{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T15:33:24Z","timestamp":1772984004473,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796926","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"1409-1418","source":"Crossref","is-referenced-by-count":30,"title":["FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning"],"prefix":"10.1109","author":[{"given":"Ning","family":"Wang","sequence":"first","affiliation":[{"name":"Virginia Polytechnic Institute and State University,VA,USA"}]},{"given":"Yimin","family":"Chen","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University,VA,USA"}]},{"given":"Yang","family":"Hu","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University,VA,USA"}]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University,VA,USA"}]},{"given":"Y. Thomas","family":"Hou","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University,VA,USA"}]}],"member":"263","reference":[{"key":"ref39","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref38","first-page":"177","article-title":"Machine-learning-based feature selection techniques for largescale network intrusion detection","author":"al-jarrah","year":"2014","journal-title":"2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)"},{"key":"ref33","first-page":"55","article-title":"You are what you broadcast: Identification of mobile and iot devices from (public) wifi","author":"yu","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00037"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.028"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2633228"},{"key":"ref35","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1037\/11491-005"},{"key":"ref10","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Artificial Intelligence and Statistics (AISTATS 17)"},{"key":"ref11","article-title":"Advances and open problems in federated learning","volume":"14","author":"kairouz","year":"2021","journal-title":"Foundations and Trends\ufffd in Machine Learning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00393"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58621-8_45"},{"key":"ref19","article-title":"What makes for good views for contrastive learning?","author":"tian","year":"2020","journal-title":"arXiv preprint arXiv 2005 10545"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488874"},{"key":"ref4","first-page":"756","article-title":"D&#x00EF;ot: A federated self-learning anomaly detection system for iot","author":"nguyen","year":"2019","journal-title":"2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875544"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s141224188"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref5","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014102"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707489"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883583"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref22","article-title":"Federated learning-based anomaly detection for iot security attacks","author":"mothukuri","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-015-0388-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796926.pdf?arnumber=9796926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:46:56Z","timestamp":1658177216000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796926","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}