{"id":"https://openalex.org/W4411845177","doi":"https://doi.org/10.1186/s13677-025-00762-9","title":"Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model","display_name":"Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W4411845177","doi":"https://doi.org/10.1186/s13677-025-00762-9"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00762-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00762-9","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00762-9","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00762-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061445863","display_name":"Hafiz Gulfam Ahmad Umar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116806","display_name":"Ghazi University","ror":"https://ror.org/023a7t361","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210116806"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Hafiz Gulfam Ahmad Umar","raw_affiliation_strings":["Department of Computer Science and IT, Ghazi University, Dera Ghazi Khan, Punjab, 32200, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and IT, Ghazi University, Dera Ghazi Khan, Punjab, 32200, Pakistan","institution_ids":["https://openalex.org/I4210116806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118738998","display_name":"Iqra Yasmeen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116806","display_name":"Ghazi University","ror":"https://ror.org/023a7t361","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210116806"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Iqra Yasmeen","raw_affiliation_strings":["Department of Computer Science and IT, Ghazi University, Dera Ghazi Khan, Punjab, 32200, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and IT, Ghazi University, Dera Ghazi Khan, Punjab, 32200, Pakistan","institution_ids":["https://openalex.org/I4210116806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013816897","display_name":"Muhammad Aoun","orcid":"https://orcid.org/0009-0005-3147-641X"},"institutions":[{"id":"https://openalex.org/I4210116806","display_name":"Ghazi University","ror":"https://ror.org/023a7t361","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210116806"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Aoun","raw_affiliation_strings":["Department of Computer Science and IT, Ghazi University, Dera Ghazi Khan, Punjab, 32200, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and IT, Ghazi University, Dera Ghazi Khan, Punjab, 32200, Pakistan","institution_ids":["https://openalex.org/I4210116806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002543406","display_name":"Tehseen Mazhar","orcid":"https://orcid.org/0000-0002-4649-2376"},"institutions":[{"id":"https://openalex.org/I4394709246","display_name":"Government of Punjab","ror":"https://ror.org/0262vjy29","country_code":null,"type":"government","lineage":["https://openalex.org/I4394709246"]},{"id":"https://openalex.org/I43729321","display_name":"National College of Business Administration and Economics","ror":"https://ror.org/02my4wj17","country_code":"PK","type":"education","lineage":["https://openalex.org/I43729321"]},{"id":"https://openalex.org/I2800666866","display_name":"Government of Pakistan","ror":"https://ror.org/00pnp4y96","country_code":"PK","type":"government","lineage":["https://openalex.org/I2800666866"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Tehseen Mazhar","raw_affiliation_strings":["Department of Computer Science and Information Technology, School Education Department, Government of Punjab, Layyah, 31200, Pakistan","School of Computer Science, National College of Business Administration and Economics, Lahore, 54000, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, School Education Department, Government of Punjab, Layyah, 31200, Pakistan","institution_ids":["https://openalex.org/I2800666866","https://openalex.org/I4394709246"]},{"raw_affiliation_string":"School of Computer Science, National College of Business Administration and Economics, Lahore, 54000, Pakistan","institution_ids":["https://openalex.org/I43729321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078317952","display_name":"Muhammad Amir Khan","orcid":"https://orcid.org/0000-0003-3669-2080"},"institutions":[{"id":"https://openalex.org/I82724352","display_name":"Universiti Teknologi MARA","ror":"https://ror.org/05n8tts92","country_code":"MY","type":"education","lineage":["https://openalex.org/I82724352"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Muhammad Amir Khan","raw_affiliation_strings":["School of Computing Sciences, Faculty of Computer Science and Mathematics, Universiti Teknologi Mara, Shah Alam, Selangor, 40450, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing Sciences, Faculty of Computer Science and Mathematics, Universiti Teknologi Mara, Shah Alam, Selangor, 40450, Malaysia","institution_ids":["https://openalex.org/I82724352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117554876","display_name":"Ines Hilali Jaghdam","orcid":null},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ines Hilali Jaghdam","raw_affiliation_strings":["Department of Computer Science and Information Technology, Applied College, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, Applied College, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113356113","display_name":"Habib Hamam","orcid":null},"institutions":[{"id":"https://openalex.org/I154799132","display_name":"Universit\u00e9 de Moncton","ror":"https://ror.org/029tnqt29","country_code":"CA","type":"education","lineage":["https://openalex.org/I154799132"]},{"id":"https://openalex.org/I3129570296","display_name":"Omar Bongo University","ror":"https://ror.org/04s4j9e43","country_code":"GA","type":"education","lineage":["https://openalex.org/I3129570296"]},{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210088963"]},{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["CA","GA","SA","ZA"],"is_corresponding":false,"raw_author_name":"Habib Hamam","raw_affiliation_strings":["College of Computer Science and Eng (Invited Prof..), University of Ha\u2019il, Ha\u2019il, 55476, Saudi Arabia","Faculty of Engineering, Uni de Moncton, Moncton, NB E1A3E9, Canada","International Institute of Technology and Management (IITG), Av. Grandes Ecoles, Libreville, BP, 1989, Gabon","School of Electrical Engineering, University of Johannesburg, Johannesburg, 2006, South Africa"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Eng (Invited Prof..), University of Ha\u2019il, Ha\u2019il, 55476, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]},{"raw_affiliation_string":"Faculty of Engineering, Uni de Moncton, Moncton, NB E1A3E9, Canada","institution_ids":["https://openalex.org/I154799132"]},{"raw_affiliation_string":"International Institute of Technology and Management (IITG), Av. Grandes Ecoles, Libreville, BP, 1989, Gabon","institution_ids":["https://openalex.org/I3129570296"]},{"raw_affiliation_string":"School of Electrical Engineering, University of Johannesburg, Johannesburg, 2006, South Africa","institution_ids":["https://openalex.org/I24027795"]}]}],"institutions":[],"countries_distinct_count":6,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5061445863"],"corresponding_institution_ids":["https://openalex.org/I4210116806"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":25.2676,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.99548623,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7255783677101135},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5728210210800171},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5709245800971985},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5571693778038025},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5414848327636719},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.49903392791748047},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.4316728711128235},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3583686351776123},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.05111724138259888}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7255783677101135},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5728210210800171},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5709245800971985},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5571693778038025},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5414848327636719},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.49903392791748047},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.4316728711128235},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3583686351776123},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.05111724138259888},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00762-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00762-9","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00762-9","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4e02f564fbc346e3bdb0cd741372ee34","is_oa":true,"landing_page_url":"https://doaj.org/article/4e02f564fbc346e3bdb0cd741372ee34","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 14, Iss 1, Pp 1-27 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00762-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00762-9","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00762-9","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.7799999713897705,"display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G2070362815","display_name":null,"funder_award_id":"PNURSP2025R845","funder_id":"https://openalex.org/F4320322484","funder_display_name":"Princess Nourah Bint Abdulrahman University"}],"funders":[{"id":"https://openalex.org/F4320322484","display_name":"Princess Nourah Bint Abdulrahman University","ror":"https://ror.org/05b0cyh02"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411845177.pdf","grobid_xml":"https://content.openalex.org/works/W4411845177.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W1970978220","https://openalex.org/W2953448948","https://openalex.org/W3019822238","https://openalex.org/W3135091917","https://openalex.org/W4205205088","https://openalex.org/W4220953822","https://openalex.org/W4283781517","https://openalex.org/W4285166740","https://openalex.org/W4285585166","https://openalex.org/W4312416128","https://openalex.org/W4315782929","https://openalex.org/W4315783002","https://openalex.org/W4318827344","https://openalex.org/W4320004386","https://openalex.org/W4376272283","https://openalex.org/W4376630019","https://openalex.org/W4385274673","https://openalex.org/W4388565318","https://openalex.org/W4388626146","https://openalex.org/W4391147412","https://openalex.org/W4391787571","https://openalex.org/W4391788104","https://openalex.org/W4393191773","https://openalex.org/W4393237050","https://openalex.org/W4393960796","https://openalex.org/W4394579404","https://openalex.org/W4396805831","https://openalex.org/W4397019604","https://openalex.org/W4399042537","https://openalex.org/W4399585212","https://openalex.org/W4399953357","https://openalex.org/W4400270522","https://openalex.org/W4400660594","https://openalex.org/W4400721746","https://openalex.org/W4400799710","https://openalex.org/W4401295443","https://openalex.org/W4401972282","https://openalex.org/W4402486426","https://openalex.org/W4403243966","https://openalex.org/W4403583637","https://openalex.org/W4404126910","https://openalex.org/W4404212170","https://openalex.org/W4404835327","https://openalex.org/W4405187217","https://openalex.org/W4405316589","https://openalex.org/W4406330594","https://openalex.org/W4407052789"],"related_works":["https://openalex.org/W4375867731","https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W3023564924","https://openalex.org/W2942586735"],"abstract_inverted_index":{"The":[0,77,98],"proliferation":[1],"of":[2,5,107,123,136],"the":[3,14,20,134],"Internet":[4],"Things":[6],"(IoT)":[7],"and":[8,24,50,70,86,89,118,150],"edge":[9,41,144],"computing":[10],"technologies":[11],"has":[12],"expanded":[13],"attack":[15],"surface":[16],"for":[17,22,154],"cybercriminals,":[18],"emphasizing":[19],"need":[21],"robust":[23],"efficient":[25],"cybersecurity":[26,152],"measures.":[27],"Intrusion":[28],"detection":[29],"systems":[30],"(IDS)":[31],"are":[32],"essential":[33],"defenses;":[34],"however,":[35],"deploying":[36,137],"traditional":[37],"IDS":[38,58,140],"solutions":[39,153],"on":[40,61,142],"devices":[42],"remains":[43],"challenging":[44],"due":[45],"to":[46,73,82,95,115,147],"limited":[47],"computational,":[48],"memory,":[49],"energy":[51],"resources.":[52],"This":[53],"research":[54],"proposes":[55],"an":[56,120],"energy-efficient":[57,151],"framework":[59],"based":[60],"a":[62,103],"modified":[63],"Deep":[64],"Neural":[65],"Network":[66],"with":[67],"Knowledge":[68],"Distillation":[69],"Quantization":[71],"(DNN-KDQ)":[72],"address":[74],"these":[75],"challenges.":[76],"CICIDS2017":[78],"dataset":[79],"was":[80],"preprocessed":[81],"extract":[83],"energy-centric":[84],"features,":[85],"adaptive":[87],"sampling":[88],"model":[90,101,110],"compression":[91],"techniques":[92],"were":[93],"applied":[94],"optimize":[96],"performance.":[97],"proposed":[99],"DNN-KDQ":[100],"achieves":[102,119],"prediction":[104],"test":[105],"accuracy":[106],"99.43%,":[108],"reduces":[109],"size":[111],"from":[112],"196.77":[113],"KB":[114],"20.18":[116],"KB,":[117],"inference":[121],"time":[122],"0.07":[124],"ms":[125],"per":[126],"sample":[127],"in":[128],"real-time":[129],"scenarios.":[130],"These":[131],"results":[132],"demonstrate":[133],"feasibility":[135],"high-accuracy,":[138],"low-latency":[139],"models":[141],"resource-constrained":[143],"devices,":[145],"contributing":[146],"more":[148],"scalable":[149],"modern":[155],"network":[156],"infrastructures.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":13}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
