{"id":"https://openalex.org/W4297094626","doi":"https://doi.org/10.1109/access.2022.3210189","title":"Traffic Anomaly Detection in Wireless Sensor Networks Based on Principal Component Analysis and Deep Convolution Neural Network","display_name":"Traffic Anomaly Detection in Wireless Sensor Networks Based on Principal Component Analysis and Deep Convolution Neural Network","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4297094626","doi":"https://doi.org/10.1109/access.2022.3210189"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3210189","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3210189","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09903592.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09903592.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069058776","display_name":"Chengpeng Yao","orcid":"https://orcid.org/0000-0003-4526-0239"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chengpeng Yao","raw_affiliation_strings":["College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059619604","display_name":"Yang Yu","orcid":"https://orcid.org/0000-0003-3308-3941"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu Yang","raw_affiliation_strings":["College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034903266","display_name":"Kun Yin","orcid":"https://orcid.org/0000-0002-5882-0322"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kun Yin","raw_affiliation_strings":["College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100872159","display_name":"Jinwei Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinwei Yang","raw_affiliation_strings":["College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Engineering University of PAP, Xi&#x2019;an, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5069058776"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.8509,"has_fulltext":true,"cited_by_count":52,"citation_normalized_percentile":{"value":0.97360876,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"103136","last_page":"103149"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7906193733215332},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6680727005004883},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.513477623462677},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48292967677116394},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.47228580713272095},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46167823672294617},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.41509705781936646},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40603673458099365},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37836915254592896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7906193733215332},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6680727005004883},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.513477623462677},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48292967677116394},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.47228580713272095},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46167823672294617},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41509705781936646},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40603673458099365},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37836915254592896}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3210189","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3210189","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09903592.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:867388fbdc87471f84b163a456965ecb","is_oa":true,"landing_page_url":"https://doaj.org/article/867388fbdc87471f84b163a456965ecb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 103136-103149 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3210189","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3210189","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09903592.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4297094626.pdf","grobid_xml":"https://content.openalex.org/works/W4297094626.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W1995678176","https://openalex.org/W1997687273","https://openalex.org/W2074553104","https://openalex.org/W2112796928","https://openalex.org/W2296509296","https://openalex.org/W2531409750","https://openalex.org/W2798060819","https://openalex.org/W2922628727","https://openalex.org/W3005097670","https://openalex.org/W3026890586","https://openalex.org/W3033675321","https://openalex.org/W3033801848","https://openalex.org/W3047217884","https://openalex.org/W3088673468","https://openalex.org/W3089831155","https://openalex.org/W3102091066","https://openalex.org/W3112746081","https://openalex.org/W3119781401","https://openalex.org/W3128286744","https://openalex.org/W3134836427","https://openalex.org/W3136683205","https://openalex.org/W3146366485","https://openalex.org/W3149699838","https://openalex.org/W3153226991","https://openalex.org/W3157156764","https://openalex.org/W3158757798","https://openalex.org/W3167545512","https://openalex.org/W3171024612","https://openalex.org/W3171364527","https://openalex.org/W3177795942","https://openalex.org/W3182114900","https://openalex.org/W3190009836","https://openalex.org/W3194745185","https://openalex.org/W3201449557","https://openalex.org/W3202083238","https://openalex.org/W3206674745","https://openalex.org/W3206912558","https://openalex.org/W4200305402","https://openalex.org/W4205608240","https://openalex.org/W4210779665","https://openalex.org/W4214893216","https://openalex.org/W4220982575","https://openalex.org/W4280641795","https://openalex.org/W4280648900","https://openalex.org/W4283776948","https://openalex.org/W4288049701","https://openalex.org/W6638444622","https://openalex.org/W6838850798","https://openalex.org/W6839143224"],"related_works":["https://openalex.org/W1975632186","https://openalex.org/W3027745756","https://openalex.org/W2531880140","https://openalex.org/W3205213561","https://openalex.org/W2036609560","https://openalex.org/W346861917","https://openalex.org/W3024018414","https://openalex.org/W385273440","https://openalex.org/W4380081032","https://openalex.org/W2068561554"],"abstract_inverted_index":{"With":[0],"the":[1,51,93,100,109,114,143,146,164,168,173],"popularity":[2],"of":[3,18,37,95,104,145,167,189],"wireless":[4,6],"networks,":[5],"sensor":[7],"networks":[8],"(WSNs)":[9],"have":[10,20],"advanced":[11],"rapidly,":[12],"and":[13,16,77,99,121,157],"their":[14,105],"flexibility":[15],"ease":[17],"deployment":[19],"resulted":[21],"in":[22,89,134,187],"more":[23,122],"security":[24],"concerns,":[25],"making":[26],"it":[27],"critical":[28],"to":[29,97,162],"research":[30],"network":[31,43,82,131],"intrusion":[32],"prevention":[33],"for":[34,84],"WSNs.":[35],"Denial":[36],"service":[38],"(DoS)":[39],"is":[40],"a":[41,69,78,118],"common":[42],"attack,":[44],"achieving":[45],"its":[46],"goal":[47],"by":[48],"bringing":[49],"down":[50],"target":[52],"network.":[53],"A":[54],"DoS":[55,85],"attack":[56],"on":[57,72,92],"WSNs":[58,96,135],"devices":[59,136],"with":[60,108,137,176],"limited":[61,101,138],"resources":[62],"would":[63],"be":[64],"fatal.":[65],"This":[66],"paper":[67],"proposes":[68],"method":[70],"based":[71,91],"principal":[73],"component":[74],"analysis":[75],"(PCA)":[76],"deep":[79,111],"convolution":[80],"neural":[81],"(DCNN)":[83],"traffic":[86,133,184],"anomaly":[87],"detection":[88,185],"WSNs,":[90],"vulnerability":[94],"attacks":[98],"storage":[102,139],"space":[103],"devices.":[106],"Compared":[107],"conventional":[110],"learning":[112],"structure,":[113],"proposed":[115,147,174],"model":[116,178],"has":[117],"lightweight":[119],"structure":[120],"effective":[123],"feature":[124],"extraction":[125],"capability,":[126],"which":[127],"can":[128],"effectively":[129],"detect":[130],"abnormal":[132,183],"capacity.":[140],"To":[141],"assure":[142],"effectiveness":[144],"model,":[148,175],"receiver":[149],"operating":[150],"characteristic":[151],"(ROC)":[152],"curves,":[153],"various":[154],"classification":[155,165,190],"metrics,":[156],"confusion":[158],"matrices":[159],"are":[160],"used":[161],"verify":[163],"results":[166],"model.":[169],"Through":[170],"experimental":[171],"comparison,":[172],"small":[177],"size,":[179],"outperforms":[180],"other":[181],"mainstream":[182],"models":[186],"terms":[188],"effect.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":23},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
