{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:58:56Z","timestamp":1775627936126,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00128","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"863-868","source":"Crossref","is-referenced-by-count":0,"title":["LIGHT-HIDS: A Lightweight and Effective Machine Learning-Based Framework for Robust Host Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Onat","family":"Gungor","sequence":"first","affiliation":[{"name":"University of California,Department of Computer Science and Engineering,San Diego"}]},{"given":"Ishaan","family":"Kale","sequence":"additional","affiliation":[{"name":"University of California,Department of Computer Science and Engineering,San Diego"}]},{"given":"Jiasheng","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California,Department of Computer Science and Engineering,San Diego"}]},{"given":"Tajana","family":"Rosing","sequence":"additional","affiliation":[{"name":"University of California,Department of Computer Science and Engineering,San Diego"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","first-page":"175","article-title":"A survey on edge computing (ec) security challenges: Classification, threats, and mitigation strategies","volume":"14","author":"Kabbani","year":"2025","journal-title":"Electronics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.31127\/tuje.1516046"},{"key":"ref3","first-page":"81","article-title":"Design of a distributed hids for iot backbone components","volume-title":"2019 24th International Conference on Methods and Models in Automation and Robotics (MMAR)","author":"Banach"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3461462"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3234761"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s25010213"},{"key":"ref7","article-title":"Impact analysis of inference time attack of perception sensors on autonomous vehicles","author":"Chen","year":"2025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2024.3475470"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC61858.2024.10714760"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-87769-8_34"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3367004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3214304"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref16","article-title":"Lstm-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems","author":"Kim","year":"2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13453-2_12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3576708"},{"issue":"6","key":"ref19","first-page":"1","article-title":"Deep learning for anomaly detection: A survey","volume":"52","author":"Chalapathy","year":"2019","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.36001\/phme.2021.v6i1.2957"},{"issue":"1","key":"ref21","article-title":"Anomaly detection using convolutional neural networks (cnn)","volume":"13","author":"Al-Qatf","year":"2024","journal-title":"International Journal of Advanced Computer Technology"},{"key":"ref22","first-page":"4393","article-title":"Deep one-class classification","volume-title":"International Conference on Machine Learning (ICML)","author":"Ruff"},{"key":"ref23","article-title":"Tensorflow lite"},{"key":"ref24","article-title":"Jetson orin nx module","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35190-7_6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918437"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3393996"},{"key":"ref28","article-title":"Timesnet: Temporal 2d-variation modeling for general time series analysis","author":"Wu","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3270293"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2014.6847442"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471355.pdf?arnumber=11471355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:19:30Z","timestamp":1775625570000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00128","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}