{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:08:02Z","timestamp":1774541282975,"version":"3.50.1"},"reference-count":31,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T00:00:00Z","timestamp":1633392000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771153"],"award-info":[{"award-number":["61771153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61831007"],"award-info":[{"award-number":["61831007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971154"],"award-info":[{"award-number":["61971154"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["3072020CF0601"],"award-info":[{"award-number":["3072020CF0601"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61771153"],"award-info":[{"award-number":["61771153"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61831007"],"award-info":[{"award-number":["61831007"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61971154"],"award-info":[{"award-number":["61971154"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3072020CF0601"],"award-info":[{"award-number":["3072020CF0601"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,10,5]]},"abstract":"<jats:p>As an innovative strategy, edge computing has been considered a viable option to address the limitations of cloud computing in supporting the Internet-of-Things applications. However, due to the instability of the network and the increase of the attack surfaces, the security in edge-assisted IoT needs to be better guaranteed. In this paper, we propose an intelligent intrusion detection mechanism, FedACNN, which completes the intrusion detection task by assisting the deep learning model CNN through the federated learning mechanism. In order to alleviate the communication delay limit of federal learning, we innovatively integrate the attention mechanism, and the FedACNN can achieve ideal accuracy with a 50% reduction of communication rounds.<\/jats:p>","DOI":"10.1155\/2021\/9361348","type":"journal-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T01:16:26Z","timestamp":1633482986000},"page":"1-11","source":"Crossref","is-referenced-by-count":66,"title":["Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1177-3693","authenticated-orcid":true,"given":"Dapeng","family":"Man","sequence":"first","affiliation":[{"name":"Information Security Research Center, Harbin Engineering University, Harbin 150001, China"}]},{"given":"Fanyi","family":"Zeng","sequence":"additional","affiliation":[{"name":"Information Security Research Center, Harbin Engineering University, Harbin 150001, China"}]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[{"name":"Information Security Research Center, Harbin Engineering University, Harbin 150001, China"},{"name":"Peng Cheng Laboratory, Guangdong 518055, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1720-9882","authenticated-orcid":true,"given":"Miao","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Network Data, Beijing 100031, China"}]},{"given":"Jiguang","family":"Lv","sequence":"additional","affiliation":[{"name":"Information Security Research Center, Harbin Engineering University, Harbin 150001, China"}]},{"given":"Yijing","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100864, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/iciss49785.2020.9315900"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.09.350"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/icii.2019.00046"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2019.2904348"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3015432"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2986024"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/mce.2018.2851723"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/iscc47284.2019.8969609"},{"key":"9","article-title":"Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0","volume":"64","author":"C. Wang","year":"2020","journal-title":"SCIENCE CHINA: Information Sciences"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/wcsp49889.2020.9299684"},{"key":"11","first-page":"343","article-title":"Evaluation of centralised vs distributed collaborative intrusion detection systems in multi-access edge computing","author":"R. Sharma"},{"key":"12","first-page":"30","article-title":"Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques","volume":"235","author":"N. Koroniotis","year":"2017","journal-title":"Mobile Networks and Management (MONAMI)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101157"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02321-3"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.023"},{"key":"16","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"B. McMahan"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.2974220"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/smartcomp.2017.7946998"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2917299"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-021-00712-3"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106436"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7472095"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3013541"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/bigdatase50710.2020.00020"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3041793"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/blackseacom48709.2020.9234959"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.3022797"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/iccmc51019.2021.9418291"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc49032.2021.9369469"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/icc40277.2020.9148632"},{"key":"31","first-page":"1848","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"2","author":"S. Revathi","year":"2013","journal-title":"International Journal of Engineering Research and Technology"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9361348.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9361348.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9361348.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T01:16:30Z","timestamp":1633482990000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/9361348\/"}},"subtitle":[],"editor":[{"given":"Qi","family":"Jiang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,10,5]]},"references-count":31,"alternative-id":["9361348","9361348"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9361348","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,10,5]]}}}