Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Model compression

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

A comparative analysis of a machine learning pipeline for network intrusion detection Pages 1-14 Right click to download the paper Download PDF

Authors: Dena Abu Laila, Samir Brahim Belhaouari, Mohammed Almayah, Amer Alqutaish, Mansour Obeidat, Theyazn H. H. Aldhyanie

DOI: 10.5267/j.ijdns.2025.10.017

Keywords: Lightweight CNN, Optimization, 5G networks, IoT security, Federated learning, Model compression, Network slicing

Abstract:
The exponential growth of Internet of Things (IoT) devices integrated with fifth-generation (5G) wireless networks has created unprecedented opportunities for ultra-low-latency applications while introducing complex security vulnerabilities and computational challenges. This paper presents a comprehensive framework for deploying adaptive lightweight Convolutional Neural Networks (CNNs) in 5G-enabled IoT environments to address intrusion detection, intelligent traffic classification, and dynamic resource optimization. We propose a novel multi-objective optimization approach that integrates Adaptive Depthwise Separable Convolutions (ADSC), Dynamic Quantization-Aware Training (DQAT), and Real time Pruning Strategy (RPS) specifically designed for 5G network slicing architectures. Our methodology incorporates federated learning principles, edge-cloud collaboration, and context-aware adaptation mechanisms. Comprehensive evaluation on multiple datasets, including NF-ToN-IoT-v2, NSL-KDD, and CICIDS-2017, demonstrates superior performance with 97.8% accuracy in multi-class attack detection, 76% reduction in computational overhead, 71% decrease in energy consumption, and 42% improvement in network throughput. The framework achieves inference times under 8.5ms on edge devices while maintaining robust security postures across heterogeneous IoT deployments. Statistical significance testing and large-scale ablation studies verify the effectiveness of each of the suggested elements.
Details
  • 85
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 1 | Views: 245 | Reviews: 0

 

® 2010-2026 GrowingScience.Com