{"id":"https://openalex.org/W4411580992","doi":"https://doi.org/10.3390/fi17070279","title":"An Optimized Transformer\u2013GAN\u2013AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets","display_name":"An Optimized Transformer\u2013GAN\u2013AE for Intrusion Detection in Edge and IIoT Systems: Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets","publication_year":2025,"publication_date":"2025-06-24","ids":{"openalex":"https://openalex.org/W4411580992","doi":"https://doi.org/10.3390/fi17070279"},"language":"en","primary_location":{"id":"doi:10.3390/fi17070279","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17070279","pdf_url":"https://www.mdpi.com/1999-5903/17/7/279/pdf?version=1750771018","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/17/7/279/pdf?version=1750771018","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115020863","display_name":"Ahmad Salehiyan","orcid":"https://orcid.org/0009-0009-2877-8715"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"education","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmad Salehiyan","raw_affiliation_strings":["School of Industrial Engineering and Management, Oklahoma State University, Stillwater, OK 74078, USA"],"affiliations":[{"raw_affiliation_string":"School of Industrial Engineering and Management, Oklahoma State University, Stillwater, OK 74078, USA","institution_ids":["https://openalex.org/I115475287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047381545","display_name":"Pardis Sadatian Moghaddam","orcid":null},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pardis Sadatian Moghaddam","raw_affiliation_strings":["Department of Computer Science, Georgia State University, Atlanta, GA 30302, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Georgia State University, Atlanta, GA 30302, USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050443046","display_name":"Masoud Kaveh","orcid":"https://orcid.org/0000-0003-0752-8054"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Masoud Kaveh","raw_affiliation_strings":["Department of Information and Communication Engineering, Aalto University, 02150 Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Aalto University, 02150 Espoo, Finland","institution_ids":["https://openalex.org/I9927081"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050443046"],"corresponding_institution_ids":["https://openalex.org/I9927081"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":13.9463,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.98767528,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"17","issue":"7","first_page":"279","last_page":"279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9526000022888184,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7157483100891113},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.6017793416976929},{"id":"https://openalex.org/keywords/ton","display_name":"Ton","score":0.5391625761985779},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4416297376155853},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.36982327699661255},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.2234565019607544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2192521095275879},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.09025228023529053},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08255055546760559}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7157483100891113},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.6017793416976929},{"id":"https://openalex.org/C161542896","wikidata":"https://www.wikidata.org/wiki/Q11247037","display_name":"Ton","level":2,"score":0.5391625761985779},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4416297376155853},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.36982327699661255},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.2234565019607544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2192521095275879},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.09025228023529053},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08255055546760559},{"id":"https://openalex.org/C505870484","wikidata":"https://www.wikidata.org/wiki/Q180538","display_name":"Fishery","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi17070279","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17070279","pdf_url":"https://www.mdpi.com/1999-5903/17/7/279/pdf?version=1750771018","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:25befaafe55040feb7861d9705d4d6a6","is_oa":true,"landing_page_url":"https://doaj.org/article/25befaafe55040feb7861d9705d4d6a6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 7, p 279 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi17070279","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17070279","pdf_url":"https://www.mdpi.com/1999-5903/17/7/279/pdf?version=1750771018","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411580992.pdf","grobid_xml":"https://content.openalex.org/works/W4411580992.grobid-xml"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W2770808765","https://openalex.org/W2903294440","https://openalex.org/W2964036258","https://openalex.org/W3007040893","https://openalex.org/W3011575542","https://openalex.org/W3135091917","https://openalex.org/W3200617211","https://openalex.org/W3202603325","https://openalex.org/W3217551214","https://openalex.org/W4283640384","https://openalex.org/W4285402398","https://openalex.org/W4298080197","https://openalex.org/W4315881642","https://openalex.org/W4366133297","https://openalex.org/W4376456879","https://openalex.org/W4383503188","https://openalex.org/W4387503455","https://openalex.org/W4388761197","https://openalex.org/W4388980202","https://openalex.org/W4389252750","https://openalex.org/W4389954369","https://openalex.org/W4390938816","https://openalex.org/W4392151820","https://openalex.org/W4392518990","https://openalex.org/W4392760999","https://openalex.org/W4392935232","https://openalex.org/W4393115034","https://openalex.org/W4394002394","https://openalex.org/W4394685829","https://openalex.org/W4399154845","https://openalex.org/W4400449292","https://openalex.org/W4401675889","https://openalex.org/W4401943068","https://openalex.org/W4403035889","https://openalex.org/W4403589123","https://openalex.org/W4403635786","https://openalex.org/W4404066626","https://openalex.org/W4404132861","https://openalex.org/W4404469627","https://openalex.org/W4404728188","https://openalex.org/W4404821554","https://openalex.org/W4405092132","https://openalex.org/W4406135379","https://openalex.org/W4406559846","https://openalex.org/W4407948968","https://openalex.org/W4408108008","https://openalex.org/W4408793049","https://openalex.org/W4409089716","https://openalex.org/W4410152950","https://openalex.org/W4410438749","https://openalex.org/W6782008193","https://openalex.org/W6875803676"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3217342923","https://openalex.org/W2612911959","https://openalex.org/W2313595785","https://openalex.org/W4245239846","https://openalex.org/W2233307916","https://openalex.org/W2225054727","https://openalex.org/W2049000206"],"abstract_inverted_index":{"The":[0,159,257,292],"rapid":[1],"expansion":[2],"of":[3,8,18,141,248,259],"Edge":[4,131,308],"and":[5,16,26,46,63,83,94,98,118,132,139,156,167,173,219,230,254,264,278,300,309],"Industrial":[6],"Internet":[7],"Things":[9],"(IIoT)":[10],"systems":[11],"has":[12],"intensified":[13],"the":[14,32,59,137,142,191,236,272,279,283],"risk":[15],"complexity":[17],"cyberattacks.":[19],"Detecting":[20],"advanced":[21],"intrusions":[22],"in":[23,130],"these":[24],"heterogeneous":[25],"high-dimensional":[27],"environments":[28],"remains":[29],"challenging.":[30],"As":[31],"IIoT":[33,133,181,310],"becomes":[34],"integral":[35],"to":[36,43,90,123,189,195],"critical":[37],"infrastructure,":[38],"ensuring":[39],"security":[40],"is":[41,162],"crucial":[42],"prevent":[44],"disruptions":[45],"data":[47,96],"breaches.":[48],"Traditional":[49],"IDS":[50],"approaches":[51],"often":[52,78],"fall":[53],"short":[54],"against":[55],"evolving":[56],"threats,":[57],"highlighting":[58],"need":[60],"for":[61,73,126,153,180,274,281,306],"intelligent":[62],"adaptive":[64],"solutions.":[65],"While":[66],"deep":[67,206],"learning":[68],"(DL)":[69],"offers":[70],"strong":[71],"capabilities":[72],"pattern":[74],"recognition,":[75],"single-model":[76],"architectures":[77],"lack":[79],"robustness.":[80],"Thus,":[81],"hybrid":[82,107,284],"optimized":[84,106,294],"DL":[85,108],"models":[86],"are":[87,187],"increasingly":[88],"necessary":[89],"improve":[91],"detection":[92,129,183],"performance":[93,193],"address":[95],"imbalance":[97],"noise.":[99],"In":[100],"this":[101],"study,":[102],"we":[103,145],"propose":[104],"an":[105,147],"framework":[109,239],"that":[110,235],"combines":[111],"a":[112,245,303],"transformer,":[113],"generative":[114],"adversarial":[115],"network":[116,204,208],"(GAN),":[117],"autoencoder":[119],"(AE)":[120],"components,":[121],"referred":[122],"as":[124,177],"Transformer\u2013GAN\u2013AE,":[125],"robust":[127],"intrusion":[128,182,290,311],"environments.":[134],"To":[135],"enhance":[136],"training":[138,266],"convergence":[140],"GAN":[143,262],"component,":[144],"integrate":[146],"improved":[148],"chimp":[149],"optimization":[150],"algorithm":[151],"(IChOA)":[152],"hyperparameter":[154],"tuning":[155],"feature":[157,276],"refinement.":[158],"proposed":[160,237,293],"method":[161],"evaluated":[163],"using":[164],"three":[165],"recent":[166],"comprehensive":[168],"benchmark":[169],"datasets,":[170],"WUSTL-IIoT-2021,":[171],"EdgeIIoTset,":[172],"TON_IoT,":[174],"widely":[175],"recognized":[176],"standard":[178,200],"testbeds":[179],"research.":[184],"Extensive":[185],"experiments":[186],"conducted":[188],"assess":[190],"model\u2019s":[192],"compared":[194],"several":[196],"state-of-the-art":[197],"techniques,":[198],"including":[199],"GAN,":[201],"convolutional":[202],"neural":[203],"(CNN),":[205],"belief":[207],"(DBN),":[209],"time-series":[210],"transformer":[211,273],"(TST),":[212],"bidirectional":[213],"encoder":[214],"representations":[215],"from":[216],"transformers":[217],"(BERT),":[218],"extreme":[220],"gradient":[221],"boosting":[222],"(XGBoost).":[223],"Evaluation":[224],"metrics":[225],"include":[226],"accuracy,":[227],"recall,":[228],"AUC,":[229],"run":[231],"time.":[232],"Results":[233],"demonstrate":[234],"Transformer\u2013GAN\u2013AE":[238,295],"outperforms":[240],"all":[241],"baseline":[242],"methods,":[243],"achieving":[244],"best":[246],"accuracy":[247,299],"98.92%,":[249],"along":[250],"with":[251,271],"superior":[252],"recall":[253],"AUC":[255],"values.":[256],"integration":[258],"IChOA":[260],"enhances":[261],"stability":[263],"accelerates":[265],"by":[267],"optimizing":[268],"hyperparameters.":[269],"Together":[270],"temporal":[275],"extraction":[277],"AE":[280],"denoising,":[282],"architecture":[285],"effectively":[286],"addresses":[287],"complex,":[288],"imbalanced":[289],"data.":[291],"model":[296],"demonstrates":[297],"high":[298],"robustness,":[301],"offering":[302],"scalable":[304],"solution":[305],"real-world":[307],"detection.":[312]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
