{"id":"https://openalex.org/W4388745122","doi":"https://doi.org/10.1155/2023/2956990","title":"Efficient Privacy\u2010Preserving Federated Deep Learning for Network Intrusion of Industrial IoT","display_name":"Efficient Privacy\u2010Preserving Federated Deep Learning for Network Intrusion of Industrial IoT","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4388745122","doi":"https://doi.org/10.1155/2023/2956990"},"language":"en","primary_location":{"id":"doi:10.1155/2023/2956990","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/2956990","pdf_url":"https://downloads.hindawi.com/journals/ijis/2023/2956990.pdf","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/ijis/2023/2956990.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053549667","display_name":"Ningxin He","orcid":"https://orcid.org/0000-0002-2093-5693"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ningxin He","raw_affiliation_strings":["College of Software, Nankai University, Tianjin 300071","College of Software, Nankai University, Tianjin 300071, China"],"affiliations":[{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100662990","display_name":"Zehui Zhang","orcid":"https://orcid.org/0000-0002-2641-4733"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zehui Zhang","raw_affiliation_strings":["China-Austria Belt and Road Joint Laboratory on Artificial Intelligence and Advanced Manufacturing, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou 310018","College of Software, Nankai University, Tianjin 300071","College of Software, Nankai University, Tianjin 300071, China","China-Austria Belt and Road Joint Laboratory on Artificial Intelligence and Advanced Manufacturing, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou 310018, China"],"affiliations":[{"raw_affiliation_string":"China-Austria Belt and Road Joint Laboratory on Artificial Intelligence and Advanced Manufacturing, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou 310018","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"China-Austria Belt and Road Joint Laboratory on Artificial Intelligence and Advanced Manufacturing, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou 310018, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100395727","display_name":"Xiaotian Wang","orcid":"https://orcid.org/0000-0002-6970-2997"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaotian Wang","raw_affiliation_strings":["College of Software, Nankai University, Tianjin 300071","College of Software, Nankai University, Tianjin 300071, China"],"affiliations":[{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043735770","display_name":"Tiegang Gao","orcid":"https://orcid.org/0000-0002-3964-2612"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tiegang Gao","raw_affiliation_strings":["College of Software, Nankai University, Tianjin 300071","College of Software, Nankai University, Tianjin 300071, China"],"affiliations":[{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"College of Software, Nankai University, Tianjin 300071, China","institution_ids":["https://openalex.org/I205237279"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043735770"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":{"value":2500,"currency":"USD","value_usd":2500},"apc_paid":{"value":2500,"currency":"USD","value_usd":2500},"fwci":3.5798,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93462499,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"2023","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8729426860809326},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7091348171234131},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.556879460811615},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5165385603904724},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4686626195907593},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4332141876220703},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4306495487689972},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4198800027370453},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2974502444267273},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2265709936618805}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8729426860809326},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7091348171234131},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.556879460811615},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5165385603904724},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4686626195907593},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4332141876220703},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4306495487689972},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4198800027370453},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2974502444267273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2265709936618805},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1155/2023/2956990","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/2956990","pdf_url":"https://downloads.hindawi.com/journals/ijis/2023/2956990.pdf","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1155/2023/2956990","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/2956990","pdf_url":"https://downloads.hindawi.com/journals/ijis/2023/2956990.pdf","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[{"id":"https://openalex.org/G1624269175","display_name":null,"funder_award_id":"2021YFB0300104","funder_id":"https://openalex.org/F4320329860","funder_display_name":"National Science and Technology Major Project"},{"id":"https://openalex.org/G2630151632","display_name":null,"funder_award_id":"2022BKY013","funder_id":"https://openalex.org/F4320329860","funder_display_name":"National Science and Technology Major Project"},{"id":"https://openalex.org/G4174782991","display_name":null,"funder_award_id":"2022BKY013","funder_id":"https://openalex.org/F4320336754","funder_display_name":"Tianjin Research Innovation Project for Postgraduate Students"},{"id":"https://openalex.org/G4485314317","display_name":null,"funder_award_id":"2022YFE0210700","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5607039506","display_name":null,"funder_award_id":"2022YFE0210700","funder_id":"https://openalex.org/F4320329860","funder_display_name":"National Science and Technology Major Project"}],"funders":[{"id":"https://openalex.org/F4320329860","display_name":"National Science and Technology Major Project","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320336754","display_name":"Tianjin Research Innovation Project for Postgraduate Students","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388745122.pdf"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W2161807639","https://openalex.org/W2751399725","https://openalex.org/W2768174108","https://openalex.org/W2781091734","https://openalex.org/W2946127746","https://openalex.org/W2974429275","https://openalex.org/W2998722477","https://openalex.org/W2998890488","https://openalex.org/W3001675796","https://openalex.org/W3005548505","https://openalex.org/W3007279825","https://openalex.org/W3035254752","https://openalex.org/W3037958117","https://openalex.org/W3044626808","https://openalex.org/W3082551002","https://openalex.org/W3107679180","https://openalex.org/W3127299377","https://openalex.org/W3132199788","https://openalex.org/W3139011613","https://openalex.org/W3155526168","https://openalex.org/W3155771463","https://openalex.org/W3170121482","https://openalex.org/W3171802458","https://openalex.org/W3176725384","https://openalex.org/W3194978182","https://openalex.org/W3195892385","https://openalex.org/W3197507259","https://openalex.org/W3197519965","https://openalex.org/W3202083238","https://openalex.org/W3209492459","https://openalex.org/W3216115166","https://openalex.org/W3216835679","https://openalex.org/W4200261849","https://openalex.org/W4206504654","https://openalex.org/W4210485920","https://openalex.org/W4214529720","https://openalex.org/W4281687445","https://openalex.org/W4283792068","https://openalex.org/W4290714060","https://openalex.org/W4292387448","https://openalex.org/W4293155325","https://openalex.org/W4297990599","https://openalex.org/W4323797442","https://openalex.org/W4385605536"],"related_works":["https://openalex.org/W4311097251","https://openalex.org/W4245926026","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4285201139"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,73,121,205],"systems":[2],"play":[3],"a":[4,71,98,203],"very":[5,198],"important":[6],"role":[7],"in":[8,14],"industrial":[9,20,60,66,213],"Internet":[10,21],"network":[11,34,52],"security.":[12],"However,":[13],"the":[15,39,47,76,85,92,96,108,112,124,135,138,146,152,157,165,172,176,184,194,209,216],"large\u2010scale,":[16],"complex,":[17],"and":[18,29,87,129],"heterogeneous":[19],"of":[22,41,95,212],"Things":[23],"(IoT),":[24],"it":[25],"is":[26,57,81,104,197],"becoming":[27],"more":[28,30],"difficult":[31],"to":[32,38,68,83,106,221],"defend":[33],"intrusion":[35,53,228],"threats":[36],"due":[37],"insufficiency":[40],"high\u2010quality":[42],"attack":[43],"samples.":[44],"To":[45,90],"solve":[46],"problem,":[48],"an":[49],"efficient":[50],"federated":[51,113],"method":[54,80,196,217],"called":[55],"EFedID":[56],"proposed":[58,117,195],"for":[59,200,227],"IoT,":[61],"which":[62],"can":[63,218],"allow":[64],"different":[65],"agents":[67],"collaboratively":[69],"train":[70],"comprehensive":[72],"model.":[74],"Specifically,":[75],"adaptive":[77],"gradient":[78],"sparsification":[79],"introduced":[82],"alleviate":[84],"communication":[86,102],"computation":[88],"overheads.":[89],"protect":[91],"data":[93,210],"privacy":[94],"agents,":[97],"CKKS":[99],"cryptosystem\u2010based":[100],"secure":[101],"protocol":[103],"designed":[105],"encrypt":[107],"model":[109,139,147,158,166,177,185,206],"parameters":[110],"through":[111],"training":[114],"process.":[115],"Our":[116],"system":[118],"demonstrates":[119],"exceptional":[120],"performance":[122],"on":[123,134,171],"NSL\u2010KDD,":[125],"KDD":[126,153],"CUP":[127,154],"99,":[128],"CICIDS":[130,173],"2017":[131,174],"datasets.":[132],"Notably,":[133],"NSL\u2010KDD":[136],"dataset,":[137,156,175],"compression":[140,159,178],"rate":[141,160,179],"reaches":[142,149,161,168],"9":[143],"times":[144,163,182],"while":[145,164,183,207],"accuracy":[148,167,186],"84.31%.":[150],"On":[151],"99":[155],"8.9":[162],"97.3%.":[169],"Lastly,":[170],"reached":[180,187],"6.173":[181],"95.51%.":[188],"The":[189],"experimental":[190],"results":[191],"demonstrate":[192],"that":[193],"suitable":[199],"effectively":[201],"developing":[202],"high\u2010accuracy":[204],"protecting":[208],"information":[211],"agents.":[214],"Furthermore,":[215],"be":[219],"extended":[220],"other":[222],"recent":[223],"deep":[224],"learning":[225],"networks":[226],"detection.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":8}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
