{"id":"https://openalex.org/W4410227036","doi":"https://doi.org/10.1109/wcnc61545.2025.10978569","title":"TransEC-GAN: A Transformer-Enhanced IDS for Robust Detection and Privacy in Industrial CPS","display_name":"TransEC-GAN: A Transformer-Enhanced IDS for Robust Detection and Privacy in Industrial CPS","publication_year":2025,"publication_date":"2025-03-24","ids":{"openalex":"https://openalex.org/W4410227036","doi":"https://doi.org/10.1109/wcnc61545.2025.10978569"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc61545.2025.10978569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046547235","display_name":"Junwei Liang","orcid":"https://orcid.org/0000-0003-1999-0254"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junwei Liang","raw_affiliation_strings":["School of Computer &#x0026; Software, Shenzhen Institute of Information Technology,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"School of Computer &#x0026; Software, Shenzhen Institute of Information Technology,Shenzhen,China","institution_ids":["https://openalex.org/I158809036"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015625724","display_name":"Zejian Li","orcid":"https://orcid.org/0000-0001-5313-2742"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zejian Li","raw_affiliation_strings":["School of Computer &#x0026; Software, Shenzhen Institute of Information Technology,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"School of Computer &#x0026; Software, Shenzhen Institute of Information Technology,Shenzhen,China","institution_ids":["https://openalex.org/I158809036"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101663266","display_name":"Muhammad Sadiq","orcid":"https://orcid.org/0000-0003-2199-3702"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Muhammad Sadiq","raw_affiliation_strings":["School of International Relations, Shenzhen Institute of Information Technology,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"School of International Relations, Shenzhen Institute of Information Technology,Shenzhen,China","institution_ids":["https://openalex.org/I158809036"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046547235"],"corresponding_institution_ids":["https://openalex.org/I158809036"],"apc_list":null,"apc_paid":null,"fwci":1.3355,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8135562,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12111","display_name":"Industrial Vision Systems and Defect Detection","score":0.9495999813079834,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12111","display_name":"Industrial Vision Systems and Defect Detection","score":0.9495999813079834,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9298999905586243,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5077112913131714},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.43779534101486206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3611460328102112},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32339054346084595},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.12038972973823547},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09018251299858093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5077112913131714},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.43779534101486206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3611460328102112},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32339054346084595},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.12038972973823547},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09018251299858093},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc61545.2025.10978569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W4223548541","https://openalex.org/W4224212103","https://openalex.org/W4281702766","https://openalex.org/W4353004226","https://openalex.org/W4385423342","https://openalex.org/W4392152702","https://openalex.org/W4393098192","https://openalex.org/W6788474631"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Despite":[0],"the":[1,30,82,105,112,133,173],"widespread":[2],"deployment":[3],"of":[4,190],"various":[5],"Intrusion":[6],"Detection":[7],"Systems":[8,13],"(IDSs)":[9],"in":[10,185,193],"industrial":[11,65,194],"Cyber-Physical":[12],"(CPS),":[14],"significant":[15],"challenges":[16],"such":[17],"as":[18,70],"class":[19],"imbalance,":[20],"zero-day":[21],"attacks,":[22],"and":[23,44,96,149,158,162,168],"privacy":[24,122,180],"vulnerabilities":[25],"persist.":[26],"These":[27],"issues":[28],"underline":[29],"critical":[31],"need":[32],"for":[33,64],"a":[34,59,71,137,187],"more":[35],"robust":[36],"IDS":[37,61],"solution":[38,62],"that":[39,143,172],"not":[40,176],"only":[41,177],"improves":[42],"detection":[43,141],"generalization":[45],"capabilities":[46],"across":[47],"different":[48],"scenarios":[49],"but":[50,182],"also":[51,183],"ensures":[52],"stringent":[53],"data":[54],"privacy.":[55],"In":[56],"this":[57],"paper,":[58],"novel":[60,161],"tailored":[63],"CPS":[66,195],"is":[67,118],"proposed,":[68],"designated":[69],"Transformer-enhanced":[72],"External":[73,83],"Classifier-Generative":[74,84],"Adversarial":[75,85],"Network":[76,86],"(TransEC-GAN).":[77],"This":[78],"innovative":[79],"model":[80],"extends":[81],"(EC-GAN)":[87],"by":[88],"integrating":[89],"Transformer":[90],"encoders,":[91],"which":[92],"leverage":[93],"Wasserstein":[94],"distance":[95],"label":[97],"conditioning":[98],"to":[99,124,156,160],"enable":[100],"stable":[101],"gradient":[102],"descent":[103],"within":[104],"semi-supervised":[106],"learning":[107],"environment.":[108],"To":[109],"further":[110],"fortify":[111],"system,":[113],"Adaptive":[114],"Differential":[115],"Privacy":[116],"(ADP)":[117],"incorporated,":[119],"dynamically":[120],"adjusting":[121],"settings":[123],"effectively":[125],"prevent":[126],"adversaries":[127],"from":[128],"exploiting":[129],"sensitive":[130],"information.":[131],"Additionally,":[132],"proposed":[134,174],"TransEC-GAN":[135,175],"features":[136],"meticulously":[138],"designed":[139],"two-stage":[140],"architecture":[142],"proficiently":[144],"distinguishes":[145],"between":[146],"In-Distribution":[147],"(InD)":[148],"Out-Of-Distribution":[150],"(OOD)":[151],"samples,":[152],"enhancing":[153],"its":[154],"ability":[155],"identify":[157],"react":[159],"evolving":[163],"threats.":[164],"Comprehensive":[165],"experimental":[166],"evaluations":[167],"theoretical":[169],"analysis":[170],"validate":[171],"safeguards":[178],"against":[179],"breaches":[181],"excels":[184],"detecting":[186],"wide":[188],"array":[189],"attack":[191],"types":[192],"settings.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
