{"id":"https://openalex.org/W4403977244","doi":"https://doi.org/10.1109/tifs.2024.3488506","title":"ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection","display_name":"ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4403977244","doi":"https://doi.org/10.1109/tifs.2024.3488506"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3488506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3488506","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074686490","display_name":"Edward Kwadwo Boahen","orcid":"https://orcid.org/0000-0002-2911-8112"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Edward Kwadwo Boahen","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0002-2911-8112","affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050920580","display_name":"Rexford Nii Ayitey Sosu","orcid":"https://orcid.org/0000-0001-5527-5114"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rexford Nii Ayitey Sosu","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0001-5527-5114","affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041918006","display_name":"Selasi Kwame Ocansey","orcid":"https://orcid.org/0000-0003-2905-8903"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Selasi Kwame Ocansey","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0003-2905-8903","affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066675404","display_name":"Qinbao Xu","orcid":"https://orcid.org/0000-0002-2627-3918"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinbao Xu","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0002-2627-3918","affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091010279","display_name":"Changda Wang","orcid":"https://orcid.org/0000-0002-7024-4559"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changda Wang","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0002-7024-4559","affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5074686490"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":3.364,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93063459,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"10258","last_page":"10272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9408000111579895,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.932699978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8100204467773438},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7398046255111694},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6645326614379883},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.517769455909729},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3964087963104248}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8100204467773438},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7398046255111694},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6645326614379883},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.517769455909729},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3964087963104248}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3488506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3488506","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8856451597","display_name":null,"funder_award_id":"62072217","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W2101196063","https://openalex.org/W2272806125","https://openalex.org/W2513222658","https://openalex.org/W2794977433","https://openalex.org/W2969678483","https://openalex.org/W2990723369","https://openalex.org/W3011025032","https://openalex.org/W3011731543","https://openalex.org/W3092091320","https://openalex.org/W3100718111","https://openalex.org/W3100732544","https://openalex.org/W3115332324","https://openalex.org/W3116492894","https://openalex.org/W3146764396","https://openalex.org/W3192856967","https://openalex.org/W3205895791","https://openalex.org/W4205927892","https://openalex.org/W4282958541","https://openalex.org/W4282982824","https://openalex.org/W4291653275","https://openalex.org/W4294310845","https://openalex.org/W4296232812","https://openalex.org/W4296311888","https://openalex.org/W4312181988","https://openalex.org/W4313598884","https://openalex.org/W4316664428","https://openalex.org/W4320008793","https://openalex.org/W4323345705","https://openalex.org/W4323543477","https://openalex.org/W4323644405","https://openalex.org/W4323794423","https://openalex.org/W4353004226","https://openalex.org/W4362578996","https://openalex.org/W4367047167","https://openalex.org/W4379467709","https://openalex.org/W4379780951","https://openalex.org/W4380607273","https://openalex.org/W4383503685","https://openalex.org/W4385246573","https://openalex.org/W4385549611","https://openalex.org/W4385626758","https://openalex.org/W4387607580","https://openalex.org/W4388495333","https://openalex.org/W4399039675","https://openalex.org/W4399138722"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4288714711","https://openalex.org/W3200708550","https://openalex.org/W2736680465","https://openalex.org/W2771637876","https://openalex.org/W4294093918","https://openalex.org/W4240853094","https://openalex.org/W2810496283"],"abstract_inverted_index":{"Online":[0],"Social":[1],"Networks":[2],"(OSNs)":[3],"face":[4],"escalating":[5],"security":[6],"threats":[7],"that":[8,32,119,151],"imperil":[9],"user":[10,36,130],"privacy.":[11],"Conventional":[12],"Deep":[13],"Learning":[14,116],"methods,":[15],"relying":[16],"predominantly":[17],"on":[18],"fixed":[19],"learning":[20,122],"rates,":[21],"encounter":[22],"limitations":[23,104],"when":[24],"capturing":[25],"the":[26,59,88,103,112,137,143,152,178,192],"nuanced":[27],"intricacies":[28],"of":[29,46,77,91,129,159,165,175,199],"OSN":[30,146],"traffic":[31],"arise":[33],"from":[34,64,180],"shifting":[35,145],"behaviors,":[37],"diverse":[38,60],"content":[39],"types,":[40],"and":[41,62,183],"evolving":[42],"interaction":[43],"patterns":[44],"because":[45],"social":[47],"trending":[48],"topics":[49],"changes.":[50],"To":[51],"tackle":[52],"these":[53],"challenges,":[54],"our":[55,133,200],"paper":[56],"delves":[57],"into":[58],"variations":[61],"transitions":[63],"a":[65,69,80,126,163],"uniform":[66],"approach,":[67],"where":[68],"single":[70],"method":[71,118,135,155,202],"is":[72,203],"employed":[73],"for":[74,194],"various":[75],"types":[76],"data,":[78],"to":[79,87,123,139,142,190],"multi-variation":[81],"methodology.":[82],"This":[83],"methodology":[84],"dynamically":[85],"adapts":[86],"special":[89],"characteristics":[90],"each":[92],"data":[93,99],"type,":[94],"resulting":[95],"in":[96,161],"more":[97],"effective":[98],"representation":[100],"while":[101],"alleviating":[102],"associated":[105],"with":[106,136],"fixed-rate":[107],"calibration.":[108],"Therefore,":[109],"we":[110],"devise":[111],"Adaptive":[113],"Swarm":[114],"Reinforcement":[115],"(ASRL)":[117],"leverages":[120],"adaptive":[121],"intricately":[124],"analyze":[125],"wide":[127],"range":[128,164],"interactions,":[131],"endowing":[132],"proposed":[134,153,201],"capacity":[138],"flexibly":[140],"adjust":[141],"constantly":[144],"patterns.":[147],"The":[148,197],"experiments":[149],"show":[150],"ASRL":[154,186],"achieves":[156],"an":[157,173],"accuracy":[158],"98.59%":[160],"detecting":[162],"threat":[166],"patterns,":[167],"surpassing":[168],"other":[169],"prevalent":[170],"methods":[171],"by":[172],"average":[174],"5%":[176],"across":[177],"datasets":[179],"Facebook,":[181],"Google+,":[182],"Twitter.":[184],"Meanwhile,":[185],"logs":[187],"suspicious":[188],"activities":[189],"identify":[191],"intruder":[193],"forensic":[195],"analysis.":[196],"implementation":[198],"now":[204],"publicly":[205],"accessible":[206],"at":[207],"<uri":[208],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[209],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/don2c/asrl_Project</uri>.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":7}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
