Novel Approaches for Deep Learning in Cybersecurity

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Artificial Intelligence".

Deadline for manuscript submissions: 15 January 2026 | Viewed by 393

Special Issue Editors


E-Mail Website
Guest Editor
Department of Cybersecurity, School of Science, Health and Criminal Justice, State University of New York, Canton, NY 13617, USA
Interests: machine learning; deep learning; sociable robots; security; affective computing; digital health; data analysis; healthcare systems

E-Mail Website
Guest Editor
Department of Cybersecurity, School of Science, Health and Criminal Justice, State University of New York, Canton, NY 13617, USA
Interests: data security and privacy; data analysis; privacy enhancing technologies; usable security and privacy; public safety and education; social media; healthcare systems

Special Issue Information

Dear Colleagues,

The increasing complexity of digital systems and the expanding attack surface of connected technologies demand innovative and intelligent approaches to cybersecurity. Deep learning, with its ability to model nonlinear and high-dimensional data patterns, has emerged as a powerful tool in identifying, mitigating, and predicting cyber threats across diverse application domains. This Special Issue aims to highlight recent advances and novel methodologies in applying deep learning to cybersecurity, focusing on solutions that improve the accuracy, scalability, and resilience of intelligent security systems. We are particularly interested in contributions that explore real-time threat detection, adversarial robustness, privacy-preserving AI, and secure architectures for emerging environments such as cloud, edge, and IoT ecosystems.

Topics of interest include but are not limited to:

  • Deep learning models for intrusion detection and malware classification;
  • Federated and privacy-preserving learning for cybersecurity;
  • Adversarial machine learning and defense mechanisms;
  • Secure biometric authentication and identity management;
  • Multimodal threat intelligence systems;
  • Explainable AI (XAI) in cybersecurity applications;
  • Applications of GNNs, transformers, and generative models in cyber defense.

Dr. Mehdi Ghayoumi
Dr. Kambiz Ghazinour
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • deep learning for cybersecurity
  • AI-based threat detection
  • privacy-preserving machine learning
  • federated learning in security
  • intrusion detection systems (IDS)
  • adversarial machine learning
  • secure neural networks
  • biometric authentication
  • cyber-trust modeling
  • multimodal security analytics

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 3558 KB  
Article
Avocado: An Interpretable Fine-Grained Intrusion Detection Model for Advanced Industrial Control Network Attacks
by Xin Liu, Tao Liu and Ning Hu
Electronics 2025, 14(21), 4233; https://doi.org/10.3390/electronics14214233 - 29 Oct 2025
Viewed by 232
Abstract
Industrial control systems (ICS), as critical infrastructure supporting national operations, are increasingly threatened by sophisticated stealthy network attacks. These attacks often break malicious behaviors into multiple highly camouflaged packets, which are embedded into large-scale background traffic with low frequency, making them semantically and [...] Read more.
Industrial control systems (ICS), as critical infrastructure supporting national operations, are increasingly threatened by sophisticated stealthy network attacks. These attacks often break malicious behaviors into multiple highly camouflaged packets, which are embedded into large-scale background traffic with low frequency, making them semantically and temporally indistinguishable from normal traffic and thus evading traditional detection. Existing methods largely rely on flow-level statistics or long-sequence modeling, resulting in coarse detection granularity, high latency, and poor byte-level interpretability, falling short of industrial demands for real-time and actionable detection. To address these challenges, we propose Avocado, a fine-grained, multi-level intrusion detection model. Avocado’s core innovation lies in contextual flow-feature fusion: it models each packet jointly with its surrounding packet sequence, enabling independent abnormality detection and precise localization. Moreover, a shared-query multi-head self-attention mechanism is designed to quantify byte-level importance within packets. Experimental results show that Avocado significantly outperforms state-of-the-art flow-level methods on NGAS and CLIA-M221 datasets, improving packet-level detection ACC by 1.55% on average, and reducing FPR and FNR to 3.2%, 3.6% (NGAS), and 3.7%, 4.3% (CLIA-M221), respectively, demonstrating its superior performance in both detection and interpretability. Full article
(This article belongs to the Special Issue Novel Approaches for Deep Learning in Cybersecurity)
Show Figures

Figure 1

Back to TopTop