{"id":"https://openalex.org/W7147706060","doi":"https://doi.org/10.48550/arxiv.2603.28985","title":"KAN-LSTM: Benchmarking Kolmogorov-Arnold Networks for Cyber Security Threat Detection in IoT Networks","display_name":"KAN-LSTM: Benchmarking Kolmogorov-Arnold Networks for Cyber Security Threat Detection in IoT Networks","publication_year":2026,"publication_date":"2026-03-30","ids":{"openalex":"https://openalex.org/W7147706060","doi":"https://doi.org/10.48550/arxiv.2603.28985"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.28985","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.28985","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.28985","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132681425","display_name":"Mohammed Hassanin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hassanin, Mohammed","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5132681425"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5633000135421753,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5633000135421753,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.08510000258684158,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.04800000041723251,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5906999707221985},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.5322999954223633},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4438999891281128},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.42320001125335693},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.41940000653266907},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3569999933242798},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.33070001006126404}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7591000199317932},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5906999707221985},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.5322999954223633},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4487999975681305},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4438999891281128},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42320001125335693},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40310001373291016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3732999861240387},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3569999933242798},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.33070001006126404},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.3188999891281128},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31850001215934753},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2754000127315521},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.28985","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.28985","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.28985","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.28985","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.4943341910839081,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"By":[0],"utilising":[1],"their":[2],"adaptive":[3,112],"activation":[4,40],"functions,":[5,34],"Kolmogorov-Arnold":[6,46],"Networks":[7],"(KANs)":[8],"can":[9],"be":[10],"applied":[11],"in":[12,102],"a":[13,50,70,132,143],"novel":[14],"way":[15],"for":[16,111],"the":[17,45,94,155,164],"diverse":[18,149],"machine":[19],"learning":[20,167],"tasks,":[21],"including":[22],"cyber":[23,104],"threat":[24],"detection.":[25],"KANs":[26,57,97],"substitute":[27],"conventional":[28],"linear":[29],"weights":[30],"with":[31,69,148],"spline-parametrized":[32],"univariate":[33],"which":[35],"allows":[36],"them":[37],"to":[38,82,141],"learn":[39],"patterns":[41],"dynamically,":[42],"inspired":[43],"by":[44],"representation":[47],"theorem.":[48],"In":[49],"network":[51],"traffic":[52,150],"data,":[53],"we":[54,116,130],"show":[55,154],"that":[56],"perform":[58],"better":[59],"than":[60],"traditional":[61,165],"Multi-Layer":[62],"Perceptrons":[63],"(MLPs),":[64],"yielding":[65],"more":[66],"accurate":[67],"results":[68,153],"significantly":[71],"less":[72],"number":[73],"of":[74,85,96,157],"learnable":[75],"parameters.":[76],"We":[77],"also":[78],"propose":[79],"KAN-LSTM":[80,158],"model":[81],"combine":[83],"advantages":[84],"spatial":[86],"and":[87,106,125,139,159],"temporal":[88],"encoding.":[89],"The":[90,152,169],"suggested":[91],"methodology":[92],"highlights":[93],"potential":[95],"as":[98,127,129],"an":[99],"effective":[100],"tool":[101],"detecting":[103],"threats":[105],"offers":[107],"up":[108],"new":[109,133],"directions":[110],"defensive":[113],"models.":[114,168],"Lastly,":[115],"conducted":[117],"experiments":[118],"on":[119],"three":[120],"main":[121],"dataset,":[122],"UNSW-NB15,":[123],"NSL-KDD,":[124,138],"CICID2017,":[126],"well":[128],"developed":[131],"dataset":[134,147],"combined":[135],"from":[136],"IOT-BOT,":[137],"CICID2017":[140],"present":[142],"stable,":[144],"unbiased,":[145],"large-scale":[146],"patterns.":[151],"superiority":[156],"then":[160],"KAN":[161],"models":[162],"over":[163],"deep":[166],"source":[170],"code":[171],"is":[172],"available":[173],"at":[174],"GitHub":[175],"repository":[176]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
