{"id":"https://openalex.org/W4309532020","doi":"https://doi.org/10.1109/kse56063.2022.9953788","title":"Deep Models with Differential Privacy for Distributed Web Attack Detection","display_name":"Deep Models with Differential Privacy for Distributed Web Attack Detection","publication_year":2022,"publication_date":"2022-10-19","ids":{"openalex":"https://openalex.org/W4309532020","doi":"https://doi.org/10.1109/kse56063.2022.9953788"},"language":"en","primary_location":{"id":"doi:10.1109/kse56063.2022.9953788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse56063.2022.9953788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002312869","display_name":"Anh-Tu Tran","orcid":"https://orcid.org/0000-0002-8403-865X"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Anh-Tu Tran","raw_affiliation_strings":["Academy of Cryptography Techniques,Hanoi,Vietnam","Academy of Cryptography Techniques, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques,Hanoi,Vietnam","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"Academy of Cryptography Techniques, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039210881","display_name":"The Dung Luong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"The Dung Luong","raw_affiliation_strings":["Academy of Cryptography Techniques,Hanoi,Vietnam","Academy of Cryptography Techniques, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques,Hanoi,Vietnam","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"Academy of Cryptography Techniques, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075155127","display_name":"Xuan Sang Pham","orcid":null},"institutions":[{"id":"https://openalex.org/I94518387","display_name":"Hanoi University of Science and Technology","ror":"https://ror.org/04nyv3z04","country_code":"VN","type":"education","lineage":["https://openalex.org/I94518387"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Xuan Sang Pham","raw_affiliation_strings":["Hanoi University of Science &#x0026; Technology,Hanoi,Vietnam"],"affiliations":[{"raw_affiliation_string":"Hanoi University of Science &#x0026; Technology,Hanoi,Vietnam","institution_ids":["https://openalex.org/I94518387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040487637","display_name":"Thi Luong Tran","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Thi Luong Tran","raw_affiliation_strings":["Academy of Cryptography Techniques,Hanoi,Vietnam","Academy of Cryptography Techniques, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques,Hanoi,Vietnam","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"Academy of Cryptography Techniques, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002312869"],"corresponding_institution_ids":["https://openalex.org/I4210155035"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67500951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8291260004043579},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.752138614654541},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49230873584747314},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42370718717575073},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40639325976371765},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32007408142089844},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1738101840019226}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8291260004043579},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.752138614654541},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49230873584747314},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42370718717575073},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40639325976371765},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32007408142089844},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1738101840019226}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kse56063.2022.9953788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse56063.2022.9953788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320316751","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1991231882","https://openalex.org/W2051267297","https://openalex.org/W2283463896","https://openalex.org/W2294904676","https://openalex.org/W2463456957","https://openalex.org/W2473418344","https://openalex.org/W2535838896","https://openalex.org/W2757528734","https://openalex.org/W2792815878","https://openalex.org/W2793171130","https://openalex.org/W2965568183","https://openalex.org/W2971076825","https://openalex.org/W2979637109","https://openalex.org/W3015447130","https://openalex.org/W3217644914","https://openalex.org/W4205228770","https://openalex.org/W4297687186","https://openalex.org/W6697139857","https://openalex.org/W6719406283"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832"],"abstract_inverted_index":{"The":[0,130,165,182,206],"complexity":[1],"of":[2,24,65,82,145,157,171,202,243],"today\u2019s":[3],"web":[4,30,89,124,150],"applications":[5],"entails":[6],"many":[7],"security":[8],"risks,":[9],"mainly":[10],"targeted":[11],"attacks":[12],"on":[13,35,209],"zero-day":[14],"vulnerabilities.":[15],"New":[16],"attack":[17,125,151],"types":[18],"often":[19,93],"disable":[20],"the":[21,41,73,78,123,134,138,143,146,155,158,169,175,186,200,203,210,217,228,240],"detection":[22,26,126,152,188,218],"capabilities":[23],"intrusion":[25],"systems":[27,47],"(IDS)":[28],"and":[29,51,84,97,110,161,190,235],"application":[31],"firewalls":[32],"(WAFs)":[33],"based":[34],"traditional":[36],"pattern":[37],"matching":[38],"rules.":[39],"Therefore,":[40],"need":[42],"for":[43,122,149],"new":[44],"generation":[45],"WAF":[46],"using":[48],"machine":[49,111],"learning":[50,53,59,109,112,128],"deep":[52,108,127,147],"technologies":[54],"is":[55,92,220,225,236],"urgent":[56],"today.":[57],"Deep":[58],"models":[60,74],"require":[61],"an":[62],"enormous":[63],"amount":[64],"input":[66],"data":[67,91,160],"to":[68,71,77,105,136,141,174,178,227],"be":[69,100],"able":[70],"train":[72,185],"accurately,":[75],"leading":[76],"very":[79],"resource-intensive":[80],"problem":[81],"collecting":[83],"labeling":[85],"data.":[86],"In":[87],"addition,":[88],"request":[90],"sensitive":[94],"or":[95],"private":[96],"should":[98],"not":[99,232],"disclosed,":[101],"imposing":[102],"a":[103,117],"challenge":[104],"develop":[106],"high-accuracy":[107],"models.":[113,247],"This":[114],"paper":[115],"proposes":[116],"privacy-preserving":[118],"distributed":[119],"training":[120,139,193,204],"process":[121,140],"model.":[129],"proposed":[131,166],"model":[132,148,163,167,189,229],"allows":[133],"participants":[135,183],"share":[137,191],"improve":[142],"accuracy":[144,219,242],"while":[153],"preserving":[154],"privacy":[156,201,234],"local":[159,162,187,246],"parameters.":[164],"uses":[168],"technique":[170],"adding":[172],"noise":[173,197],"shared":[176],"parameter":[177],"ensure":[179],"differential":[180],"privacy.":[181],"will":[184],"intermediate":[192],"parameters":[194],"with":[195],"some":[196],"that":[198,216,230],"increases":[199],"process.":[205],"results":[207],"evaluated":[208],"CSIC":[211],"2010":[212],"benchmark":[213],"dataset":[214],"show":[215],"more":[221],"than":[222,239],"98%,":[223],"which":[224],"close":[226],"does":[231],"guarantee":[233],"much":[237],"higher":[238],"maximum":[241],"all":[244],"non-data-sharing":[245]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
