{"id":"https://openalex.org/W4399144478","doi":"https://doi.org/10.1145/3654823.3654824","title":"An Adaptive Federated Learning Intrusion Detection System Based on Generative Adversarial Networks under the Internet of Things","display_name":"An Adaptive Federated Learning Intrusion Detection System Based on Generative Adversarial Networks under the Internet of Things","publication_year":2024,"publication_date":"2024-03-22","ids":{"openalex":"https://openalex.org/W4399144478","doi":"https://doi.org/10.1145/3654823.3654824"},"language":"en","primary_location":{"id":"doi:10.1145/3654823.3654824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3654823.3654824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030890828","display_name":"Huiqi Zhao","orcid":"https://orcid.org/0000-0002-0856-560X"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huiqi Zhao","raw_affiliation_strings":["College of Intelligent Equipment, Shandong University of Science and Technology, China"],"raw_orcid":"https://orcid.org/0000-0002-0856-560X","affiliations":[{"raw_affiliation_string":"College of Intelligent Equipment, Shandong University of Science and Technology, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035297007","display_name":"Lu Liu","orcid":"https://orcid.org/0009-0002-8083-6379"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Liu","raw_affiliation_strings":["College of Intelligent Equipment, Shandong University of Science and Technology, China"],"raw_orcid":"https://orcid.org/0009-0002-8083-6379","affiliations":[{"raw_affiliation_string":"College of Intelligent Equipment, Shandong University of Science and Technology, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101768935","display_name":"Fang Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fang Fan","raw_affiliation_strings":["College of Intelligent Equipment, Shandong University of Science and Technology, China"],"raw_orcid":"https://orcid.org/0000-0002-8756-2887","affiliations":[{"raw_affiliation_string":"College of Intelligent Equipment, Shandong University of Science and Technology, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055143821","display_name":"Huajie Zhang","orcid":"https://orcid.org/0009-0002-9042-7835"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huajie Zhang","raw_affiliation_strings":["College of Intelligent Equipment, Shandong University of Science and Technology, China"],"raw_orcid":"https://orcid.org/0009-0002-9042-7835","affiliations":[{"raw_affiliation_string":"College of Intelligent Equipment, Shandong University of Science and Technology, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003738443","display_name":"Yaowen Ma","orcid":"https://orcid.org/0009-0005-2460-9077"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaowen Ma","raw_affiliation_strings":["College of Intelligent Equipment, Shandong University of Science and Technology, China"],"raw_orcid":"https://orcid.org/0009-0005-2460-9077","affiliations":[{"raw_affiliation_string":"College of Intelligent Equipment, Shandong University of Science and Technology, China","institution_ids":["https://openalex.org/I80143920"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030890828"],"corresponding_institution_ids":["https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":3.5639,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.93467731,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8013787269592285},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7428746223449707},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6514704823493958},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6207026243209839},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5710488557815552},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4829823076725006},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.464368999004364},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46409860253334045},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4415145218372345},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4389587640762329},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16978922486305237}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8013787269592285},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7428746223449707},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6514704823493958},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6207026243209839},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5710488557815552},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4829823076725006},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.464368999004364},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46409860253334045},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4415145218372345},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4389587640762329},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16978922486305237},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3654823.3654824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3654823.3654824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2981025625","https://openalex.org/W3158675315","https://openalex.org/W3172312230","https://openalex.org/W3190759874","https://openalex.org/W3211494975","https://openalex.org/W4221146344","https://openalex.org/W4313644996"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"With":[0],"the":[1,7,26,106,146,188,194],"rapid":[2],"advancement":[3],"of":[4,9,30,149,190,196],"artificial":[5],"intelligence,":[6],"Internet":[8],"Things":[10],"(IoT),":[11],"and":[12,28,43,135,174,181],"related":[13],"technologies,":[14],"cybersecurity":[15],"concerns":[16],"are":[17],"escalating.":[18],"Reconstruction":[19],"attacks":[20],"pose":[21],"a":[22,55,110,167],"substantial":[23],"threat":[24],"to":[25,48,64,92,153],"privacy":[27,70,81,163],"security":[29,172],"machine":[31,57],"learning":[32,41,58],"models.":[33],"This":[34,176],"paper":[35,177],"explores":[36],"innovative":[37],"approaches,":[38],"specifically":[39],"federated":[40],"(FL)":[42],"generative":[44,126],"adversarial":[45],"networks":[46],"(GAN),":[47],"bolster":[49],"intrusion":[50,117,155,191],"detection":[51,156,192],"capabilities.":[52],"Federated":[53],"learning,":[54],"decentralized":[56,122],"paradigm,":[59],"empowers":[60],"individual":[61],"network":[62,171],"clients":[63],"conduct":[65],"model":[66],"training":[67,97,123],"locally,":[68],"mitigating":[69],"risks":[71],"associated":[72],"with":[73,124],"centralized":[74],"data":[75,80,95,162],"uploads.":[76],"While":[77],"FL":[78,107],"addresses":[79],"concerns,":[82],"it":[83],"falls":[84],"short":[85],"in":[86,133,170,193],"protecting":[87],"against":[88],"reconstruction":[89,137],"attacks\u2014malicious":[90],"attempts":[91],"reconstruct":[93],"sensitive":[94],"from":[96],"models.To":[98],"tackle":[99],"this":[100],"vulnerability,":[101],"we":[102],"integrate":[103],"GAN":[104],"into":[105],"framework,":[108],"presenting":[109],"novel":[111],"method":[112,151,158],"for":[113,186],"IoT":[114],"anomalous":[115],"traffic":[116],"detection.":[118],"By":[119],"combining":[120],"FL's":[121],"GAN's":[125],"capabilities,":[127],"our":[128,150],"approach":[129],"achieves":[130],"heightened":[131],"accuracy":[132],"identifying":[134],"thwarting":[136],"attacks.":[138],"Experimental":[139],"evaluations,":[140],"utilizing":[141],"publicly":[142],"available":[143],"datasets,":[144],"showcase":[145],"superior":[147],"performance":[148],"compared":[152],"traditional":[154],"techniques.Our":[157],"not":[159],"only":[160],"enhances":[161],"but":[164],"also":[165],"introduces":[166],"paradigm":[168],"shift":[169],"research":[173],"applications.":[175],"contributes":[178],"valuable":[179],"insights":[180],"methods,":[182],"opening":[183],"new":[184],"avenues":[185],"advancing":[187],"field":[189],"era":[195],"evolving":[197],"cyber":[198],"threats.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
