{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:36Z","timestamp":1750309536629,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711631","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"194-199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Detection in IIoT: A Federated Approach Using TCN-GRU and Lookahead Optimization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4196-7858","authenticated-orcid":false,"given":"Haoran","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6220-4119","authenticated-orcid":false,"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9645-3539","authenticated-orcid":false,"given":"Jingxuan","family":"Fan","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8224-6517","authenticated-orcid":false,"given":"Ziyang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Mamoun Alazab Swarna\u00a0Priya RM Parimala M Praveen Kumar\u00a0Reddy Maddikunta Thippa\u00a0Reddy Gadekallu and Quoc-Viet Pham. 2022. Federated Learning for Cybersecurity: Concepts Challenges and Future Directions. IEEE Transactions on Industrial Informatics 18 5 (2022) 3501\u20133509. 10.1109\/TII.2021.3119038","DOI":"10.1109\/TII.2021.3119038"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Zhuo Chen Na Lv Pengfei Liu Yu Fang Kun Chen and Wu Pan. 2020. Intrusion Detection for Wireless Edge Networks Based on Federated Learning. IEEE Access 8 (2020) 217463\u2013217472. 10.1109\/ACCESS.2020.3041793","DOI":"10.1109\/ACCESS.2020.3041793"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Jonathas\u00a0A. de Oliveira Vin\u00edcius\u00a0P. Gon\u00e7alves Rodolfo\u00a0I. Meneguette Rafael\u00a0T. de Sousa Daniel\u00a0L. Guidoni Jos\u00e9\u00a0C.M. Oliveira and Geraldo\u00a0P. Rocha Filho. 2023. F-NIDS \u2014 A Network Intrusion Detection System based on federated learning. Computer Networks 236 (2023) 110010. 10.1016\/j.comnet.2023.110010","DOI":"10.1016\/j.comnet.2023.110010"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MysuruCon55714.2022.9972442"},{"key":"e_1_3_3_1_6_2","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2015. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification. CoRR abs\/1502.01852 (2015). arXiv:https:\/\/arXiv.org\/abs\/1502.01852http:\/\/arxiv.org\/abs\/1502.01852"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD57460.2023.10152002"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp57234.2023.00050"},{"key":"e_1_3_3_1_9_2","first-page":"65","volume-title":"Critical Infrastructure Protection VIII","author":"Morris Thomas","year":"2014","unstructured":"Thomas Morris and Wei Gao. 2014. Industrial Control System Traffic Data Sets for Intrusion Detection Research. In Critical Infrastructure Protection VIII, Jonathan Butts and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 65\u201378."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.22489\/CinC.2020.032"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CTS59431.2023.10289088"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER58687.2023.00027"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054014"}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":12,"alternative-id":["10.1145\/3711618.3711631","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711631","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}