{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:03:33Z","timestamp":1774368213724,"version":"3.50.1"},"reference-count":44,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"vor","delay-in-days":319,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"publisher","award":["2021YFB0300104"],"award-info":[{"award-number":["2021YFB0300104"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019062","name":"Tianjin Research Innovation Project for Postgraduate Students","doi-asserted-by":"publisher","award":["2022BKY013"],"award-info":[{"award-number":["2022BKY013"]}],"id":[{"id":"10.13039\/501100019062","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFE0210700"],"award-info":[{"award-number":["2022YFE0210700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Intrusion detection systems play a very important role in industrial Internet network security. However, in the large\u2010scale, complex, and heterogeneous industrial Internet of Things (IoT), it is becoming more and more difficult to defend network intrusion threats due to the insufficiency of high\u2010quality attack samples. To solve the problem, an efficient federated network intrusion method called EFedID is proposed for industrial IoT, which can allow different industrial agents to collaboratively train a comprehensive detection model. Specifically, the adaptive gradient sparsification method is introduced to alleviate the communication and computation overheads. To protect the data privacy of the agents, a CKKS cryptosystem\u2010based secure communication protocol is designed to encrypt the model parameters through the federated training process. Our proposed system demonstrates exceptional detection performance on the NSL\u2010KDD, KDD CUP 99, and CICIDS 2017 datasets. Notably, on the NSL\u2010KDD dataset, the model compression rate reaches 9 times while the model accuracy reaches 84.31%. On the KDD CUP 99 dataset, the model compression rate reaches 8.9 times while the model accuracy reaches 97.3%. Lastly, on the CICIDS 2017 dataset, the model compression rate reached 6.173 times while the model accuracy reached 95.51%. The experimental results demonstrate that the proposed method is very suitable for effectively developing a high\u2010accuracy detection model while protecting the data information of industrial agents. Furthermore, the method can be extended to other recent deep learning networks for intrusion detection.<\/jats:p>","DOI":"10.1155\/2023\/2956990","type":"journal-article","created":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:05:15Z","timestamp":1700179515000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Efficient Privacy\u2010Preserving Federated Deep Learning for Network Intrusion of Industrial IoT"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2093-5693","authenticated-orcid":false,"given":"Ningxin","family":"He","sequence":"first","affiliation":[]},{"given":"Zehui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaotian","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3964-2612","authenticated-orcid":false,"given":"Tiegang","family":"Gao","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2023,11,16]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3093346"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3106669"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.10.018"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.027"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107764"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3130156"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2020.2973681"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.121.2200099"},{"key":"e_1_2_11_9_2","article-title":"Toward multiple federated learning services resource sharing in mobile edge networks","volume":"22","author":"Nguyen M. N. H.","year":"2021","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3137321"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3105810"},{"key":"e_1_2_11_13_2","first-page":"1","article-title":"Energy-aware blockchain and federated learning-supported vehicular networks","volume":"23","author":"Aloqaily M.","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.08.028"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103061"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6812"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3200048"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.09.014"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107450"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22397"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102930"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3067915"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3010798"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3056185"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"AloqailyM. Al RidhawiI. andKarrayF. Towards blockchain-based hierarchical federated learning for cyber-physical systems Proceedings of the 2022 International Balkan Conference on Communications and Networking (BalkanCom) August 2022 Sarajevo Bosnia and Herzegovina 46\u201350.","DOI":"10.1109\/BalkanCom55633.2022.9900546"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2020.2975189"},{"key":"e_1_2_11_28_2","first-page":"300","article-title":"Adaptive gradient sparsification for efficient federated learning: an online learning approach","author":"Han P.","year":"2020","journal-title":"IEEE ICDCS"},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","unstructured":"CheonJ. H. KimA. KimM. andSongY. Homomorphic encryption for arithmetic of approximate numbers 10624 Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security May 2017 Berlin Germany Springer 409\u2013437.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"BabenkoM.andGolimblevskaiaE. Euclidean division method for the homomorphic scheme ckks Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus) January 2021 Moscow Russia 217\u2013220.","DOI":"10.1109\/ElConRus51938.2021.9396347"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"ShiriaevE. M. NazarovA. S. KycherovN. N. andSotikovaN. A. Efficient implementation of the CKKS scheme using a quadratic residue number system Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus) January 2021 Moscow Russia IEEE 665\u2013669.","DOI":"10.1109\/ElConRus51938.2021.9396482"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2942190"},{"key":"e_1_2_11_33_2","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Aono Y.","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_2_11_34_2","doi-asserted-by":"crossref","unstructured":"SahuS. K. SarangiS. andJenaS. K. A detail analysis on intrusion detection datasets Proceedings of the 2014 IEEE international advance computing conference (IACC) February 2014 New Delhi India IEEE 1348\u20131353.","DOI":"10.1109\/IAdCC.2014.6779523"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.011.2000286"},{"key":"e_1_2_11_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.013"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3850582"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3254915"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2023.08.001"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107450"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2020.3001017"},{"key":"e_1_2_11_42_2","doi-asserted-by":"crossref","unstructured":"AyedM. A.andTalhiC. Federated learning for anomaly-based intrusion detection Proceedings of the 2021 International Symposium on Networks Computers and Communications (ISNCC) October 2021 Dubai UAE IEEE 1\u20138.","DOI":"10.1109\/ISNCC52172.2021.9615816"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.3004312"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/2956990.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/2956990.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2023\/2956990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:32:26Z","timestamp":1735623146000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2023\/2956990"}},"subtitle":[],"editor":[{"given":"Alexander","family":"Ho\u0161ovsk\u00fd","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1155\/2023\/2956990"],"URL":"https:\/\/doi.org\/10.1155\/2023\/2956990","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2022-09-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2956990"}}