{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:52:49Z","timestamp":1764071569040,"version":"3.45.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05597-2","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:56:36Z","timestamp":1760032596000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A knowledge distillation-based lightweight intrusion detection method for the Internet of Things"],"prefix":"10.1007","volume":"28","author":[{"given":"Xin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhendong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Shuxin","sequence":"additional","affiliation":[]},{"given":"Li","family":"Dahai","sequence":"additional","affiliation":[]},{"given":"Sammy","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"issue":"3","key":"5597_CR1","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/COMST.2021.3078433","volume":"23","author":"M Centenaro","year":"2021","unstructured":"Centenaro, M., et al.: A survey on technologies, standards and open challenges in satellite IoT. IEEE Communications Surveys & Tutorials 23(3), 1693\u20131720 (2021)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"12","key":"5597_CR2","doi-asserted-by":"publisher","first-page":"3878","DOI":"10.1109\/JSAC.2023.3322841","volume":"41","author":"H Lu","year":"2023","unstructured":"Lu, H., et al., Fl-amm: Federated learning augmented map matching with heterogeneous cellular moving trajectories. IEEE Journal on Selected Areas in Communications, 41(12), 3878\u20133892 (2023)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"5597_CR3","unstructured":"Solon, O.: Team of hackers take remote control of Tesla Model S from 12 miles away. The Guardian, 20\u00a0(2016)"},{"key":"5597_CR4","doi-asserted-by":"crossref","unstructured":"Hnamte, V., Hussain, J.: DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telematics and Informatics Reports 10,(2023)","DOI":"10.1016\/j.teler.2023.100053"},{"key":"5597_CR5","doi-asserted-by":"crossref","unstructured":"Belhadi, A., et al., Group intrusion detection in the Internet of Things using a hybrid recurrent neural network. Cluster Computing, 26(2), 1147\u20131158 (2023)","DOI":"10.1007\/s10586-022-03779-w"},{"key":"5597_CR6","doi-asserted-by":"crossref","unstructured":"Hnamte, V., Hussain, J.: Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach. Telematics and Informatics Reports 11,(2023)","DOI":"10.1016\/j.teler.2023.100077"},{"issue":"2","key":"5597_CR7","doi-asserted-by":"publisher","first-page":"188","DOI":"10.23919\/JCC.ja.2022-0758","volume":"22","author":"D Zaihui","year":"2025","unstructured":"Zaihui, D., et al.: An effective intrusion detection system based on the FSA-BGRU hybrid model. China Communications 22(2), 188\u2013198 (2025)","journal-title":"China Communications"},{"key":"5597_CR8","doi-asserted-by":"crossref","unstructured":"Luo, J. H., Wu, J., Lin, W.: Thinet: A filter level pruning method for deep neural network compression. In Proceedings of the IEEE international conference on computer vision, 5058-5066 (2017)","DOI":"10.1109\/ICCV.2017.541"},{"key":"5597_CR9","doi-asserted-by":"crossref","unstructured":"Jacob, B., et al.: Quantization and training of neural networks for efficient integer-arithmetic-only inference. in Proceedings of the IEEE conference on computer vision and pattern recognition. (2018)","DOI":"10.1109\/CVPR.2018.00286"},{"key":"5597_CR10","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531, (2015)"},{"key":"5597_CR11","unstructured":"Wang, L., et al.: Deploying Intrusion Detection on In-Vehicle Networks: Challenges and Opportunities. IEEE Network (2024)"},{"key":"5597_CR12","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Computer Science 89, 213\u2013217 (2016)","journal-title":"Procedia Computer Science"},{"key":"5597_CR13","doi-asserted-by":"crossref","unstructured":"Sahu, S., Mehtre, B. M.: Network intrusion detection system using J48 Decision Tree. In\u00a02015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE. 2023-2023 (2015)","DOI":"10.1109\/ICACCI.2015.7275914"},{"issue":"1","key":"5597_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0167-7012(00)00201-3","volume":"43","author":"IA Basheer","year":"2000","unstructured":"Basheer, I.A., Hajmeer, M.: Artificial neural networks: fundamentals, computing, design, and application. Journal of microbiological methods 43(1), 3\u201331 (2000)","journal-title":"Journal of microbiological methods"},{"key":"5597_CR15","doi-asserted-by":"publisher","first-page":"138432","DOI":"10.1109\/ACCESS.2021.3118573","volume":"9","author":"T Wisanwanichthan","year":"2021","unstructured":"Wisanwanichthan, T., Thammawichai, M.: A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE access 9, 138432\u2013138450 (2021)","journal-title":"IEEE access"},{"key":"5597_CR16","doi-asserted-by":"crossref","unstructured":"Al-Bakaa, A., Al-Musawi, B.: A new intrusion detection system based on using non-linear statistical analysis and features selection techniques. Computers & Security 122,(2022)","DOI":"10.1016\/j.cose.2022.102906"},{"issue":"3","key":"5597_CR17","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/IOTM.001.2300171","volume":"7","author":"LAC Ahakonye","year":"2024","unstructured":"Ahakonye, L.A.C., Nwakanma, C.I., Lee, J.M., Kim, D.S.: Machine Learning Explainability for Intrusion Detection in the Industrial Internet of Things. IEEE Internet of Things Magazine 7(3), 68\u201374 (2024)","journal-title":"IEEE Internet of Things Magazine"},{"issue":"4","key":"5597_CR18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2024.3524302","volume":"58","author":"E Owusu","year":"2025","unstructured":"Owusu, E., Mapkar, M., Rahouti, M., Verma, D.C.: Robust Intrusion Detection With Combinatorial Fusion and Generative Artificial Intelligence. Computer 58(4), 46\u201357 (2025)","journal-title":"Computer"},{"key":"5597_CR19","doi-asserted-by":"crossref","unstructured":"Sinha, J., Manollas, M.: Efficient deep CNN-BiLSTM model for network intrusion detection. In Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition, 223\u2013231 (2020)","DOI":"10.1145\/3430199.3430224"},{"issue":"1","key":"5597_CR20","doi-asserted-by":"publisher","first-page":"8825587","DOI":"10.1155\/2023\/8825587","volume":"2023","author":"Z Wang","year":"2023","unstructured":"Wang, Z., et al.: Application of deep neural network with frequency domain filtering in the field of intrusion detection. International Journal of Intelligent Systems 2023(1), 8825587 (2023)","journal-title":"International Journal of Intelligent Systems"},{"issue":"8","key":"5597_CR21","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1587\/transcom.2022EBP3169","volume":"106","author":"G Zhao","year":"2023","unstructured":"Zhao, G., Wang, Y., Wang, J.: Intrusion detection model of Internet of Things based on LightGBM. IEICE Transactions on Communications 106(8), 622\u2013634 (2023)","journal-title":"IEICE Transactions on Communications"},{"key":"5597_CR22","doi-asserted-by":"crossref","unstructured":"Khanday, S.A., Fatima, H., Rakesh, N.: Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks. Expert Systems with Applications 215,(2023)","DOI":"10.1016\/j.eswa.2022.119330"},{"issue":"12","key":"5597_CR23","doi-asserted-by":"publisher","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","volume":"9","author":"R Zhao","year":"2021","unstructured":"Zhao, R., et al.: A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet of Things Journal 9(12), 9960\u20139972 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"5597_CR24","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning. Expert Systems with Applications 206,(2022)","DOI":"10.1016\/j.eswa.2022.117671"},{"key":"5597_CR25","first-page":"12991","volume":"35","author":"YL Sung","year":"2022","unstructured":"Sung, Y.L., Cho, J., Bansal, M.: Lst: Ladder side-tuning for parameter and memory efficient transfer learning. Advances in Neural Information Processing Systems 35, 12991\u201313005 (2022)","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"3","key":"5597_CR26","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/0098-3004(93)90090-R","volume":"19","author":"A Ma\u0107kiewicz","year":"1993","unstructured":"Ma\u0107kiewicz, A., Ratajczak, W.: Principal components analysis (PCA). Computers & Geosciences 19(3), 303\u2013342 (1993)","journal-title":"Computers & Geosciences"},{"issue":"1","key":"5597_CR27","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1038\/s41467-018-04608-8","volume":"9","author":"A Abid","year":"2018","unstructured":"Abid, A., et al.: Exploring patterns enriched in a dataset with contrastive principal component analysis. Nature communications 9(1), 2134 (2018)","journal-title":"Nature communications"},{"issue":"6","key":"5597_CR28","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International journal of advanced research in computer and communication engineering 4(6), 446\u2013452 (2015)","journal-title":"International journal of advanced research in computer and communication engineering"},{"issue":"1","key":"5597_CR29","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","volume":"9","author":"TM Booij","year":"2021","unstructured":"Booij, T.M., et al.: ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet of Things Journal 9(1), 485\u2013496 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"5597_CR30","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, 1251-1258 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"issue":"5","key":"5597_CR31","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1190\/1.1440672","volume":"41","author":"RA Wiggins","year":"1976","unstructured":"Wiggins, R.A., Larner, K.L., Wisecup, R.D.: Residual statics analysis as a general linear inverse problem. Geophysics 41(5), 922\u2013938 (1976)","journal-title":"Geophysics"},{"key":"5597_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, Q. L., & Yang, Y. B.: Sa-net: Shuffle attention for deep convolutional neural networks. In ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE. 2235-2239 (2021)","DOI":"10.1109\/ICASSP39728.2021.9414568"},{"key":"5597_CR33","doi-asserted-by":"crossref","unstructured":"Sandler, M., et al. Mobilenetv2: Inverted residuals and linear bottlenecks. in Proceedings of the IEEE conference on computer vision and pattern recognition. 2018","DOI":"10.1109\/CVPR.2018.00474"},{"key":"5597_CR34","doi-asserted-by":"crossref","unstructured":"Ma, N., et al. Shufflenet v2: Practical guidelines for efficient cnn architecture design. in Proceedings of the European conference on computer vision (ECCV). 2018","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"5597_CR35","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., et al. Focal loss for dense object detection. in Proceedings of the IEEE international conference on computer vision. 2017","DOI":"10.1109\/ICCV.2017.324"},{"key":"5597_CR36","unstructured":"Powers, D. M. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation.\u00a0arXiv preprint arXiv:2010.16061, 2020.\u00a0"},{"key":"5597_CR37","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang, W., et al.: HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE access 6, 1792\u20131806 (2017)","journal-title":"IEEE access"},{"key":"5597_CR38","doi-asserted-by":"crossref","unstructured":"Elmasry, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks 168,(2020)","DOI":"10.1016\/j.comnet.2019.107042"},{"key":"5597_CR39","doi-asserted-by":"crossref","unstructured":"Wu, P., Guo, H.: LuNET: a deep neural network for network intrusion detection. In 2019 IEEE symposium series on computational intelligence (SSCI). IEEE. 617-624 (2019)","DOI":"10.1109\/SSCI44817.2019.9003126"},{"key":"5597_CR40","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/j.ins.2021.08.010","volume":"579","author":"F Jin","year":"2021","unstructured":"Jin, F., et al.: Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning. Information Sciences 579, 814\u2013831 (2021)","journal-title":"Information Sciences"},{"key":"5597_CR41","doi-asserted-by":"crossref","unstructured":"Sarhan, M., et al., Feature extraction for machine learning-based intrusion detection in IoT networks. Digital Communications and Networks, 2022","DOI":"10.21203\/rs.3.rs-2035633\/v1"},{"issue":"1","key":"5597_CR42","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.bbe.2022.11.005","volume":"43","author":"IF Kilincer","year":"2023","unstructured":"Kilincer, I.F., et al.: Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybernetics and Biomedical Engineering 43(1), 30\u201341 (2023)","journal-title":"Biocybernetics and Biomedical Engineering"},{"key":"5597_CR43","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.ins.2023.03.052","volume":"634","author":"W Ding","year":"2023","unstructured":"Ding, W., Abdel-Basset, M., Mohamed, R.: DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks. Information Sciences 634, 157\u2013171 (2023)","journal-title":"Information Sciences"},{"key":"5597_CR44","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: A lightweight IoT intrusion detection model based on improved BERT-of-Theseus. Expert Systems with Applications 238,(2024)","DOI":"10.1016\/j.eswa.2023.122045"},{"key":"5597_CR45","doi-asserted-by":"crossref","unstructured":"Howard, A., et al. Searching for mobilenetv3. In Proceedings of the IEEE\/CVF international conference on computer vision. 2019","DOI":"10.1109\/ICCV.2019.00140"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05597-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05597-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05597-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:48:46Z","timestamp":1764071326000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05597-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":45,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5597"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05597-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"29 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"There are no human subjects in this article and informed consent is not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors have read and agreed to the published version of the manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"955"}}