{"id":"https://openalex.org/W7117710891","doi":"https://doi.org/10.1109/wincom65874.2025.11313347","title":"Boosting IoT Intrusion Detection with Hybrid Federated Learning","display_name":"Boosting IoT Intrusion Detection with Hybrid Federated Learning","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W7117710891","doi":"https://doi.org/10.1109/wincom65874.2025.11313347"},"language":null,"primary_location":{"id":"doi:10.1109/wincom65874.2025.11313347","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom65874.2025.11313347","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093315910","display_name":"Salah El Hajla","orcid":"https://orcid.org/0009-0004-0258-8191"},"institutions":[{"id":"https://openalex.org/I4210119856","display_name":"Universit\u00e9 Sultan Moulay Slimane","ror":"https://ror.org/02m8tb249","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210119856"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Salah El Hajla","raw_affiliation_strings":["LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO"],"affiliations":[{"raw_affiliation_string":"LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO","institution_ids":["https://openalex.org/I4210119856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093315911","display_name":"El Mahfoud Ennaji","orcid":"https://orcid.org/0009-0003-3470-6984"},"institutions":[{"id":"https://openalex.org/I4210119856","display_name":"Universit\u00e9 Sultan Moulay Slimane","ror":"https://ror.org/02m8tb249","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210119856"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"El Mahfoud Ennaji","raw_affiliation_strings":["LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO"],"affiliations":[{"raw_affiliation_string":"LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO","institution_ids":["https://openalex.org/I4210119856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014120892","display_name":"Yassine Maleh","orcid":"https://orcid.org/0000-0003-4704-5364"},"institutions":[{"id":"https://openalex.org/I4210119856","display_name":"Universit\u00e9 Sultan Moulay Slimane","ror":"https://ror.org/02m8tb249","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210119856"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Yassine Maleh","raw_affiliation_strings":["LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO"],"affiliations":[{"raw_affiliation_string":"LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO","institution_ids":["https://openalex.org/I4210119856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121671184","display_name":"Soufyane Mounir","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119856","display_name":"Universit\u00e9 Sultan Moulay Slimane","ror":"https://ror.org/02m8tb249","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210119856"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Soufyane Mounir","raw_affiliation_strings":["LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO"],"affiliations":[{"raw_affiliation_string":"LaSTI Laboratory, National School of Applied Sciences, Sultan Moulay Slimane University,khouribga,MOROCCO","institution_ids":["https://openalex.org/I4210119856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093315910"],"corresponding_institution_ids":["https://openalex.org/I4210119856"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.69225558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6233000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6233000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.09799999743700027,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.06790000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7369999885559082},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6901999711990356},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.597100019454956},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.527999997138977},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.4975000023841858},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46790000796318054},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.4595000147819519},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42340001463890076}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8235999941825867},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7369999885559082},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6901999711990356},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.597100019454956},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.527999997138977},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.4975000023841858},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46790000796318054},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.4595000147819519},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42340001463890076},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4214000105857849},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4171000123023987},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4113999903202057},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3978999853134155},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3885999917984009},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38260000944137573},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.33709999918937683},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.29820001125335693},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25440001487731934},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2540000081062317},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom65874.2025.11313347","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom65874.2025.11313347","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2982426954","https://openalex.org/W2994688391","https://openalex.org/W3027870121","https://openalex.org/W3082551002","https://openalex.org/W3118782137","https://openalex.org/W3133886843","https://openalex.org/W3142742079","https://openalex.org/W3195027245","https://openalex.org/W3214299919","https://openalex.org/W4220886040","https://openalex.org/W4309080560","https://openalex.org/W4317038427","https://openalex.org/W4318486183","https://openalex.org/W4323338381","https://openalex.org/W4360979173","https://openalex.org/W4367663330","https://openalex.org/W4376456472","https://openalex.org/W4382468150","https://openalex.org/W4385723714","https://openalex.org/W4386376682","https://openalex.org/W4392110122","https://openalex.org/W4394627330","https://openalex.org/W4399249485","https://openalex.org/W4400205849","https://openalex.org/W4400641081","https://openalex.org/W4401295443","https://openalex.org/W4401648944","https://openalex.org/W4403484479","https://openalex.org/W4403829031","https://openalex.org/W4404743241"],"related_works":[],"abstract_inverted_index":{"IoT":[0],"network":[1],"security":[2],"faces":[3],"dual":[4],"challenges:":[5],"effectively":[6],"detecting":[7],"intrusions":[8],"while":[9,51],"safeguarding":[10],"user":[11],"privacy.":[12],"This":[13,109],"paper":[14],"introduces":[15],"HFEL":[16,58],"(Hybrid":[17],"Federated":[18,43],"Ensemble":[19],"Learning),":[20],"an":[21],"innovative":[22],"approach":[23],"integrating":[24],"tree-based":[25],"algorithms":[26],"with":[27,41],"neural":[28],"networks":[29],"in":[30,66,123],"a":[31,42],"privacy-preserving":[32],"federated":[33,67,103,124],"architecture.":[34],"By":[35],"combining":[36],"Random":[37],"Forest":[38],"and":[39,78,91,105],"XGBoost":[40],"Multi-Layer":[44],"Perceptron,":[45],"our":[46],"framework":[47],"maintains":[48],"data":[49],"locality":[50],"enhancing":[52],"detection":[53,86,126],"capabilities":[54],"through":[55,70],"ensemble":[56,117],"techniques.":[57],"uniquely":[59],"addresses":[60],"the":[61,112],"performance":[62],"initialization":[63],"issues":[64],"common":[65],"learning":[68],"systems":[69],"its":[71],"hybrid":[72],"design.":[73],"Experimental":[74],"validation":[75],"on":[76],"BoT-IoT":[77],"Edge-IIoT":[79],"datasets":[80],"demonstrates":[81],"HFEL's":[82],"exceptional":[83],"performance,":[84],"achieving":[85],"accuracies":[87],"of":[88],"99.94":[89],"%":[90,93],"97.53":[92],"respectively.":[94],"Comparative":[95],"analysis":[96],"reveals":[97],"substantial":[98],"improvements":[99],"over":[100],"both":[101],"traditional":[102],"approaches":[104],"current":[106],"state-of-the-art":[107],"methods.":[108],"research":[110],"advances":[111],"field":[113],"by":[114],"demonstrating":[115],"how":[116],"strategies":[118],"can":[119],"overcome":[120],"key":[121],"limitations":[122],"intrusion":[125],"without":[127],"compromising":[128],"privacy":[129],"constraints.":[130]},"counts_by_year":[],"updated_date":"2026-01-01T23:40:50.289205","created_date":"2025-12-31T00:00:00"}
