Ajou University repository

DC Field Value Language
dc.contributor.authorZhang, Chunjiong-
dc.contributor.authorRoh, Byeong Hee-
dc.contributor.authorShan, Gaoyang-
dc.date.issued2024-01-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/37123-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85203837209&origin=inward-
dc.description.abstractMore and more portable intelligent devices are connected to the Internet in recent years. A way to effectively use the isolated cyber data without involving privacy and realize the cyber intrusion anomaly detection on the portable intelligent devices with relatively limited hardware storage resources and computing power is worth exploring. In this paper, we propose a framework of federated anomaly detection, which enables the device effectively detect the anomaly by sharing the parameters of the federated model in a fully distributed fashion. We formulate the model training problem as a distributed robust optimization problem and subsequently devise an efficient algorithm for it. Experimental studies have also been carried out to reveal the superior performance of the proposed framework and underscore the significant benefits of federated anomaly detection.-
dc.description.sponsorshipThis work is supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2023-2018-0-01431) supervised by the IITP (Institute for Information & Communications Technology Planning & Evaluation).-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshAnomaly detection-
dc.subject.meshComputing power-
dc.subject.meshCyber intrusion-
dc.subject.meshIntelligent devices-
dc.subject.meshModel training-
dc.subject.meshOptimization problems-
dc.subject.meshPerformance-
dc.subject.meshRobust optimization-
dc.subject.meshRobust optimization problem-
dc.subject.meshStorage resources-
dc.titleFederated Anomaly Detection-
dc.typeConference-
dc.citation.conferenceDate2024.6.24. ~ 2024.6.27.-
dc.citation.conferenceName54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024-
dc.citation.editionProceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024-
dc.citation.endPage149-
dc.citation.startPage148-
dc.citation.titleProceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024-
dc.identifier.bibliographicCitationProceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024, pp.148-149-
dc.identifier.doi10.1109/dsn-s60304.2024.00041-
dc.identifier.scopusid2-s2.0-85203837209-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10647056-
dc.subject.keywordanomaly detection-
dc.subject.keywordfederated learning-
dc.subject.keywordintelligent devices-
dc.subject.keywordrobust optimization problem-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaArtificial Intelligence-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaInformation Systems-
dc.subject.subareaSoftware-
dc.subject.subareaSafety, Risk, Reliability and Quality-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Roh, Byeong-hee Image
Roh, Byeong-hee노병희
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.