{"id":"https://openalex.org/W7133516743","doi":"https://doi.org/10.3390/fi18030133","title":"Lightweight LSTM-Based Homogeneous Transfer Learning for Efficient On-Device IoT Intrusion Detection","display_name":"Lightweight LSTM-Based Homogeneous Transfer Learning for Efficient On-Device IoT Intrusion Detection","publication_year":2026,"publication_date":"2026-03-04","ids":{"openalex":"https://openalex.org/W7133516743","doi":"https://doi.org/10.3390/fi18030133"},"language":"en","primary_location":{"id":"doi:10.3390/fi18030133","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18030133","pdf_url":"https://www.mdpi.com/1999-5903/18/3/133/pdf?version=1772623666","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/18/3/133/pdf?version=1772623666","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013264971","display_name":"Amjad H. Gamlo","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]},{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Amjad Gamlo","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia","Department of Computer Science, Jamoum University College, Umm Al-Qura University, Makkah 21955, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Department of Computer Science, Jamoum University College, Umm Al-Qura University, Makkah 21955, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048191081","display_name":"Sanaa Sharaf","orcid":"https://orcid.org/0000-0003-0806-1396"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sanaa Sharaf","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045097682","display_name":"Rania Molla","orcid":"https://orcid.org/0000-0002-7574-611X"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Rania Molla","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013264971"],"corresponding_institution_ids":["https://openalex.org/I185163786","https://openalex.org/I199693650"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55587956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"3","first_page":"133","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.843500018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.843500018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0430000014603138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.009800000116229057,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6819999814033508},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6424999833106995},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6353999972343445},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.6258999705314636},{"id":"https://openalex.org/keywords/homogeneous","display_name":"Homogeneous","score":0.5368000268936157},{"id":"https://openalex.org/keywords/disjoint-sets","display_name":"Disjoint sets","score":0.5343000292778015},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4580000042915344},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.4546999931335449}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9115999937057495},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6819999814033508},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6424999833106995},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6353999972343445},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.6258999705314636},{"id":"https://openalex.org/C66882249","wikidata":"https://www.wikidata.org/wiki/Q169336","display_name":"Homogeneous","level":2,"score":0.5368000268936157},{"id":"https://openalex.org/C45340560","wikidata":"https://www.wikidata.org/wiki/Q215382","display_name":"Disjoint sets","level":2,"score":0.5343000292778015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4657999873161316},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4580000042915344},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.4546999931335449},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4275999963283539},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.41510000824928284},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.384799987077713},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3714999854564667},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35120001435279846},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.33009999990463257},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.3249000012874603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3237999975681305},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3018999993801117},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.274399995803833},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C142853389","wikidata":"https://www.wikidata.org/wiki/Q744778","display_name":"Association (psychology)","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2603999972343445}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi18030133","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18030133","pdf_url":"https://www.mdpi.com/1999-5903/18/3/133/pdf?version=1772623666","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d8f8e79532964c2e8c6c8fb413a7f42e","is_oa":true,"landing_page_url":"https://doaj.org/article/d8f8e79532964c2e8c6c8fb413a7f42e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 18, Iss 3, p 133 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi18030133","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18030133","pdf_url":"https://www.mdpi.com/1999-5903/18/3/133/pdf?version=1772623666","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7133516743.pdf","grobid_xml":"https://content.openalex.org/works/W7133516743.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W2099419573","https://openalex.org/W2165698076","https://openalex.org/W2395579298","https://openalex.org/W2888505697","https://openalex.org/W2963748489","https://openalex.org/W2981025625","https://openalex.org/W3041133507","https://openalex.org/W3121022046","https://openalex.org/W3160220648","https://openalex.org/W3200617211","https://openalex.org/W4224331011","https://openalex.org/W4280535971","https://openalex.org/W4280649430","https://openalex.org/W4283738204","https://openalex.org/W4288081073","https://openalex.org/W4309346044","https://openalex.org/W4315630101","https://openalex.org/W4319439792","https://openalex.org/W4388916306","https://openalex.org/W4389764463","https://openalex.org/W4392346328","https://openalex.org/W4395680608","https://openalex.org/W4397004517","https://openalex.org/W4401879778","https://openalex.org/W4408534664","https://openalex.org/W4409455823","https://openalex.org/W4413679697","https://openalex.org/W4414150277"],"related_works":[],"abstract_inverted_index":{"The":[0,64,139],"emergence":[1],"of":[2,5,72,148],"the":[3,73,102,112,115,128],"Internet":[4],"Things":[6],"(IoT)":[7],"has":[8],"introduced":[9],"major":[10],"security":[11],"challenges.":[12],"Deep":[13],"learning":[14],"models":[15],"have":[16],"shown":[17],"strong":[18],"potential":[19],"for":[20,131],"intrusion":[21,49],"detection.":[22],"However,":[23],"they":[24],"often":[25],"require":[26],"large":[27],"datasets":[28],"and":[29,39,59,109,150,173],"high":[30],"computational":[31],"resources.":[32],"In":[33],"contrast,":[34],"IoT":[35,129],"environments":[36],"are":[37],"resource-constrained":[38,137],"lack":[40],"sufficient":[41],"labeled":[42],"data.":[43],"This":[44,93,123],"paper":[45],"proposes":[46],"a":[47,70,77,85,89,145,151],"lightweight":[48,133],"detection":[50,169],"approach":[51],"based":[52],"on":[53,69,84,136],"Long":[54],"Short-Term":[55],"Memory":[56],"(LSTM)":[57],"networks":[58],"homogeneous":[60],"transfer":[61],"deep":[62],"learning.":[63],"model":[65,134,141],"is":[66,81,124],"first":[67],"trained":[68],"subset":[71,87],"BoT-IoT":[74],"dataset":[75],"as":[76],"source":[78],"domain.":[79],"It":[80],"then":[82],"fine-tuned":[83],"disjoint":[86],"containing":[88],"rare":[90,174],"attack":[91,99],"type.":[92],"setup":[94],"represents":[95],"adaptation":[96],"to":[97,126,158],"unseen":[98],"behaviors":[100],"within":[101],"same":[103],"environment.":[104],"By":[105],"freezing":[106],"earlier":[107],"layers":[108],"fine-tuning":[110],"only":[111],"final":[113],"layers,":[114],"method":[116],"reduces":[117],"training":[118,155,159],"overhead":[119],"while":[120],"preserving":[121],"performance.":[122],"important":[125],"meet":[127],"requirement":[130],"frequent,":[132],"updates":[135],"devices.":[138],"proposed":[140],"achieved":[142],"99.9%":[143],"accuracy,":[144],"macro":[146],"F1-score":[147],"0.96,":[149],"47.8%":[152],"reduction":[153],"in":[154],"time":[156],"compared":[157],"from":[160],"scratch.":[161],"Extensive":[162],"experiments":[163],"confirm":[164],"that":[165],"it":[166],"maintains":[167],"balanced":[168],"across":[170],"both":[171],"common":[172],"classes.":[175]},"counts_by_year":[],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2026-03-05T00:00:00"}
