{"id":"https://openalex.org/W3155750487","doi":"https://doi.org/10.1155/2021/8814068","title":"Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning","display_name":"Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning","publication_year":2021,"publication_date":"2021-04-21","ids":{"openalex":"https://openalex.org/W3155750487","doi":"https://doi.org/10.1155/2021/8814068","mag":"3155750487"},"language":"en","primary_location":{"id":"doi:10.1155/2021/8814068","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8814068","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/8814068.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/8814068.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101824799","display_name":"Xiang Cheng","orcid":"https://orcid.org/0000-0001-8432-2426"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Cheng","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China","The Second Research Institute of CAAC, Chengdu 610041, China"],"raw_orcid":"https://orcid.org/0000-0001-8432-2426","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"The Second Research Institute of CAAC, Chengdu 610041, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100566162","display_name":"Qian Luo","orcid":"https://orcid.org/0000-0002-1819-6043"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qian Luo","raw_affiliation_strings":["The Second Research Institute of CAAC, Chengdu 610041, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The Second Research Institute of CAAC, Chengdu 610041, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043835037","display_name":"Ye Pan","orcid":"https://orcid.org/0000-0002-1447-6806"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ye Pan","raw_affiliation_strings":["The Second Research Institute of CAAC, Chengdu 610041, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The Second Research Institute of CAAC, Chengdu 610041, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106669836","display_name":"Zitong Li","orcid":"https://orcid.org/0000-0003-0790-5649"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zitong Li","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100744176","display_name":"Jiale Zhang","orcid":"https://orcid.org/0000-0002-2143-5666"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiale Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100443103","display_name":"Bing Chen","orcid":"https://orcid.org/0000-0002-2863-5441"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bing Chen","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China"],"raw_orcid":"https://orcid.org/0000-0002-2863-5441","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 21106, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100443103"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.9598,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.88432791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.904615044593811},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5877009630203247},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5442110300064087},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.50481116771698},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.48894229531288147},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4526611566543579},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.43965524435043335},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38410529494285583},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3332770764827728},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3136652708053589},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2537255883216858}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.904615044593811},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5877009630203247},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5442110300064087},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.50481116771698},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.48894229531288147},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4526611566543579},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.43965524435043335},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38410529494285583},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3332770764827728},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3136652708053589},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2537255883216858},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/8814068","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8814068","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/8814068.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:351a9970d58e4709b76a5439e898894b","is_oa":true,"landing_page_url":"https://doaj.org/article/351a9970d58e4709b76a5439e898894b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/8814068","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/8814068","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/8814068.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2808409033","display_name":null,"funder_award_id":"2019YFB2102000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3155750487.pdf","grobid_xml":"https://content.openalex.org/works/W3155750487.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W29633649","https://openalex.org/W1533945010","https://openalex.org/W1972062587","https://openalex.org/W2018910044","https://openalex.org/W2168231600","https://openalex.org/W2336089435","https://openalex.org/W2408793237","https://openalex.org/W2473418344","https://openalex.org/W2541884796","https://openalex.org/W2606833268","https://openalex.org/W2741097829","https://openalex.org/W2747715470","https://openalex.org/W2758080252","https://openalex.org/W2767079719","https://openalex.org/W2777914285","https://openalex.org/W2786070938","https://openalex.org/W2787260237","https://openalex.org/W2800346278","https://openalex.org/W2818789173","https://openalex.org/W2886253048","https://openalex.org/W2889511488","https://openalex.org/W2892303285","https://openalex.org/W2892859754","https://openalex.org/W2973625556","https://openalex.org/W2981930049","https://openalex.org/W3036493655","https://openalex.org/W3099785009","https://openalex.org/W4205228770","https://openalex.org/W4298221930","https://openalex.org/W4318619660","https://openalex.org/W6684859321","https://openalex.org/W6703623066","https://openalex.org/W6720608135"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W4394895745","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W4386004629","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Driven":[0],"by":[1],"the":[2,11,25,28,47,69,79,97,109,123,127,153,158,168,186,191,197,214],"advancements":[3],"in":[4,104,122,213],"5G-enabled":[5,178],"Internet":[6],"of":[7,27,46,60,71,99,171,196],"Things":[8],"(IoT)":[9],"technologies,":[10],"IoT":[12,31,105,124,159,199,215],"devices":[13],"have":[14],"shown":[15],"an":[16,84],"explosive":[17],"growth":[18],"trend":[19],"with":[20],"massive":[21],"data":[22,148,162],"generated":[23],"at":[24],"edge":[26,179],"network.":[29],"However,":[30],"systems":[32],"exhibit":[33],"inherent":[34],"vulnerability":[35],"for":[36,118],"diverse":[37],"attacks,":[38],"and":[39,184,193,218],"Advanced":[40],"Persistent":[41],"Threat":[42],"(APT)":[43],"is":[44,108],"one":[45],"most":[48],"powerful":[49],"attack":[50],"models":[51],"that":[52,205],"could":[53],"lead":[54],"to":[55,95,112,138,151,157,166,182],"a":[56,114,145,177],"significant":[57],"privacy":[58,172],"leakage":[59],"systems.":[61,106,200],"Moreover,":[62,137],"recent":[63],"detection":[64],"technologies":[65],"can":[66,189,207],"hardly":[67],"meet":[68],"demands":[70],"effective":[72],"security":[73],"defense":[74],"against":[75],"APTs.":[76],"To":[77],"address":[78],"above":[80],"problems,":[81],"we":[82,142],"propose":[83],"APT":[85,101,128,211],"Prediction":[86],"Method":[87],"based":[88],"on":[89],"Differentially":[90],"Private":[91],"Federated":[92],"Learning":[93],"(APTPMFL)":[94],"predict":[96,209],"probability":[98],"subsequent":[100,210],"attacks":[102],"occurring":[103],"It":[107],"first":[110],"time":[111],"apply":[113],"federated":[115],"learning":[116],"mechanism":[117,150],"aggregating":[119],"suspicious":[120],"activities":[121],"systems,":[125],"where":[126],"prediction":[129],"phase":[130],"does":[131],"not":[132],"need":[133],"any":[134],"correlation":[135],"rules.":[136],"achieve":[139,167],"privacy-preserving":[140],"property,":[141],"further":[143],"adopt":[144],"differentially":[146],"private":[147],"perturbation":[149],"add":[152],"Laplacian":[154],"random":[155],"noises":[156],"device":[160],"training":[161],"features,":[163],"so":[164],"as":[165],"maximum":[169],"protection":[170],"data.":[173],"We":[174],"also":[175],"present":[176],"computing-based":[180],"framework":[181],"train":[183],"deploy":[185],"model,":[187],"which":[188],"alleviate":[190],"computing":[192],"communication":[194],"overhead":[195],"typical":[198],"Our":[201],"evaluation":[202],"results":[203],"show":[204],"APTPMFL":[206],"efficiently":[208],"behaviors":[212],"system":[216],"accurately":[217],"efficiently.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
