{"id":"https://openalex.org/W4210645199","doi":"https://doi.org/10.1109/globecom46510.2021.9685693","title":"IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation","display_name":"IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4210645199","doi":"https://doi.org/10.1109/globecom46510.2021.9685693"},"language":"en","primary_location":{"id":"doi:10.1109/globecom46510.2021.9685693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685693","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101981863","display_name":"Qi Chen","orcid":"https://orcid.org/0000-0001-5195-8516"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["BD","CN"],"is_corresponding":true,"raw_author_name":"Qi Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Key Laboratory of Computer Network Technology of Jiangsu Province","Purple Mountain Laboratories","Key Laboratory of Computer Network Technology of Jiangsu Province, School of Cyber Science and Engineering, Southeast University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Key Laboratory of Computer Network Technology of Jiangsu Province","institution_ids":["https://openalex.org/I4210090971"]},{"raw_affiliation_string":"Purple Mountain Laboratories","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Key Laboratory of Computer Network Technology of Jiangsu Province, School of Cyber Science and Engineering, Southeast University","institution_ids":["https://openalex.org/I4210090971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081876978","display_name":"Yubo Song","orcid":"https://orcid.org/0000-0002-1347-6126"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]}],"countries":["BD","CN"],"is_corresponding":false,"raw_author_name":"Yubo Song","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Key Laboratory of Computer Network Technology of Jiangsu Province","Key Laboratory of Computer Network Technology of Jiangsu Province, School of Cyber Science and Engineering, Southeast University","Purple Mountain Laboratories"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Key Laboratory of Computer Network Technology of Jiangsu Province","institution_ids":["https://openalex.org/I4210090971"]},{"raw_affiliation_string":"Key Laboratory of Computer Network Technology of Jiangsu Province, School of Cyber Science and Engineering, Southeast University","institution_ids":["https://openalex.org/I4210090971"]},{"raw_affiliation_string":"Purple Mountain Laboratories","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042486447","display_name":"Brendan Jennings","orcid":"https://orcid.org/0000-0002-4945-7031"},"institutions":[{"id":"https://openalex.org/I7478328","display_name":"Waterford Institute of Technology","ror":"https://ror.org/03ypxwh20","country_code":"IE","type":"nonprofit","lineage":["https://openalex.org/I7478328"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Brendan Jennings","raw_affiliation_strings":["Telecommunications Software &#x0026; Systems Group, Waterford Institute of Technology","Telecommunications Software &#x0026"],"affiliations":[{"raw_affiliation_string":"Telecommunications Software &#x0026; Systems Group, Waterford Institute of Technology","institution_ids":["https://openalex.org/I7478328"]},{"raw_affiliation_string":"Telecommunications Software &#x0026","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072074575","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0002-4460-9091"},"institutions":[{"id":"https://openalex.org/I7478328","display_name":"Waterford Institute of Technology","ror":"https://ror.org/03ypxwh20","country_code":"IE","type":"nonprofit","lineage":["https://openalex.org/I7478328"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["Telecommunications Software &#x0026; Systems Group, Waterford Institute of Technology","Telecommunications Software &#x0026"],"affiliations":[{"raw_affiliation_string":"Telecommunications Software &#x0026; Systems Group, Waterford Institute of Technology","institution_ids":["https://openalex.org/I7478328"]},{"raw_affiliation_string":"Telecommunications Software &#x0026","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365935","display_name":"Bin Xiao","orcid":"https://orcid.org/0000-0003-4223-8220"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Bin Xiao","raw_affiliation_strings":["The Hong Kong Polytechnic University,Department of Computing"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University,Department of Computing","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076028438","display_name":"Shang Gao","orcid":"https://orcid.org/0000-0003-2692-057X"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shang Gao","raw_affiliation_strings":["The Hong Kong Polytechnic University,Department of Computing"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University,Department of Computing","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101981863"],"corresponding_institution_ids":["https://openalex.org/I4210090971","https://openalex.org/I4210155350"],"apc_list":null,"apc_paid":null,"fwci":4.0637,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.95270208,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8024060726165771},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7221683263778687},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5778285264968872},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.564297080039978},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5495785474777222},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5356478691101074},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.522294282913208},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5118617415428162},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.500457763671875},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4507867097854614},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.4169902205467224},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.386104553937912},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3783682584762573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2640243172645569},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1255151927471161}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8024060726165771},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7221683263778687},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5778285264968872},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.564297080039978},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5495785474777222},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5356478691101074},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.522294282913208},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5118617415428162},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.500457763671875},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4507867097854614},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.4169902205467224},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.386104553937912},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3783682584762573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2640243172645569},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1255151927471161},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom46510.2021.9685693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685693","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"},{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G6586979110","display_name":null,"funder_award_id":"13/RC/2077","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"}],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"},{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2574448563","https://openalex.org/W2898307979","https://openalex.org/W2901909474","https://openalex.org/W2953381066","https://openalex.org/W2961816263","https://openalex.org/W2963532960","https://openalex.org/W2966594777","https://openalex.org/W2982540247","https://openalex.org/W2992104486","https://openalex.org/W3101877327","https://openalex.org/W6732005117"],"related_works":["https://openalex.org/W2900953199","https://openalex.org/W2618984630","https://openalex.org/W2128167806","https://openalex.org/W2366221835","https://openalex.org/W16836940","https://openalex.org/W3157871125","https://openalex.org/W2144499422","https://openalex.org/W2217592955","https://openalex.org/W2541519225","https://openalex.org/W2152742912"],"abstract_inverted_index":{"Internet":[0],"of":[1,65,68,88,94,108,120,125,129,174,190],"Things":[2],"(IoT)":[3],"devices":[4,30],"deployed":[5],"in":[6,148,154],"publicly":[7],"accessible":[8],"locations":[9],"increasingly":[10],"encounter":[11],"security":[12],"threats":[13],"from":[14,183],"device":[15,45,59,95,121,155,175],"replacement":[16],"and":[17,24,61,111,118,133,187],"impersonation":[18],"attacks.":[19],"Unfortunately,":[20],"the":[21,86,92,159,164,172,188],"limited":[22],"memory":[23],"poor":[25],"computing":[26],"capability":[27],"on":[28,49,91,106],"such":[29],"make":[31],"solutions":[32],"involving":[33],"complex":[34],"algorithms":[35],"or":[36],"enhanced":[37],"authentication":[38],"protocols":[39],"untenable.":[40],"To":[41],"address":[42],"this":[43],"issue,":[44],"identification":[46],"technologies":[47],"based":[48,105],"traffic":[50,69],"characteristics":[51],"finger-printing":[52],"have":[53],"been":[54,83],"proposed":[55],"to":[56,85,114,142,150,162,185],"prevent":[57],"illegal":[58],"intrusion":[60],"impersonation.":[62],"However,":[63],"because":[64],"time-dependent":[66],"distribution":[67],"characteristics,":[70],"these":[71],"approaches":[72],"often":[73],"become":[74],"less":[75],"accurate":[76],"over":[77],"time.":[78],"Meanwhile":[79],"insufficient":[80],"attention":[81],"has":[82],"paid":[84],"impact":[87],"possible":[89],"changes":[90],"accuracy":[93,117,173],"identification.":[96,122],"Therefore,":[97],"we":[98,157],"propose":[99],"a":[100,139],"novel":[101],"feature":[102,109,126,167],"selection":[103],"method":[104],"degree":[107,124],"drift":[110],"genetic":[112,160],"algorithm":[113,161],"keep":[115],"high":[116],"stability":[119],"The":[123],"drift&#x2014;":[127],"relevance":[128],"features":[130],"through":[131],"time":[132],"gain":[134],"ratio":[135],"are":[136],"combined":[137],"as":[138],"composite":[140],"metric":[141],"filter":[143],"out":[144],"stable":[145],"features.":[146],"Furthermore,":[147],"order":[149],"perform":[151],"equally":[152],"well":[153],"identification,":[156],"use":[158],"select":[163],"most":[165],"discriminate":[166],"subset.":[168],"Experiments":[169],"show":[170],"that":[171],"recognition":[176,191],"compared":[177],"with":[178],"other":[179],"methods":[180],"is":[181,192],"increased":[182],"86.4&#x0025;":[184],"94.5&#x0025;,":[186],"robustness":[189],"also":[193],"improved.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":7}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
