{"id":"https://openalex.org/W4396758721","doi":"https://doi.org/10.1145/3589334.3645457","title":"Divide, Conquer, and Coalesce: Meta Parallel Graph Neural Network for IoT Intrusion Detection at Scale","display_name":"Divide, Conquer, and Coalesce: Meta Parallel Graph Neural Network for IoT Intrusion Detection at Scale","publication_year":2024,"publication_date":"2024-05-08","ids":{"openalex":"https://openalex.org/W4396758721","doi":"https://doi.org/10.1145/3589334.3645457"},"language":"en","primary_location":{"id":"doi:10.1145/3589334.3645457","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3589334.3645457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2024","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020974859","display_name":"Hua Ding","orcid":"https://orcid.org/0009-0006-7845-4995"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Ding","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085364987","display_name":"Lixing Chen","orcid":"https://orcid.org/0000-0002-1805-0183"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixing Chen","raw_affiliation_strings":["Institute of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100673372","display_name":"Shenghong Li","orcid":"https://orcid.org/0000-0002-0767-2307"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenghong Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039309279","display_name":"Yang Bai","orcid":"https://orcid.org/0000-0002-1037-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Bai","raw_affiliation_strings":["Department of Automation, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100693197","display_name":"Pan Zhou","orcid":"https://orcid.org/0000-0002-8629-4622"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pan Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010329792","display_name":"Zhe Qu","orcid":"https://orcid.org/0000-0003-2211-2137"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Qu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5020974859"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":2.8383,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90858863,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1656","last_page":"1667"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7917670011520386},{"id":"https://openalex.org/keywords/divide-and-conquer-algorithms","display_name":"Divide and conquer algorithms","score":0.6303345561027527},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5639870762825012},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5163322687149048},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4453830122947693},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.43423449993133545},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34246331453323364},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31581366062164307},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1344623565673828},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10324054956436157}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7917670011520386},{"id":"https://openalex.org/C71559656","wikidata":"https://www.wikidata.org/wiki/Q671298","display_name":"Divide and conquer algorithms","level":2,"score":0.6303345561027527},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5639870762825012},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5163322687149048},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4453830122947693},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.43423449993133545},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34246331453323364},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31581366062164307},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1344623565673828},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10324054956436157},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3589334.3645457","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3589334.3645457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Web Conference 2024","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W40890042","https://openalex.org/W41554520","https://openalex.org/W1489146973","https://openalex.org/W1969085745","https://openalex.org/W1996058270","https://openalex.org/W2005906639","https://openalex.org/W2026609766","https://openalex.org/W2047940964","https://openalex.org/W2131681506","https://openalex.org/W2604272474","https://openalex.org/W2783190965","https://openalex.org/W2811266402","https://openalex.org/W2905130735","https://openalex.org/W2928675906","https://openalex.org/W3021740526","https://openalex.org/W3086419524","https://openalex.org/W3099104041","https://openalex.org/W3099768174","https://openalex.org/W3109376429","https://openalex.org/W3166900126","https://openalex.org/W3185153723","https://openalex.org/W3196585642","https://openalex.org/W4293812121","https://openalex.org/W4313378981","https://openalex.org/W4360604161"],"related_works":["https://openalex.org/W2352794675","https://openalex.org/W1539994214","https://openalex.org/W2051228988","https://openalex.org/W4247094814","https://openalex.org/W108531593","https://openalex.org/W2111712077","https://openalex.org/W8810113","https://openalex.org/W2158636562","https://openalex.org/W2162911572","https://openalex.org/W2019464130"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"Meta":[3],"Parallel":[4],"Graph":[5],"Neural":[6],"Network":[7,13],"(MPGNN)":[8],"to":[9,30,83,107,139,149,192,214],"establish":[10,140],"a":[11,27,42,51,58,85],"scalable":[12],"Intrusion":[14],"Detection":[15],"System":[16],"(NIDS)":[17],"for":[18,49,125,153,187],"large-scale":[19],"Internet":[20],"of":[21,34,39,66,100,112,170,201],"Things":[22],"(IoT)":[23],"networks.":[24,132],"MPGNN":[25,40,136,159,196],"leverages":[26],"meta-learning":[28],"framework":[29],"optimize":[31],"the":[32,62,109,123,154,168,180,188,193,198],"parallelism":[33],"GNN-based":[35],"NIDS.":[36,216],"The":[37,164],"core":[38],"is":[41],"coalition":[43,86,116],"formation":[44,87,117],"policy":[45,88],"that":[46,60,89],"generates":[47],"meta-knowledge":[48],"partitioning":[50],"massive":[52],"graph":[53],"into":[54],"multiple":[55],"coalitions/subgraphs":[56],"in":[57,176],"way":[59],"maximizes":[61],"performance":[63,212],"and":[64,97,115,185,205],"efficiency":[65],"parallel":[67],"coalitional":[68,101,141],"NIDSs.":[69,102],"We":[70,157],"propose":[71],"an":[72,209],"offline":[73,120],"reinforcement":[74],"learning":[75],"algorithm,":[76],"called":[77],"Graph-Embedded":[78],"Adversarially":[79],"Trained":[80],"Actor-Critic":[81],"(G-ATAC),":[82],"learn":[84],"jointly":[90],"optimizes":[91],"intrusion":[92,151,210],"detection":[93,152,211],"accuracy,":[94],"communication":[95],"overheads,":[96],"computational":[98],"complexities":[99],"In":[103],"particular,":[104],"G-ATAC":[105],"learns":[106],"capture":[108],"temporal":[110],"dependencies":[111],"network":[113],"states":[114],"decisions":[118],"over":[119],"data,":[121],"eliminating":[122],"need":[124],"expensive":[126],"online":[127],"interactions":[128],"with":[129,173],"large":[130],"IoT":[131],"Given":[133],"generated":[134],"coalitions,":[135],"employs":[137],"E-GraphSAGE":[138],"NIDSs":[142],"which":[143],"then":[144],"collaborate":[145],"via":[146],"ensemble":[147],"prediction":[148],"accomplish":[150],"entire":[155],"network.":[156],"evaluate":[158],"on":[160],"two":[161],"real-world":[162],"datasets.":[163,190],"experimental":[165],"results":[166],"demonstrate":[167],"superiority":[169],"our":[171],"method":[172],"substantial":[174],"improvements":[175],"F1":[177],"score,":[178],"surpassing":[179],"state-of-the-art":[181],"methods":[182],"by":[183,203],"0.38":[184],"0.29":[186],"respective":[189],"Compared":[191],"centralized":[194,215],"NIDS,":[195],"reduces":[197],"training":[199],"time":[200],"NIDS":[202],"41.63%":[204],"22.11%,":[206],"while":[207],"maintaining":[208],"comparable":[213]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
