{"id":"https://openalex.org/W4416924998","doi":"https://doi.org/10.1109/wimob66857.2025.11257512","title":"A Scalable and Efficient Intrusion Detection System Based on a Shapley Value Driven Feature Selection","display_name":"A Scalable and Efficient Intrusion Detection System Based on a Shapley Value Driven Feature Selection","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4416924998","doi":"https://doi.org/10.1109/wimob66857.2025.11257512"},"language":null,"primary_location":{"id":"doi:10.1109/wimob66857.2025.11257512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078244293","display_name":"Giovanni Rocca","orcid":null},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Giovanni Rocca","raw_affiliation_strings":["Universit&#x00E0; della Calabria,Department of Informatics, Modelling, Electronics and Systems (DIMES),Rende,Italia"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; della Calabria,Department of Informatics, Modelling, Electronics and Systems (DIMES),Rende,Italia","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074855296","display_name":"Mattia Giovanni Spina","orcid":"https://orcid.org/0009-0000-8407-2551"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mattia G. Spina","raw_affiliation_strings":["Universit&#x00E0; della Calabria,Department of Informatics, Modelling, Electronics and Systems (DIMES),Rende,Italia"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; della Calabria,Department of Informatics, Modelling, Electronics and Systems (DIMES),Rende,Italia","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075581736","display_name":"Floriano De Rango","orcid":"https://orcid.org/0000-0003-4901-6233"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Floriano De Rango","raw_affiliation_strings":["Universit&#x00E0; della Calabria,Department of Informatics, Modelling, Electronics and Systems (DIMES),Rende,Italia"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; della Calabria,Department of Informatics, Modelling, Electronics and Systems (DIMES),Rende,Italia","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078244293"],"corresponding_institution_ids":["https://openalex.org/I45204951"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45491539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"31","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.805400013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.805400013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.03790000081062317,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.018699999898672104,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7754999995231628},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.694599986076355},{"id":"https://openalex.org/keywords/shapley-value","display_name":"Shapley value","score":0.6615999937057495},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6359999775886536},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5817000269889832},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.49160000681877136},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.47760000824928284},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.46459999680519104},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4593999981880188}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7754999995231628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.771399974822998},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.694599986076355},{"id":"https://openalex.org/C199022921","wikidata":"https://www.wikidata.org/wiki/Q240046","display_name":"Shapley value","level":3,"score":0.6615999937057495},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6359999775886536},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6276000142097473},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5817000269889832},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5489000082015991},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5263000130653381},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49160000681877136},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.47760000824928284},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.46459999680519104},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4593999981880188},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.4399999976158142},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4277999997138977},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.39239999651908875},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C111012933","wikidata":"https://www.wikidata.org/wiki/Q3137210","display_name":"Rough set","level":2,"score":0.3037000000476837},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.29280000925064087},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2858000099658966},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.28540000319480896},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.28040000796318054},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.2614000141620636}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob66857.2025.11257512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2135046866","https://openalex.org/W2487898712","https://openalex.org/W2789828921","https://openalex.org/W2792074408","https://openalex.org/W2922073769","https://openalex.org/W2958285686","https://openalex.org/W3109369928","https://openalex.org/W3166389143","https://openalex.org/W4295346826","https://openalex.org/W4312132544","https://openalex.org/W4321325892","https://openalex.org/W4361010174","https://openalex.org/W4377710425","https://openalex.org/W4388203817","https://openalex.org/W4392910476","https://openalex.org/W4393182100","https://openalex.org/W4393336635","https://openalex.org/W4393930468","https://openalex.org/W4396918546","https://openalex.org/W4404978949","https://openalex.org/W4410087622","https://openalex.org/W4413064611"],"related_works":[],"abstract_inverted_index":{"The":[0,64,158,174],"proliferation":[1],"of":[2,70,86,97,154,180,188],"IoT":[3],"devices,":[4],"amplified":[5],"by":[6,75,191,198],"6G,":[7],"has":[8,113,160],"heightened":[9],"security":[10],"risks.":[11],"To":[12],"counter":[13],"these,":[14],"experts":[15],"are":[16,120],"improving":[17,102],"Intrusion":[18,100],"Detection":[19],"Systems":[20],"(IDSs)":[21],"using":[22],"Machine":[23],"Learning":[24,28],"(ML)":[25],"and":[26,41,92,116,127,193,207],"Deep":[27],"(DL)":[29],"algorithms,":[30],"which":[31,119,169],"rely":[32],"on":[33,185,194],"Feature":[34],"Selection":[35],"(FS)":[36],"to":[37,124,149],"identify":[38],"key":[39],"features":[40,189],"optimize":[42],"performance":[43,179],"in":[44,73,168,205],"detecting":[45],"attacks.":[46],"In":[47],"this":[48,50],"context,":[49],"paper":[51],"proposes":[52],"a":[53,98,107,139,164,202],"novel":[54],"informed":[55],"FS":[56,144],"technique":[57],"that":[58],"exploits":[59],"XAI":[60,74],"(eXplainable":[61],"Artificial":[62],"Intelligence).":[63],"proposed":[65,156],"algorithm":[66],"extends":[67],"the":[68,84,88,95,111,134,152,155,172,178,181,186,195],"use":[69],"Shapley":[71],"Value":[72],"enhancing":[76],"it":[77],"with":[78,83,141],"an":[79],"accuracy-driven":[80],"binary":[81],"search":[82],"aim":[85],"finding":[87],"most":[89],"representative":[90],"feature":[91],"therefore":[93],"reducing":[94],"dimensionality":[96],"Network":[99],"Dataset,":[101],"its":[103,117],"detection":[104],"ability.":[105],"Through":[106],"comprehensive":[108,165],"experimental":[109,166,175],"campaign,":[110],"proposal":[112,159],"been":[114,161],"validated":[115,162],"benefits,":[118],"not":[121],"only":[122],"limited":[123],"reduced":[125],"training":[126,206],"testing":[128,208],"time,":[129],"but":[130],"also":[131,147],"drastically":[132],"streamlining":[133],"AI":[135],"model":[136,182],"complexity.":[137],"Finally,":[138],"comparison":[140],"other":[142],"standard":[143],"techniques":[145],"is":[146],"provided":[148],"further":[150],"highlight":[151],"advantages":[153],"algorithm.":[157],"through":[163],"campaign":[167],"results":[170],"show":[171],"benefits.":[173],"section":[176],"shows":[177],"when":[183],"trained":[184],"set":[187,196],"returned":[190,197],"DeepSHAP":[192],"our":[199],"framework,":[200],"showing":[201],"drastic":[203],"reduction":[204],"time.":[209]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-02T00:00:00"}
