{"id":"https://openalex.org/W4387582204","doi":"https://doi.org/10.1016/j.hcc.2023.100167","title":"Security defense strategy algorithm for Internet of Things based on deep reinforcement learning","display_name":"Security defense strategy algorithm for Internet of Things based on deep reinforcement learning","publication_year":2023,"publication_date":"2023-10-12","ids":{"openalex":"https://openalex.org/W4387582204","doi":"https://doi.org/10.1016/j.hcc.2023.100167"},"language":"en","primary_location":{"id":"doi:10.1016/j.hcc.2023.100167","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2023.100167","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.hcc.2023.100167","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022577009","display_name":"Xuecai Feng","orcid":"https://orcid.org/0000-0003-4243-5400"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuecai Feng","raw_affiliation_strings":["School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032721661","display_name":"Jikai Han","orcid":null},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jikai Han","raw_affiliation_strings":["School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422044","display_name":"Rui Zhang","orcid":"https://orcid.org/0000-0002-4117-2656"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101592809","display_name":"Shuo Xu","orcid":"https://orcid.org/0000-0001-9022-112X"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Xu","raw_affiliation_strings":["School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080791772","display_name":"Hui Xia","orcid":"https://orcid.org/0000-0001-7326-5796"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui Xia","raw_affiliation_strings":["School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Ocean University of China, Qingdao 266100, China","institution_ids":["https://openalex.org/I59028903"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080791772"],"corresponding_institution_ids":["https://openalex.org/I59028903"],"apc_list":{"value":1500,"currency":"USD","value_usd":1500},"apc_paid":{"value":1500,"currency":"USD","value_usd":1500},"fwci":3.2014,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.93143813,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"4","issue":"1","first_page":"100167","last_page":"100167"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.88939368724823},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8242872357368469},{"id":"https://openalex.org/keywords/patrolling","display_name":"Patrolling","score":0.8169111013412476},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6338541507720947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.593665361404419},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3747093677520752},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1364772617816925}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.88939368724823},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8242872357368469},{"id":"https://openalex.org/C110698143","wikidata":"https://www.wikidata.org/wiki/Q651389","display_name":"Patrolling","level":2,"score":0.8169111013412476},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6338541507720947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.593665361404419},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3747093677520752},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1364772617816925},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.hcc.2023.100167","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2023.100167","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7d84aa62e7a64513ab46bc32af2a5f91","is_oa":true,"landing_page_url":"https://doaj.org/article/7d84aa62e7a64513ab46bc32af2a5f91","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"High-Confidence Computing, Vol 4, Iss 1, Pp 100167- (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.hcc.2023.100167","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2023.100167","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2526910689","https://openalex.org/W2800806089","https://openalex.org/W2905885886","https://openalex.org/W2908261578","https://openalex.org/W2908643158","https://openalex.org/W2912340882","https://openalex.org/W2942465044","https://openalex.org/W2952298682","https://openalex.org/W2982316857","https://openalex.org/W2986458967","https://openalex.org/W3012539654","https://openalex.org/W3044834640","https://openalex.org/W3089096050","https://openalex.org/W3108669277","https://openalex.org/W3110885177","https://openalex.org/W3136817238","https://openalex.org/W3136901928","https://openalex.org/W3161868942","https://openalex.org/W3188286850","https://openalex.org/W3202801741","https://openalex.org/W4226081006","https://openalex.org/W4236550001","https://openalex.org/W4281656599","https://openalex.org/W4297789683","https://openalex.org/W4299802797","https://openalex.org/W4306786778","https://openalex.org/W6685444567","https://openalex.org/W6727313434","https://openalex.org/W6738796088","https://openalex.org/W6743367460","https://openalex.org/W6748707148","https://openalex.org/W6759315145","https://openalex.org/W6765009397","https://openalex.org/W6769746359","https://openalex.org/W6775522024","https://openalex.org/W6780372821","https://openalex.org/W6783089834"],"related_works":["https://openalex.org/W170273588","https://openalex.org/W2337788814","https://openalex.org/W2092973197","https://openalex.org/W2163146706","https://openalex.org/W2404411151","https://openalex.org/W3206391274","https://openalex.org/W167683769","https://openalex.org/W2095900292","https://openalex.org/W2374340569","https://openalex.org/W4200335020"],"abstract_inverted_index":{"Currently,":[0],"important":[1],"privacy":[2],"data":[3,28],"of":[4,7,14,29,118],"the":[5,67,93,115,119,128,132,162,167,187],"Internet":[6],"Things":[8],"(IoT)":[9],"face":[10,51],"extremely":[11],"high":[12],"risks":[13],"leakage.":[15],"Attackers":[16],"persistently":[17],"engage":[18],"in":[19,38,41],"continuous":[20],"attacks":[21,184],"on":[22,134],"terminal":[23],"devices":[24],"to":[25,107,145,186],"obtain":[26],"private":[27],"crucial":[30],"importance.":[31],"Although":[32],"significant":[33],"progress":[34],"has":[35],"been":[36],"made":[37],"recent":[39],"years":[40],"deep":[42,101],"reinforcement":[43,102],"learning":[44,103],"defense":[45,48,56,62,86,111,143,170],"strategies,":[46],"most":[47,125],"methods":[49],"still":[50],"problems":[52],"such":[53],"as":[54],"low":[55],"resource":[57,87],"allocation":[58,88,116],"efficiency":[59],"and":[60,78,89,140,176,189],"insufficient":[61],"coordination":[63],"capabilities.":[64],"To":[65],"solve":[66],"above":[68,94],"problems,":[69],"this":[70,97],"paper":[71,98],"constructs":[72],"a":[73,80,100,135,150,174],"novel":[74],"adversarial":[75],"security":[76,81,110,169,178],"scenario":[77],"proposes":[79],"game":[82,95],"model":[83],"that":[84,123,166],"integrates":[85],"patrol":[90],"inspection.":[91],"Regarding":[92],"model,":[96],"designs":[99],"algorithm":[104],"named":[105],"SDSA":[106,113],"calculate":[108],"its":[109],"strategy.":[112],"calculates":[114],"strategy":[117,122,171,180],"best":[120],"patrolling":[121],"is":[124],"suitable":[126],"for":[127,181],"defender":[129],"by":[130,148],"searching":[131],"policy":[133],"multi-dimensional":[136],"discrete":[137],"action":[138],"space,":[139],"enables":[141],"multiple":[142],"agents":[144],"cooperate":[146],"efficiently":[147],"training":[149],"multi-intelligent":[151],"Dueling":[152],"Double":[153],"Deep":[154],"Q-Network":[155],"(D3QN)":[156],"with":[157],"prioritized":[158],"experience":[159],"replay.":[160],"Finally,":[161],"experimental":[163],"results":[164],"show":[165],"SDSA-learned":[168],"can":[172],"provide":[173],"feasible":[175],"effective":[177],"protection":[179],"defenders":[182],"against":[183],"compared":[185],"MADDPG":[188],"OptGradFP":[190],"methods.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
