{"id":"https://openalex.org/W4410986055","doi":"https://doi.org/10.1109/tnse.2025.3576322","title":"Federated TSRN-Enabled GANs for Effective Cyber Attack Detection in Edge Computing","display_name":"Federated TSRN-Enabled GANs for Effective Cyber Attack Detection in Edge Computing","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410986055","doi":"https://doi.org/10.1109/tnse.2025.3576322"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3576322","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3576322","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043310675","display_name":"Zeseya Sharmin","orcid":"https://orcid.org/0000-0002-0707-0795"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Zeseya Sharmin","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000628690","display_name":"Md Palash Uddin","orcid":"https://orcid.org/0000-0002-4429-6590"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Md Palash Uddin","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100404363","display_name":"Feifei Chen","orcid":"https://orcid.org/0000-0001-5455-3792"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Feifei Chen","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, China","institution_ids":["https://openalex.org/I59649739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050931109","display_name":"Jine Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I184843921","display_name":"Hebei University of Technology","ror":"https://ror.org/018hded08","country_code":"CN","type":"education","lineage":["https://openalex.org/I184843921"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jine Tang","raw_affiliation_strings":["School of Artificial Intelligence, Hebei University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Hebei University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I184843921"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5043310675"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":4.3457,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.94355369,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9046000242233276,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9046000242233276,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.681605339050293},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5559285283088684},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.45615968108177185},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42961397767066956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3619993031024933},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15273445844650269}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.681605339050293},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5559285283088684},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.45615968108177185},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42961397767066956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3619993031024933},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15273445844650269}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnse.2025.3576322","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3576322","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/29310962","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/29310962","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2064675550","https://openalex.org/W2079735306","https://openalex.org/W2104927807","https://openalex.org/W2111619626","https://openalex.org/W2416799949","https://openalex.org/W2568772110","https://openalex.org/W2591882872","https://openalex.org/W2789828921","https://openalex.org/W2914289538","https://openalex.org/W2972189363","https://openalex.org/W2999538200","https://openalex.org/W3085955590","https://openalex.org/W3102359135","https://openalex.org/W3104631511","https://openalex.org/W3114953370","https://openalex.org/W3163895120","https://openalex.org/W3206162503","https://openalex.org/W4206713037","https://openalex.org/W4210630464","https://openalex.org/W4220810976","https://openalex.org/W4226407702","https://openalex.org/W4285169553","https://openalex.org/W4312384107","https://openalex.org/W4316039377","https://openalex.org/W4385338452","https://openalex.org/W4387623967","https://openalex.org/W4389474068","https://openalex.org/W4391046504","https://openalex.org/W4401295443","https://openalex.org/W4408163458"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W3023564924","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Edge":[0],"Computing":[1],"(EC)":[2],"processes":[3],"data":[4,18,84,129,159,190],"locally":[5,91],"at":[6,92],"edge":[7,42,46,94],"servers,":[8,23],"reducing":[9],"latency,":[10],"conserving":[11],"bandwidth,":[12],"enhancing":[13],"privacy,":[14],"and":[15,32,48,113,115,186,197,220],"managing":[16],"large":[17],"volumes":[19],"independently":[20],"of":[21],"central":[22,98],"making":[24],"it":[25],"critical":[26],"for":[27,66,78,127,217],"applications":[28],"like":[29],"autonomous":[30],"vehicles":[31],"healthcare.":[33],"However,":[34,107],"EC":[35,68],"is":[36],"vulnerable":[37],"to":[38,102,155,175,214],"cyber":[39],"attacks,":[40],"as":[41],"nodes":[43],"can":[44],"compromise":[45],"servers":[47],"exploit":[49],"communication":[50,61],"between":[51],"them.":[52],"Traditional":[53],"Machine":[54],"Learning":[55,71],"(ML)":[56],"methods,":[57],"which":[58,144],"require":[59],"centralizing":[60],"(activity)":[62],"data,":[63],"are":[64],"ineffective":[65],"privacy-sensitive":[67],"scenarios.":[69],"Federated":[70,79],"(FL)":[72],"offers":[73],"a":[74,88,97,104,171,228],"distributed":[75],"ML":[76],"approach":[77],"Cyber-Attack":[80],"Detection":[81],"(FedCAD),":[82],"preserving":[83],"privacy":[85],"by":[86,160,211],"training":[87,179],"shared":[89],"model":[90],"each":[93],"server,":[95],"with":[96,111,153],"server":[99],"aggregating":[100],"updates":[101],"form":[103],"global":[105],"model.":[106],"FedCAD":[108],"faces":[109],"challenges":[110],"unlabeled":[112,218],"non-Independent":[114],"non-Identically":[116],"Distributed":[117],"(non-IID)":[118],"activity":[119],"data.":[120,194],"Existing":[121],"Generative":[122],"Adversarial":[123],"Networks":[124],"(GANs)":[125],"methods":[126,210],"synthetic":[128,189],"generation":[130],"do":[131],"not":[132],"fully":[133],"address":[134],"these":[135,139],"issues.":[136],"To":[137],"overcome":[138],"challenges,":[140],"we":[141,169],"propose":[142],"FedTSRGNet,":[143],"integrates":[145],"novel":[146],"Temporal":[147],"Sequential":[148],"Recurrent":[149],"Network":[150],"(TSRN)-enabled":[151],"GANs":[152],"FL":[154,182],"generate":[156],"realistic":[157],"sequential":[158],"capturing":[161],"complex":[162],"temporal":[163],"patterns":[164],"in":[165,223],"local":[166],"datasets.":[167],"Additionally,":[168],"introduce":[170],"reformulated":[172],"loss":[173],"function":[174],"optimize":[176],"TSRN-enabled":[177],"GAN":[178],"within":[180],"the":[181,188],"paradigm,":[183],"improving":[184],"convergence":[185],"ensuring":[187],"closely":[191],"mimics":[192],"real":[193],"Theoretical":[195],"analysis":[196],"extensive":[198],"experiments":[199],"on":[200],"two":[201],"benchmark":[202],"datasets":[203],"demonstrate":[204],"that":[205],"FedTSRGNet":[206],"outperforms":[207],"four":[208],"state-of-the-art":[209],"achieving":[212],"up":[213],"89%":[215],"accuracy":[216,222],"non-IID":[219],"95%":[221],"labeled":[224],"IID":[225],"distributions,":[226],"representing":[227],"significant":[229],"improvement":[230],"over":[231],"comparative":[232],"methods.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
