{"id":"https://openalex.org/W4210742851","doi":"https://doi.org/10.1109/globecom46510.2021.9685728","title":"Deep Learning Based Device Classification Method for Safeguarding Internet of Things","display_name":"Deep Learning Based Device Classification Method for Safeguarding Internet of Things","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4210742851","doi":"https://doi.org/10.1109/globecom46510.2021.9685728"},"language":"en","primary_location":{"id":"doi:10.1109/globecom46510.2021.9685728","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685728","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079396775","display_name":"Yantian Luo","orcid":"https://orcid.org/0000-0001-6947-6486"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yantian Luo","raw_affiliation_strings":["Tsinghua University,Department of Electronic Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of Electronic Engineering,Beijing,China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101755392","display_name":"Xu Chen","orcid":"https://orcid.org/0000-0003-0144-1775"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Chen","raw_affiliation_strings":["Tsinghua University,Department of Electronic Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of Electronic Engineering,Beijing,China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053547427","display_name":"Ning Ge","orcid":"https://orcid.org/0000-0002-4922-7025"},"institutions":[{"id":"https://openalex.org/I4210156423","display_name":"National Engineering Research Center for Information Technology in Agriculture","ror":"https://ror.org/04c3j3t84","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210156423"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Ge","raw_affiliation_strings":["Tsinghua University,Department of Electronic Engineering,Beijing,China","Beijing National Research Center for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of Electronic Engineering,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Beijing National Research Center for Information Science and Technology, Beijing, China","institution_ids":["https://openalex.org/I4210156423"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053012932","display_name":"Jianhua L\u00fc","orcid":"https://orcid.org/0000-0002-0314-9172"},"institutions":[{"id":"https://openalex.org/I4210156423","display_name":"National Engineering Research Center for Information Technology in Agriculture","ror":"https://ror.org/04c3j3t84","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210156423"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Lu","raw_affiliation_strings":["Tsinghua University,Department of Electronic Engineering,Beijing,China","Beijing National Research Center for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of Electronic Engineering,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Beijing National Research Center for Information Science and Technology, Beijing, China","institution_ids":["https://openalex.org/I4210156423"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079396775"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":1.54,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82259268,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8741331696510315},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8714005351066589},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6001718640327454},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5516036748886108},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5378493666648865},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5208066701889038},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5190140008926392},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5117983222007751},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.49566543102264404},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.462196409702301},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.41597092151641846},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11590370535850525},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11412522196769714}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8741331696510315},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8714005351066589},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6001718640327454},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5516036748886108},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5378493666648865},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5208066701889038},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5190140008926392},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5117983222007751},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.49566543102264404},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.462196409702301},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.41597092151641846},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11590370535850525},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11412522196769714},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom46510.2021.9685728","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom46510.2021.9685728","pdf_url":null,"source":{"id":"https://openalex.org/S4363607714","display_name":"2021 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G6431189122","display_name":null,"funder_award_id":"61922049,61941104,61771286","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1836465849","https://openalex.org/W1903029394","https://openalex.org/W2012095206","https://openalex.org/W2051000513","https://openalex.org/W2095705004","https://openalex.org/W2108598243","https://openalex.org/W2121973001","https://openalex.org/W2194775991","https://openalex.org/W2317266891","https://openalex.org/W2621148797","https://openalex.org/W2750674396","https://openalex.org/W2780713686","https://openalex.org/W2787462624","https://openalex.org/W2799758613","https://openalex.org/W2921669466","https://openalex.org/W3010718229","https://openalex.org/W3035366542","https://openalex.org/W3046687504","https://openalex.org/W3103408716","https://openalex.org/W3122864121","https://openalex.org/W3128254715","https://openalex.org/W3137434241","https://openalex.org/W6638667902","https://openalex.org/W6674330103","https://openalex.org/W6779330693"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4312417841","https://openalex.org/W3193565141","https://openalex.org/W3133861977","https://openalex.org/W3167935049","https://openalex.org/W3029198973","https://openalex.org/W2577968487"],"abstract_inverted_index":{"With":[0],"the":[1,19,135,153],"rapid":[2],"development":[3],"of":[4,10,12,22,39,85,155,165],"5G":[5],"networks,":[6],"a":[7,71,110,141,160],"great":[8],"amount":[9],"Internet":[11],"Things":[13],"(IoT)":[14],"devices":[15,24],"are":[16,25,30],"connected":[17],"to":[18,35,54,80,121],"Internet.":[20],"Most":[21],"these":[23],"cost":[26],"limited":[27],"and":[28,88,168],"thus":[29,58,89],"easily":[31],"compromised":[32],"by":[33],"attackers":[34],"launch":[36],"distributed":[37],"denial":[38],"service":[40],"(DDoS)":[41],"attacks.":[42],"The":[43],"traditional":[44,96],"DDoS":[45,60,92],"defense":[46],"methods":[47],"at":[48],"server":[49],"side":[50],"can":[51],"not":[52],"adapt":[53],"this":[55,67],"new":[56],"challenge,":[57],"access-side":[59,91],"detection":[61],"architecture":[62],"is":[63],"urgently":[64],"needed.":[65],"In":[66],"paper,":[68],"we":[69,108,139],"propose":[70,109,140],"deep":[72],"learning":[73,101],"(DL)":[74],"based":[75,98,115,145],"IoT":[76],"device":[77],"classification":[78,131],"method":[79,114,144],"support":[81],"fine-grained":[82],"behavior":[83],"modeling":[84],"malicious":[86],"traffic":[87],"enable":[90],"detection.":[93],"Different":[94],"from":[95],"studies":[97],"on":[99,116,146],"machine":[100],"(ML)":[102],"which":[103,158],"need":[104],"expertise":[105],"feature":[106,136,142],"engineering,":[107],"time":[111,125],"characteristics":[112],"extraction":[113],"1-D":[117],"convolutional":[118],"neural":[119],"network":[120],"capture":[122],"high":[123],"level":[124],"series":[126],"features":[127],"automatically":[128],"for":[129],"better":[130],"performance.":[132],"To":[133],"avoid":[134],"loss":[137],"problem,":[138],"enhancement":[143],"residual":[147],"connection":[148],"module.":[149],"Experimental":[150],"results":[151],"verify":[152],"effectiveness":[154],"our":[156],"method,":[157],"offers":[159],"meaningful":[161],"gain":[162],"in":[163],"terms":[164],"both":[166],"accuracy":[167],"macro":[169],"F1":[170],"score":[171],"over":[172],"existing":[173],"approaches.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
