Intrusion Detection based on Federated Learning: a systematic review

JL Hernandez-Ramos, G Karopoulos… - arXiv preprint arXiv …, 2023 - arxiv.org
The evolution of cybersecurity is undoubtedly associated and intertwined with the
development and improvement of artificial intelligence (AI). As a key tool for realizing more …

Resource allocation and common message selection for task-oriented semantic information transmission with rsma

Y Cheng, D Niyato, H Du, J Kang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Image transmission over wireless communications can be used in a variety of applications,
such as smart cities, surveillance systems, and Metaverse construction. In this paper, we …

Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions

A Khraisat, A Alazab, S Singh, T Jan… - ACM Computing …, 2024 - dl.acm.org
Intrusion Detection Systems (IDS) are essential for securing computer networks by
identifying and mitigating potential threats. However, traditional IDS systems face challenges …

Federated and transfer learning-empowered intrusion detection for IoT applications

Y Otoum, V Chamola, A Nayak - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) can be described as a considerable number of sensors and
physical devices connected to different applications, supported with networking …

Incremental update intrusion detection for industry 5.0 security: A graph attention network-enabled approach

Y Wu, L Nie, X Xiong, B Sadoun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Industry 5.0 (I5) incorporates numerous emerging technologies that enable the
perception, management, interaction, and control of real physical objects. As cyber attacks …

[HTML][HTML] 云边端架构下边缘智能计算关键问题综述: 计算优化与计算卸载

董裕民, 张静, 谢昌佐, 李子扬 - 电子与信息学报, 2024 - jeit.ac.cn
近年来, 随着入网设备数量与数据体量的急剧增加, 以云计算为代表的中心式计算模式的缺点越
来越显露出来. 边缘计算, 即让计算尽量靠近数据源, 以减少数据传输时间和网络延迟 …

Privacy-Preserving Realization of Fuzzy Clustering and Fuzzy Modeling Through Vertical Federated Learning

X Zhu, D Wang, W Pedrycz, Z Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this study, we elaborate on a realization of fuzzy clustering and the construction of fuzzy
rule-based models on the basis of vertically partitioned datasets in a privacy-preserving …

An efficient intrusion detection method based on federated transfer learning and an extreme learning machine with privacy preservation

K Wang, J Li, W Wu - Security and Communication Networks, 2022 - Wiley Online Library
Current network security is becoming increasingly important, and intrusion detection is an
effective method to protect the network from malicious attacks. This study proposes an …

[HTML][HTML] Drift Adaptive Online DDoS Attack Detection Framework for IoT System

YK Beshah, SL Abebe, HM Melaku - Electronics, 2024 - mdpi.com
Internet of Things (IoT) security is becoming important with the growing popularity of IoT
devices and their wide applications. Recent network security reports revealed a sharp …

FTLIoT: A federated transfer learning framework for securing IoT

Y Otoum, SK Yadlapalli, A Nayak - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
The growing number of Internet of Things (IoT) applications and connected devices has
increased the chance for more cyberattacks against those applications and devices and …