Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Chunjiong | - |
dc.contributor.author | Roh, Byeong Hee | - |
dc.contributor.author | Shan, Gaoyang | - |
dc.date.issued | 2024-01-01 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/37123 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85203837209&origin=inward | - |
dc.description.abstract | More and more portable intelligent devices are connected to the Internet in recent years. A way to effectively use the isolated cyber data without involving privacy and realize the cyber intrusion anomaly detection on the portable intelligent devices with relatively limited hardware storage resources and computing power is worth exploring. In this paper, we propose a framework of federated anomaly detection, which enables the device effectively detect the anomaly by sharing the parameters of the federated model in a fully distributed fashion. We formulate the model training problem as a distributed robust optimization problem and subsequently devise an efficient algorithm for it. Experimental studies have also been carried out to reveal the superior performance of the proposed framework and underscore the significant benefits of federated anomaly detection. | - |
dc.description.sponsorship | This work is supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2023-2018-0-01431) supervised by the IITP (Institute for Information & Communications Technology Planning & Evaluation). | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Anomaly detection | - |
dc.subject.mesh | Computing power | - |
dc.subject.mesh | Cyber intrusion | - |
dc.subject.mesh | Intelligent devices | - |
dc.subject.mesh | Model training | - |
dc.subject.mesh | Optimization problems | - |
dc.subject.mesh | Performance | - |
dc.subject.mesh | Robust optimization | - |
dc.subject.mesh | Robust optimization problem | - |
dc.subject.mesh | Storage resources | - |
dc.title | Federated Anomaly Detection | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2024.6.24. ~ 2024.6.27. | - |
dc.citation.conferenceName | 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024 | - |
dc.citation.edition | Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024 | - |
dc.citation.endPage | 149 | - |
dc.citation.startPage | 148 | - |
dc.citation.title | Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024 | - |
dc.identifier.bibliographicCitation | Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024, pp.148-149 | - |
dc.identifier.doi | 10.1109/dsn-s60304.2024.00041 | - |
dc.identifier.scopusid | 2-s2.0-85203837209 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10647056 | - |
dc.subject.keyword | anomaly detection | - |
dc.subject.keyword | federated learning | - |
dc.subject.keyword | intelligent devices | - |
dc.subject.keyword | robust optimization problem | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Artificial Intelligence | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Software | - |
dc.subject.subarea | Safety, Risk, Reliability and Quality | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.