen Research Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100688242","display_name":"Kaiping Xue","orcid":"https://orcid.org/0000-0003-2095-7523"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiping Xue","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-2095-7523","affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081440831"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":3.0276,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91668461,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"22","issue":"1","first_page":"740","last_page":"756"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6063562035560608},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4895997643470764},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.44094738364219666},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4358736276626587},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33518868684768677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3143039345741272},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2989566922187805},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.21946114301681519}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6063562035560608},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4895997643470764},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.44094738364219666},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4358736276626587},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33518868684768677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3143039345741272},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2989566922187805},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.21946114301681519}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3417853","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3417853","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2030481789","display_name":null,"funder_award_id":"62172449","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2460975407","display_name":null,"funder_award_id":"62172441","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W2033974828","https://openalex.org/W2126052291","https://openalex.org/W2296509296","https://openalex.org/W2342408547","https://openalex.org/W2403749440","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2591712613","https://openalex.org/W2785707617","https://openalex.org/W2790522845","https://openalex.org/W2809607392","https://openalex.org/W2911994626","https://openalex.org/W2943605315","https://openalex.org/W2948246283","https://openalex.org/W2958333154","https://openalex.org/W2968792684","https://openalex.org/W2969468102","https://openalex.org/W2971544778","https://openalex.org/W2978348882","https://openalex.org/W2979450518","https://openalex.org/W2989699619","https://openalex.org/W3118722953","https://openalex.org/W3126389064","https://openalex.org/W3129045011","https://openalex.org/W3136205675","https://openalex.org/W3214714397","https://openalex.org/W4200453398","https://openalex.org/W4205571959","https://openalex.org/W4226159313","https://openalex.org/W4308206604","https://openalex.org/W4312521712","https://openalex.org/W4319990461","https://openalex.org/W4367281759","https://openalex.org/W4385650327","https://openalex.org/W4389943455","https://openalex.org/W4393034172","https://openalex.org/W4394717730","https://openalex.org/W4402808383","https://openalex.org/W6726873649","https://openalex.org/W6738964360","https://openalex.org/W6745316256","https://openalex.org/W6745537798","https://openalex.org/W6747855403","https://openalex.org/W6754929296","https://openalex.org/W6760001035","https://openalex.org/W6790009805","https://openalex.org/W6803206371","https://openalex.org/W6852635591"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160","https://openalex.org/W1483130311","https://openalex.org/W3120792425"],"abstract_inverted_index":{"With":[0],"the":[1,25,54,70,91,99,104],"ever-growing":[2],"attention":[3],"on":[4],"communication":[5,55],"security,":[6],"machine":[7],"learning-based":[8],"network":[9,83],"intrusion":[10],"detection":[11],"system":[12],"(NIDS)":[13],"is":[14,37],"widely":[15],"utilized":[16],"to":[17,63,69,103,148],"meet":[18],"different":[19],"security":[20],"requirements.":[21],"However,":[22],"most":[23],"of":[24,106],"existing":[26,61],"methods":[27],"manually":[28],"extract":[29],"or":[30],"learn":[31],"features":[32],"from":[33,73],"raw":[34],"traffic,":[35],"which":[36,88,121],"usually":[38],"expensive,":[39],"complicated,":[40],"and":[41,94],"time-consuming.":[42],"Moreover,":[43],"this":[44],"also":[45],"brings":[46],"unprecedented":[47],"challenges":[48],"for":[49,60,86],"preserving":[50],"users\u2019":[51],"privacy":[52,71,100,113,118,161],"in":[53,66,120,126,145,168],"process,":[56],"making":[57],"it":[58],"difficult":[59],"solutions":[62],"be":[64,130],"deployed":[65],"practice":[67],"due":[68],"requirements":[72],"legal":[74],"policies.":[75],"This":[76],"paper":[77],"proposes":[78],"a":[79,112,136,142,159,170],"privacy-preserving":[80],"graph":[81,107,127,138],"neural":[82],"(named":[84],"NIGNN)":[85],"NIDS,":[87],"can":[89,157],"encode":[90],"local":[92],"structure":[93],"traffic":[95],"features.":[96],"To":[97],"address":[98],"issues":[101],"pertaining":[102],"application":[105],"representation":[108,139],"learning,":[109],"we":[110,134],"design":[111,135],"message-passing":[114],"mechanism":[115],"with":[116],"formal":[117],"guarantees,":[119],"sensitive":[122],"information":[123],"potentially":[124],"contained":[125],"vertices":[128],"will":[129],"kept":[131],"private.":[132],"Specifically,":[133],"privacy-enhancement":[137],"that":[140,155],"introduces":[141],"degree-sensitive":[143],"item":[144],"vertex-based":[146],"aggregation":[147],"reduce":[149],"noise.":[150],"Our":[151],"theoretical":[152],"analysis":[153],"shows":[154],"NIGNN":[156],"provide":[158],"provable":[160],"guarantee.":[162],"Extensive":[163],"experiments":[164],"demonstrate":[165],"NIGNN's":[166],"performance":[167],"maintaining":[169],"sound":[171],"privacy-accuracy":[172],"trade-off.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
