Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

FLDP intrusion detection framework and model pruning process.

More »

Fig 1 Expand

Fig 2.

Illustration of the process of the intrusion detection model.

Firstly, the local private data is grouped, and then these data are formatted into a time series format to meet the training requirements of the time series model. The formatted data is then inputted into a Multilayer Perceptron (MLP) to generate the final detection results.

More »

Fig 2 Expand

Fig 3.

Experimental setup.

More »

Fig 3 Expand

Table 1.

Federated learning for training model parameters and hyperparameters.

More »

Table 1 Expand

Fig 4.

Performance evaluation of the FFIDS algorithm.

Evaluation of different datasets with various pruning rates and 150 epochs iteration.

More »

Fig 4 Expand

Table 2.

Communication cost of different models on different datasets and pruning rates.

More »

Table 2 Expand

Table 3.

Communication and time cost on FL vehicle-level training.

More »

Table 3 Expand

Fig 5.

Comparing the F1 score of different baseline models.

Comparing each global iteration with a fixed pruning rate of 50 with 150 epochs iteration.

More »

Fig 5 Expand

Fig 6.

Comparing the F1 score of different baseline models.

Comparing by varying privacy budgets from 6 to 16 with 150 epochs iteration.

More »

Fig 6 Expand