{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:37:16Z","timestamp":1774021036110,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2020R1F1A1069182"],"award-info":[{"award-number":["NRF-2020R1F1A1069182"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information and Communications Technology Planning and Evaluation","award":["2021-0-00739"],"award-info":[{"award-number":["2021-0-00739"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1145\/3492866.3561257","type":"proceedings-article","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T16:34:33Z","timestamp":1663778073000},"page":"283-284","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Partial federated learning based network intrusion system for mobile devices"],"prefix":"10.1145","author":[{"given":"Hyoseon","family":"Kye","sequence":"first","affiliation":[{"name":"Soongsil University, Seoul, South Korea"}]},{"given":"Minhae","family":"Kwon","sequence":"additional","affiliation":[{"name":"Soongsil University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,10,3]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"1","article-title":"Hierarchical Detection of Network Anomalies: A Self-supervised Learning Approach","volume":"27","author":"Kye Hyoseon","year":"2022","unstructured":"Hyoseon Kye, Miru Kim, and Minhae Kwon. 2022. Hierarchical Detection of Network Anomalies: A Self-supervised Learning Approach. IEEE Signal Processing Letters 27 (2022), 1--5.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_2_2_2_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273--1282."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693"},{"key":"e_1_3_2_2_4_1","volume-title":"Arash Habibi Lashkari, and Ali A Ghorbani","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSP (2018), 108--116."},{"key":"e_1_3_2_2_5_1","volume-title":"A detailed analysis of the KDD CUP 99 data set","author":"Tavallaee Mahbod","unstructured":"Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In IEEE CISDA."}],"event":{"name":"MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","location":"Seoul Republic of Korea","acronym":"MobiHoc '22","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3561257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492866.3561257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:56Z","timestamp":1750186796000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3561257"}},"subtitle":["poster"],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":5,"alternative-id":["10.1145\/3492866.3561257","10.1145\/3492866"],"URL":"https:\/\/doi.org\/10.1145\/3492866.3561257","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]},"assertion":[{"value":"2022-10-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}