{"id":"https://openalex.org/W4400977089","doi":"https://doi.org/10.1145/3664476.3670466","title":"FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection","display_name":"FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400977089","doi":"https://doi.org/10.1145/3664476.3670466"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670466","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670466","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105111584","display_name":"Atmane Ayoub Mansour Bahar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210149016","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique","ror":"https://ror.org/04dj1dn66","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210149016"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Atmane Ayoub Mansour Bahar","raw_affiliation_strings":["\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria","institution_ids":["https://openalex.org/I4210149016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105111585","display_name":"Kamel Soa\u00efd Ferrahi","orcid":"https://orcid.org/0009-0000-3146-5503"},"institutions":[{"id":"https://openalex.org/I4210149016","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique","ror":"https://ror.org/04dj1dn66","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210149016"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Kamel Soa\u00efd Ferrahi","raw_affiliation_strings":["\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria","institution_ids":["https://openalex.org/I4210149016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035000065","display_name":"Mohamed\u2010Lamine Messai","orcid":"https://orcid.org/0000-0003-0376-0657"},"institutions":[{"id":"https://openalex.org/I100532134","display_name":"Universit\u00e9 Claude Bernard Lyon 1","ror":"https://ror.org/029brtt94","country_code":"FR","type":"education","lineage":["https://openalex.org/I100532134","https://openalex.org/I203339264"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohamed-Lamine Messai","raw_affiliation_strings":["ERIC, University Lyon 2, France"],"affiliations":[{"raw_affiliation_string":"ERIC, University Lyon 2, France","institution_ids":["https://openalex.org/I100532134"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005723915","display_name":"Hamida Seba","orcid":"https://orcid.org/0000-0003-0670-815X"},"institutions":[{"id":"https://openalex.org/I100532134","display_name":"Universit\u00e9 Claude Bernard Lyon 1","ror":"https://ror.org/029brtt94","country_code":"FR","type":"education","lineage":["https://openalex.org/I100532134","https://openalex.org/I203339264"]},{"id":"https://openalex.org/I4210137744","display_name":"LabEx PERSYVAL-Lab","ror":"https://ror.org/03eqm6y13","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I2738703131","https://openalex.org/I4210137744","https://openalex.org/I4210139971","https://openalex.org/I4210150872","https://openalex.org/I899635006","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I4210155607","display_name":"Laboratoire d'Informatique en Images et Syst\u00e8mes d'Information","ror":"https://ror.org/04dv4he91","country_code":"FR","type":"facility","lineage":["https://openalex.org/I100532134","https://openalex.org/I112936343","https://openalex.org/I1294671590","https://openalex.org/I188626449","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I4210155607","https://openalex.org/I48430043"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Hamida Seba","raw_affiliation_strings":["LIRIS, University Lyon 1, France","GOAL - Graphes, AlgOrithmes et AppLications (France)"],"affiliations":[{"raw_affiliation_string":"LIRIS, University Lyon 1, France","institution_ids":["https://openalex.org/I4210155607","https://openalex.org/I100532134"]},{"raw_affiliation_string":"GOAL - Graphes, AlgOrithmes et AppLications (France)","institution_ids":["https://openalex.org/I4210137744"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105111586","display_name":"Karima Amrouche","orcid":"https://orcid.org/0009-0009-2410-2582"},"institutions":[{"id":"https://openalex.org/I4210149016","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique","ror":"https://ror.org/04dj1dn66","country_code":"DZ","type":"education","lineage":["https://openalex.org/I4210149016"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Karima Amrouche","raw_affiliation_strings":["\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Nationale Sup\u00e9rieure d'Informatique, Algeria","institution_ids":["https://openalex.org/I4210149016"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5105111584"],"corresponding_institution_ids":["https://openalex.org/I4210149016"],"apc_list":null,"apc_paid":null,"fwci":1.745,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85501198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12535","display_name":"Machine Learning and Data Classification","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7970807552337646},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5294263958930969},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5108439326286316},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38048872351646423},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32564663887023926},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32465827465057373},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3212805390357971}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7970807552337646},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5294263958930969},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5108439326286316},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38048872351646423},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32564663887023926},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32465827465057373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3212805390357971}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3664476.3670466","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670466","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-04688912v1","is_oa":false,"landing_page_url":"https://hal.science/hal-04688912","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security (GRASEC Workshop), Jul 2024, Vienna Austria, France. pp.1-10, &#x27E8;10.1145/3664476.3670466&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W139044672","https://openalex.org/W353413754","https://openalex.org/W1952056635","https://openalex.org/W2088252378","https://openalex.org/W2141854027","https://openalex.org/W2284900416","https://openalex.org/W2981873476","https://openalex.org/W2986944522","https://openalex.org/W3126165507","https://openalex.org/W3181603331","https://openalex.org/W3212868562","https://openalex.org/W4220692398","https://openalex.org/W4241433670","https://openalex.org/W4285414182","https://openalex.org/W4308732208","https://openalex.org/W4382318655","https://openalex.org/W4384558962","https://openalex.org/W4388731191"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W4205163163"],"abstract_inverted_index":{"Intrusion":[0,97],"Detection":[1,98],"Systems":[2],"(IDS)":[3],"play":[4],"a":[5],"crucial":[6],"role":[7],"in":[8,23,52,149],"safeguarding":[9],"systems":[10],"and":[11,38,78,132],"networks":[12],"from":[13,128],"different":[14],"types":[15],"of":[16,47,95,107],"attacks.":[17],"However,":[18,64],"IDSes":[19,157],"face":[20],"significant":[21],"hurdles":[22],"detecting":[24],"Advanced":[25],"Persistent":[26],"Threats":[27],"(APTs),":[28],"which":[29],"are":[30],"sophisticated":[31],"cyber-attacks":[32],"characterised":[33],"by":[34],"their":[35,56,73],"stealth,":[36],"duration,":[37],"advanced":[39],"techniques.":[40],"Recent":[41],"research":[42],"has":[43],"explored":[44],"the":[45,93,108,116,119,130],"effectiveness":[46],"Graph":[48],"Neural":[49],"Networks":[50],"(GNNs)":[51],"APT":[53],"detection,":[54],"leveraging":[55],"ability":[57],"to":[58,75,83,111,115,154],"analyse":[59],"intricate-relationships":[60],"within":[61],"graph":[62],"data.":[63],"existing":[65],"approaches":[66],"often":[67],"rely":[68],"on":[69,143],"local":[70],"models,":[71],"limiting":[72],"adaptability":[74],"evolving":[76],"APT-tactics":[77],"raising":[79],"privacy-concerns.":[80],"In":[81],"response":[82],"these":[84],"challenges,":[85],"this":[86],"paper":[87],"proposes":[88],"integrating":[89],"Federated-Learning":[90],"(FL)":[91],"into":[92],"architectures":[94],"GNN-based":[96],"Systems.":[99],"Moreover,":[100],"our":[101,141],"solution":[102,123],"includes":[103],"an":[104],"enhanced":[105],"encryption-system":[106],"clients\u2019":[109],"weights":[110,131],"safely":[112],"send":[113],"them":[114],"server":[117],"through":[118],"system\u2019s":[120],"network.":[121],"This":[122],"prevents":[124],"man-in-the-middle":[125],"(MitM)":[126],"attacks":[127],"intercepting":[129],"reconstructing":[133],"clients":[134],"data":[135],"using":[136],"reverse":[137],"engineering.":[138],"We":[139],"evaluate":[140],"approach":[142],"several":[144],"datasets,":[145],"demonstrating":[146],"promising":[147],"results":[148],"reducing":[150],"false-positive":[151],"rates":[152],"compared":[153],"state-of-the-art":[155],"Provenance-based":[156],"(PIDS).":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2024-07-26T00:00:00"}
