{"id":"https://openalex.org/W7138932887","doi":"https://doi.org/10.1109/globecom59602.2025.11431667","title":"Temporal Features for IoT Devices: Out-of-Distribution Detection without Upper-Layer Dependencies","display_name":"Temporal Features for IoT Devices: Out-of-Distribution Detection without Upper-Layer Dependencies","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138932887","doi":"https://doi.org/10.1109/globecom59602.2025.11431667"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11431667","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431667","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128652523","display_name":"Jian Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Liu","raw_affiliation_strings":["Guizhou Normal University"],"affiliations":[{"raw_affiliation_string":"Guizhou Normal University","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129764532","display_name":"Huan Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Yan","raw_affiliation_strings":["Guizhou Normal University"],"affiliations":[{"raw_affiliation_string":"Guizhou Normal University","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121799232","display_name":"Jinyang Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyang Huang","raw_affiliation_strings":["Hefei University of Technology"],"affiliations":[{"raw_affiliation_string":"Hefei University of Technology","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129995521","display_name":"Xiang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Zhang","raw_affiliation_strings":["University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5128652523"],"corresponding_institution_ids":["https://openalex.org/I154893126"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.86701008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"302","last_page":"307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8924000263214111,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8924000263214111,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.041999999433755875,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.00839999970048666,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6288999915122986},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6025000214576721},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5389999747276306},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.4781000018119812},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.47440001368522644},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4722000062465668},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4708000123500824},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46230000257492065},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4489000141620636}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7767999768257141},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6288999915122986},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.621999979019165},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6025000214576721},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5389999747276306},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.4781000018119812},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.47440001368522644},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4722000062465668},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4708000123500824},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46230000257492065},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4489000141620636},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4185999929904938},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.4171000123023987},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3961000144481659},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.3856000006198883},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.37610000371932983},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.37470000982284546},{"id":"https://openalex.org/C117468950","wikidata":"https://www.wikidata.org/wiki/Q208074","display_name":"Network layer","level":3,"score":0.361299991607666},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3357999920845032},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.30799999833106995},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C7345512","wikidata":"https://www.wikidata.org/wiki/Q209372","display_name":"Transport layer","level":3,"score":0.2924000024795532},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C141353440","wikidata":"https://www.wikidata.org/wiki/Q182221","display_name":"Fuse (electrical)","level":2,"score":0.2825999855995178},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.27149999141693115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27000001072883606},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.2628999948501587},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11431667","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431667","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5305094122886658,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2079735306","https://openalex.org/W2887149310","https://openalex.org/W2905724129","https://openalex.org/W2961934743","https://openalex.org/W3047208927","https://openalex.org/W3155343069","https://openalex.org/W3191834646","https://openalex.org/W4210958556","https://openalex.org/W4361769806","https://openalex.org/W4389319131","https://openalex.org/W4405014573","https://openalex.org/W4407827510","https://openalex.org/W4408859286"],"related_works":[],"abstract_inverted_index":{"The":[0],"large-scale":[1],"deployment":[2],"of":[3],"IoT":[4,157],"devices":[5,26,158],"accelerates":[6],"intelligent":[7],"applications":[8],"but":[9],"also":[10],"brings":[11],"significant":[12],"security":[13],"risks.":[14],"Device":[15],"detection":[16,36,78,173],"helps":[17],"mitigate":[18],"these":[19,71,115],"risks":[20],"by":[21],"identifying":[22],"unauthorized":[23],"or":[24,110],"rogue":[25],"and":[27,41,54,101,131,149,171],"improving":[28],"visibility":[29],"into":[30,119],"network":[31,40,109],"activity.":[32],"However,":[33],"existing":[34],"device":[35,169],"methods":[37],"based":[38,80],"on":[39,81,107,154],"transport":[42,111],"layer":[43,112],"protocols":[44],"face":[45],"two":[46],"key":[47],"challenges:":[48],"encrypted":[49],"traffic":[50],"conceals":[51],"protocol":[52,95],"information,":[53],"most":[55],"approaches":[56],"fail":[57],"to":[58,127,144],"detect":[59,145],"out-of-distribution":[60],"(OOD)":[61],"devices,":[62],"limiting":[63],"their":[64],"effectiveness":[65],"in":[66],"real-world":[67],"scenarios.":[68],"To":[69],"address":[70],"issues,":[72],"this":[73],"paper":[74],"proposes":[75],"an":[76],"OOD":[77,150,172],"method":[79,166],"the":[82,93,132,164],"802.11":[83,94],"protocol.":[84],"Specifically,":[85],"we":[86],"first":[87],"extract":[88],"intrinsic":[89],"packet":[90,102],"attributes":[91],"from":[92],"headers,":[96],"including":[97],"transmission":[98],"timing":[99],"patterns":[100],"structure":[103],"characteristics,":[104],"without":[105],"relying":[106],"any":[108],"information.":[113],"Then,":[114],"features":[116],"are":[117,136],"input":[118],"a":[120],"bidirectional":[121],"long":[122],"short-term":[123],"memory":[124],"(LSTM)":[125],"model":[126],"learn":[128],"sequential":[129],"dependencies,":[130],"extracted":[133],"feature":[134],"embeddings":[135],"evaluated":[137],"through":[138],"k-nearest":[139],"neighbor":[140],"(KNN)":[141],"distance":[142],"calculation":[143],"both":[146],"in-distribution":[147],"(ID)":[148],"samples.":[151],"Experiments":[152],"conducted":[153],"12":[155],"commercial":[156],"spanning":[159],"8":[160],"categories":[161],"demonstrate":[162],"that":[163],"proposed":[165],"achieves":[167],"effective":[168],"identification":[170],"performance.":[174]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-03-20T00:00:00"}
