Conflict of Interest
There is no conflict of interest.
Supporting Information
Not applicable
Use of artificial intelligence (AI)-assisted technology for manuscript preparation
The authors confirm that there was no use of artificial intelligence (AI)-assisted technology for assisting in the writing
or editing of the manuscript and no images were manipulated using AI.
References
[1] J. P. Anderson, Computer security threat monitoring and surveillance, James P. Anderson Co., Washington, PA,
April 1980.
[2] D. E. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, 1987, SE-13, 222-232,
doi: 10.1109/TSE.1987.232894.
[3] A. Pinto, J. Smith, L. C. Herrera, Survey of intrusion detection systems based on machine learning, Sensors, 2023,
23, 2415, doi: 10.3390/s23052415.
[4] S. Ennaji, M. Khalid, R. Benlamri, Adversarial challenges in network intrusion detection, arXiv preprint,
arXiv:2409.18736, 2024, https://arxiv.org/abs/2409.18736.
[5] A. Sarıkaya, RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks,
Computers & Security, 2023, 135, 103483, doi: 10.1016/j.cose.2023.103483.
[6] J. L. Hernandez-Ramos, G. Karopoulos, E. Chatzoglou, V. Kouliaridis, E. Marmol, A. Gonzalez-Vidal, G.
Kambourakis, Intrusion detection based on federated learning: a systematic review, ACM Computing Surveys, 2025,
57, 309, doi: 10.1145/3731596
[7] M. Farhan, H. Waheed ud din, S. Ullah, M. S. Hussain, M. A. Khan, T. Mazhar, U. F. Khattak, I. H. Jaghdam
Network-based intrusion detection using deep learning, Scientific Reports, 2025, 15, 10001–10015, doi:
10.1038/s41598-025-08770-0.
[8] Z. Wang, R. Zhou, S. Yang, D. He, S. Chan, A novel lightweight IOT intrusion detection model based on self-
knowledge distillation, IEEE Internet of Things Journal, 2025, 12, 16912-16930, doi: 10.1109/JIOT.2025.3533092.
[9] B. Buyuktanir, Ş. Altinkaya, G. K. Baydogmus, K. Yildiz, Federated learning in intrusion detection: Advancements,
applications, and future directions, Cluster Computing, 2025, 28, 1051–1072, doi: 10.1007/s10586-025-05325-w.
025-05325-w.
[10] T. Wisanwanichthan, M. Thammawichai, A Lightweight intrusion detection system for IoT and UAV using deep
neural networks with knowledge distillation, Computers, 2025, 14, 291, doi: 10.3390/computers14070291.
[11] X. Chen, M. Liu, Z. Wang, Y. Wang, Explainable deep learning-based feature selection and intrusion detection
method on the internet of things, Sensors, 2024, 24, 5223, doi: 10.3390/s24165223.
[12] M. Sajid, K. R. Malik, A. Almogren, T. S. Malik, A. H. Khan, J. Tanveer, A. Ur Rehman, Enhancing intrusion
detection: a hybrid machine and deep learning approach, Journal of Cloud Computing, 2024, 13, 45, doi:
10.1186/s13677-024-00685-x.
[13] F. Aloraini, A. Javed, O. Rana, Adversarial attacks on intrusion detection systems in in-vehicle networks of
connected and autonomous vehicles, Sensors, 2024, 24, 3848. https://doi.org/10.3390/s24123848.
[14] M. Devine, S. P. Ardakani, M. Al-Khafajiy, Y. James, Federated machine learning to enable intrusion detection
systems in IOT networks, Electronics, 2025, 14, 1176, doi: 10.3390/electronics14061176.
[15] A. Pavate, R. Bansode, Design and analysis of adversarial samples in safety–critical environment: disease
prediction system. In: Gupta, M., Ghatak, S., Gupta, A., Mukherjee, A.L. (eds) Artificial Intelligence on Medical Data.
Lecture Notes in Computational Vision and Biomechanics, 2023, 37. Springer, Singapore, doi: 1007/978-981-19-0151-
5_29.
[16] A. A. Pavate, R. Bansode, Generation of adversarial mechanisms in deep neural networks: A survey of the state
of the art, International Journal of Ambient Computing and Intelligence, 2022, 13, 1–18, doi: 10.4018/IJACI.293111.
Publisher Note: The views, statements, and data in all publications solely belong to the authors and contributors. GR
Scholastic is not responsible for any injury resulting from the ideas, methods, or products mentioned. GR Scholastic
remains neutral regarding jurisdictional claims in published maps and institutional affiliations.
Open Access
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, which
permits the non-commercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long