{"id":"https://openalex.org/W3045734364","doi":"https://doi.org/10.1109/icc40277.2020.9148944","title":"A Deep Learning-Based DDoS Detection Framework for Internet of Things","display_name":"A Deep Learning-Based DDoS Detection Framework for Internet of Things","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3045734364","doi":"https://doi.org/10.1109/icc40277.2020.9148944","mag":"3045734364"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9148944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100647266","display_name":"Li Ma","orcid":"https://orcid.org/0000-0003-1937-6019"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Ma","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064546322","display_name":"Ying Chai","orcid":null},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Chai","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026963407","display_name":"Lei Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I46305995","display_name":"Taiyuan University of Science and Technology","ror":"https://ror.org/01wcbdc92","country_code":"CN","type":"education","lineage":["https://openalex.org/I46305995"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Cui","raw_affiliation_strings":["School of Electronic Information Engineering, Taiyuan University of Science and Technology, Taiyuan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information Engineering, Taiyuan University of Science and Technology, Taiyuan, China","institution_ids":["https://openalex.org/I46305995"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101090971","display_name":"Dongchao Ma","orcid":"https://orcid.org/0000-0001-5897-1027"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongchao Ma","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005015574","display_name":"Yingxun Fu","orcid":"https://orcid.org/0000-0002-5796-7314"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingxun Fu","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058472901","display_name":"Ailing Xiao","orcid":"https://orcid.org/0000-0002-5582-1944"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ailing Xiao","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100647266"],"corresponding_institution_ids":["https://openalex.org/I1456306"],"apc_list":null,"apc_paid":null,"fwci":4.1911,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.94392418,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8438758850097656},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6306405067443848},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6001601815223694},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5889334678649902},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5356711149215698},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5123389959335327},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.49791955947875977},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4584694504737854},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4453344941139221},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4316267669200897},{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.4216480851173401},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36502599716186523},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2334989309310913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8438758850097656},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6306405067443848},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6001601815223694},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5889334678649902},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5356711149215698},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5123389959335327},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.49791955947875977},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4584694504737854},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4453344941139221},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4316267669200897},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.4216480851173401},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36502599716186523},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2334989309310913},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9148944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2183224697","https://openalex.org/W2267339884","https://openalex.org/W2399941526","https://openalex.org/W2607252931","https://openalex.org/W2607918523","https://openalex.org/W2759043405","https://openalex.org/W2783741806","https://openalex.org/W2793241364","https://openalex.org/W2797742547","https://openalex.org/W2810292802","https://openalex.org/W2885618505","https://openalex.org/W2891406774","https://openalex.org/W2891735647","https://openalex.org/W2911505293","https://openalex.org/W2963178695","https://openalex.org/W2964248614","https://openalex.org/W3105750153"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W4390188535","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,63,113,149],"system":[2],"(IDS)":[3],"is":[4],"an":[5],"active":[6],"defense":[7],"mechanism":[8],"implemented":[9],"by":[10],"the":[11,19,30,39,52,59,77,82,90,111,124,134],"Internet":[12],"of":[13,41,51,55,62,126],"Things":[14],"(IoT),":[15],"which":[16],"can":[17],"identify":[18],"intrusion":[20],"behavior":[21],"and":[22,32,58,121,140],"initiate":[23],"alarms.":[24],"However,":[25],"there":[26],"are":[27],"concerns":[28,48],"regarding":[29],"sustainability":[31],"feasibility":[33],"to":[34,75,118,144],"existing":[35],"schemes":[36],"when":[37],"facing":[38],"increasing":[40,53],"threats":[42],"in":[43,49,150],"IoT.":[44],"In":[45,65,109],"particular,":[46],"these":[47],"terms":[50],"levels":[54,61],"adaptive":[56],"performance":[57],"insufficient":[60],"accuracy.":[64],"this":[66],"paper,":[67],"we":[68,96],"present":[69],"a":[70,99],"novel":[71],"deep":[72],"learning":[73],"method":[74],"address":[76],"aforementioned":[78],"concerns.":[79],"We":[80],"detail":[81],"proposed":[83,112],"convolution":[84],"neural":[85],"network":[86],"model":[87,136],"based":[88,104],"on":[89,105],"developed":[91,135],"feature":[92],"fusion":[93],"mechanism.":[94],"Furthermore,":[95],"also":[97],"propose":[98],"Symmetric":[100],"logarithmic":[101],"loss":[102],"function":[103],"categorical":[106],"cross":[107],"entropy.":[108],"addition,":[110],"framework":[114],"has":[115,141],"been":[116],"applied":[117,146],"GPU-enabled":[119],"TensorFlow,":[120],"evaluated":[122],"using":[123],"benchmark":[125],"NSL-KDD":[127],"datasets.":[128],"Extensive":[129],"experimental":[130],"results":[131],"indicate":[132],"that":[133],"outperforms":[137],"traditional":[138],"approaches":[139],"great":[142],"potential":[143],"be":[145],"for":[147],"attacks":[148],"IoTs.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":7}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
