{"id":"https://openalex.org/W4416925260","doi":"https://doi.org/10.1109/wimob66857.2025.11257554","title":"SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems","display_name":"SG-VAE: Explainable Semi-Generative Model for Attack Detection in IoT Healthcare Systems","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4416925260","doi":"https://doi.org/10.1109/wimob66857.2025.11257554"},"language":null,"primary_location":{"id":"doi:10.1109/wimob66857.2025.11257554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093090601","display_name":"Komal Ghafoor","orcid":"https://orcid.org/0009-0004-8956-1011"},"institutions":[{"id":"https://openalex.org/I79940851","display_name":"University of Brescia","ror":"https://ror.org/02q2d2610","country_code":"IT","type":"education","lineage":["https://openalex.org/I79940851"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Komal Ghafoor","raw_affiliation_strings":["Universit&#x00E0; degli Studi di Brescia,Department Information Engineering,Italy"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; degli Studi di Brescia,Department Information Engineering,Italy","institution_ids":["https://openalex.org/I79940851"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058941449","display_name":"Furqan Rustam","orcid":"https://orcid.org/0000-0001-8403-1047"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Furquan Rustam","raw_affiliation_strings":["School of Computer Science, University College Dublin,Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022546955","display_name":"Anca Delia Jurcut","orcid":"https://orcid.org/0000-0002-2705-1823"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Anca Delia Jurcut","raw_affiliation_strings":["School of Computer Science, University College Dublin,Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5120579116","display_name":"Devis Bianchini\u00e8","orcid":null},"institutions":[{"id":"https://openalex.org/I79940851","display_name":"University of Brescia","ror":"https://ror.org/02q2d2610","country_code":"IT","type":"education","lineage":["https://openalex.org/I79940851"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Devis Bianchini\u00e8","raw_affiliation_strings":["Universit&#x00E0; degli Studi di Brescia,Department Information Engineering,Italy"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; degli Studi di Brescia,Department Information Engineering,Italy","institution_ids":["https://openalex.org/I79940851"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093090601"],"corresponding_institution_ids":["https://openalex.org/I79940851"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19925322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.47440001368522644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.47440001368522644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.09780000150203705,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.03620000183582306,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.791700005531311},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5353999733924866},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5257999897003174},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5241000056266785},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.517799973487854},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4796000123023987},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.4672999978065491},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.36039999127388}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.791700005531311},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7663999795913696},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5353999733924866},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5257999897003174},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5241000056266785},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.517799973487854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.501800000667572},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4796000123023987},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.4672999978065491},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37959998846054077},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.36039999127388},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.36010000109672546},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.3578000068664551},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.34200000762939453},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33410000801086426},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C2988170871","wikidata":"https://www.wikidata.org/wiki/Q11000047","display_name":"Healthcare system","level":3,"score":0.3098999857902527},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.30320000648498535},{"id":"https://openalex.org/C116409475","wikidata":"https://www.wikidata.org/wiki/Q1385056","display_name":"External Data Representation","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.289000004529953},{"id":"https://openalex.org/C19527686","wikidata":"https://www.wikidata.org/wiki/Q1665453","display_name":"System integration","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob66857.2025.11257554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7742899662","display_name":null,"funder_award_id":"PE00000004","funder_id":"https://openalex.org/F7311471023","funder_display_name":"NextGenerationEU"}],"funders":[{"id":"https://openalex.org/F7311471023","display_name":"NextGenerationEU","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2516809705","https://openalex.org/W3129046978","https://openalex.org/W3159885303","https://openalex.org/W3191161603","https://openalex.org/W4224282503","https://openalex.org/W4226319939","https://openalex.org/W4285815352","https://openalex.org/W4309545309","https://openalex.org/W4376616730","https://openalex.org/W4387007843","https://openalex.org/W4389978059","https://openalex.org/W4390146777","https://openalex.org/W4392655974","https://openalex.org/W4394712820","https://openalex.org/W4399174693","https://openalex.org/W4400131985","https://openalex.org/W4400728141","https://openalex.org/W4403685098","https://openalex.org/W4403759481","https://openalex.org/W4405080044","https://openalex.org/W4405675931","https://openalex.org/W4406189114","https://openalex.org/W4406949857","https://openalex.org/W4407928679","https://openalex.org/W4408146556","https://openalex.org/W4408781895","https://openalex.org/W4410336663","https://openalex.org/W4410428615","https://openalex.org/W4414054673","https://openalex.org/W7125822645"],"related_works":[],"abstract_inverted_index":{"The":[0,68],"integration":[1],"of":[2,4,30],"Internet":[3],"Things":[5],"(IoT)":[6],"technologies":[7],"in":[8,64,118,123,188],"healthcare":[9,66,163,190],"has":[10,20],"revolutionized":[11],"patient":[12,39],"monitoring":[13],"and":[14,41,82,114,129,139,174,184],"medical":[15,33],"data":[16],"collection,":[17],"but":[18],"it":[19,180],"also":[21],"introduced":[22],"new":[23],"vulnerabilities":[24],"to":[25,37,87,141,195],"cyberattacks.":[26],"Ensuring":[27],"the":[28,79,94,108,197],"security":[29,164],"these":[31],"connected":[32],"devices":[34],"is":[35,199],"essential":[36],"maintain":[38],"safety":[40],"system":[42,122],"reliability.":[43],"In":[44],"this":[45],"study,":[46],"we":[47,131],"propose":[48],"a":[49,57,75,84,119,158],"lightweight":[50],"semi-generative":[51],"deep":[52],"learning":[53],"framework":[54],"based":[55],"on":[56,102,157,202],"Variational":[58],"Autoencoder":[59],"(SG-VAE)":[60],"for":[61,112,186],"detecting":[62],"attacks":[63],"IoT-based":[65,161],"systems.":[67,191],"model":[69,145,169],"compresses":[70],"high-dimensional":[71],"network":[72],"traffic":[73],"into":[74,144],"latent":[76,95],"representation":[77],"using":[78],"VAE":[80],"encoder":[81],"employs":[83],"classification":[85],"head":[86],"detect":[88],"potential":[89],"cyber":[90],"threats":[91],"directly":[92],"from":[93],"space.":[96],"Unlike":[97],"conventional":[98],"generative":[99,109],"models":[100],"focused":[101],"input":[103],"reconstruction,":[104],"our":[105,168],"SG-VAE":[106],"leverages":[107],"structure":[110],"purely":[111],"efficient":[113],"effective":[115,183],"classification,":[116],"resulting":[117],"high-throughput,":[120],"real-time":[121],"resource-constrained":[124],"environments.":[125],"To":[126],"enhance":[127],"transparency":[128],"interpretability,":[130],"integrate":[132],"two":[133],"eXplainable":[134],"AI":[135],"(XAI)":[136],"techniques,":[137],"SHAP":[138],"LIME,":[140],"provide":[142],"insights":[143],"decisions,":[146],"helping":[147],"stakeholders":[148],"understand":[149],"which":[150],"features":[151],"influence":[152],"predictions":[153],"most.":[154],"Experimental":[155],"results":[156],"publicly":[159,200],"available":[160,201],"ICU":[162],"dataset":[165],"demonstrate":[166],"that":[167],"achieves":[170],"near-perfect":[171],"accuracy,":[172],"1.00,":[173],"high":[175],"throughput,":[176],"54,286":[177],"samples/second,":[178],"making":[179],"both":[181],"highly":[182],"practical":[185],"deployment":[187],"real-world":[189],"All":[192],"code":[193],"required":[194],"reproduce":[196],"experiments":[198],"Dropbox":[203],"<sup":[204],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[205],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>1https://rb.gy/5y3kuh.":[206]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-02T00:00:00"}
