ADVERSARIAL ROBUSTNESS OF DEEP LEARNING-BASED INTRUSION DETECTION SYSTEMS AGAINST AI-POWERED CYBER ATTACKS Article Swipe
Muhammad Haqan Ali Rai,Yawar Noor,Muhammad Faisal,Muhammad Faizan Nawazish
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.17786108
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.17786108
Related Topics
Concepts
Metadata
- Type
- article
- Landing Page
- https://doi.org/10.5281/zenodo.17786108
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W7108316342
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7108316342Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.17786108Digital Object Identifier
- Title
-
ADVERSARIAL ROBUSTNESS OF DEEP LEARNING-BASED INTRUSION DETECTION SYSTEMS AGAINST AI-POWERED CYBER ATTACKSWork title
- Type
-
articleOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-29Full publication date if available
- Authors
-
Muhammad Haqan Ali Rai,Yawar Noor,Muhammad Faisal,Muhammad Faizan NawazishList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.17786108Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.17786108Direct OA link when available
- Concepts
-
Adversarial system, Computer science, Robustness (evolution), Intrusion detection system, Computer security, Intrusion, Intrusion prevention system, Artificial intelligence, Key (lock), Network security, Anomaly-based intrusion detection system, Computer network, Identification (biology)Top concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7108316342 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.17786108 |
| ids.doi | https://doi.org/10.5281/zenodo.17786108 |
| ids.openalex | https://openalex.org/W7108316342 |
| fwci | 0.0 |
| type | article |
| title | ADVERSARIAL ROBUSTNESS OF DEEP LEARNING-BASED INTRUSION DETECTION SYSTEMS AGAINST AI-POWERED CYBER ATTACKS |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.07524263858795166 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T12026 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.03642933443188667 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Explainable Artificial Intelligence (XAI) |
| topics[2].id | https://openalex.org/T12761 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.034744247794151306 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Data Stream Mining Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C37736160 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6672022342681885 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1801315 |
| concepts[0].display_name | Adversarial system |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6520100235939026 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C63479239 |
| concepts[2].level | 3 |
| concepts[2].score | 0.6206942200660706 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7353546 |
| concepts[2].display_name | Robustness (evolution) |
| concepts[3].id | https://openalex.org/C35525427 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5628384947776794 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[3].display_name | Intrusion detection system |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.488979309797287 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C158251709 |
| concepts[5].level | 2 |
| concepts[5].score | 0.33132079243659973 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q354025 |
| concepts[5].display_name | Intrusion |
| concepts[6].id | https://openalex.org/C27061796 |
| concepts[6].level | 3 |
| concepts[6].score | 0.3292637765407562 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[6].display_name | Intrusion prevention system |
| concepts[7].id | https://openalex.org/C154945302 |
| concepts[7].level | 1 |
| concepts[7].score | 0.2999616861343384 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[7].display_name | Artificial intelligence |
| concepts[8].id | https://openalex.org/C26517878 |
| concepts[8].level | 2 |
| concepts[8].score | 0.29204121232032776 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[8].display_name | Key (lock) |
| concepts[9].id | https://openalex.org/C182590292 |
| concepts[9].level | 2 |
| concepts[9].score | 0.28788915276527405 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[9].display_name | Network security |
| concepts[10].id | https://openalex.org/C137524506 |
| concepts[10].level | 3 |
| concepts[10].score | 0.2824173867702484 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q2247688 |
| concepts[10].display_name | Anomaly-based intrusion detection system |
| concepts[11].id | https://openalex.org/C31258907 |
| concepts[11].level | 1 |
| concepts[11].score | 0.2658125162124634 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[11].display_name | Computer network |
| concepts[12].id | https://openalex.org/C116834253 |
| concepts[12].level | 2 |
| concepts[12].score | 0.25464707612991333 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q2039217 |
| concepts[12].display_name | Identification (biology) |
| keywords[0].id | https://openalex.org/keywords/adversarial-system |
| keywords[0].score | 0.6672022342681885 |
| keywords[0].display_name | Adversarial system |
| keywords[1].id | https://openalex.org/keywords/robustness |
| keywords[1].score | 0.6206942200660706 |
| keywords[1].display_name | Robustness (evolution) |
| keywords[2].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[2].score | 0.5628384947776794 |
| keywords[2].display_name | Intrusion detection system |
| keywords[3].id | https://openalex.org/keywords/intrusion |
| keywords[3].score | 0.33132079243659973 |
| keywords[3].display_name | Intrusion |
| keywords[4].id | https://openalex.org/keywords/intrusion-prevention-system |
| keywords[4].score | 0.3292637765407562 |
| keywords[4].display_name | Intrusion prevention system |
| keywords[5].id | https://openalex.org/keywords/key |
| keywords[5].score | 0.29204121232032776 |
| keywords[5].display_name | Key (lock) |
| language | |
| locations[0].id | doi:10.5281/zenodo.17786108 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | |
| locations[0].raw_type | article-journal |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.17786108 |
| indexed_in | datacite |
| authorships[0].author.id | |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Muhammad Haqan Ali Rai,Yawar Noor,Muhammad Faisal,Muhammad Faizan Nawazish |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Muhammad Haqan Ali Rai,Yawar Noor,Muhammad Faisal,Muhammad Faizan Nawazish |
| authorships[0].is_corresponding | True |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.17786108 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-12-03T00:00:00 |
| display_name | ADVERSARIAL ROBUSTNESS OF DEEP LEARNING-BASED INTRUSION DETECTION SYSTEMS AGAINST AI-POWERED CYBER ATTACKS |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-12-03T23:12:59.920255 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.07524263858795166 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5281/zenodo.17786108 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article-journal |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.17786108 |
| primary_location.id | doi:10.5281/zenodo.17786108 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | |
| primary_location.raw_type | article-journal |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.17786108 |
| publication_date | 2025-11-29 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.83806943 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |