{"id":"https://openalex.org/W3046177689","doi":"https://doi.org/10.1109/icc40277.2020.9148951","title":"Data Integrity Attacks against Traffic Modeling and Forecasting in M2M Communications","display_name":"Data Integrity Attacks against Traffic Modeling and Forecasting in M2M Communications","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3046177689","doi":"https://doi.org/10.1109/icc40277.2020.9148951","mag":"3046177689"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9148951","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148951","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062031330","display_name":"Yalong Wu","orcid":"https://orcid.org/0000-0001-9879-431X"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yalong Wu","raw_affiliation_strings":["Department of Computer and Information Sciences, Towson University, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Towson University, MD, USA","institution_ids":["https://openalex.org/I4322298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002139930","display_name":"Wei Yu","orcid":"https://orcid.org/0000-0003-4522-7340"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Yu","raw_affiliation_strings":["Department of Computer and Information Sciences, Towson University, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Towson University, MD, USA","institution_ids":["https://openalex.org/I4322298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087871020","display_name":"Yunwei Cui","orcid":"https://orcid.org/0000-0003-3474-5783"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yunwei Cui","raw_affiliation_strings":["Department of Mathematics, Towson University, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Towson University, MD, USA","institution_ids":["https://openalex.org/I4322298"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045320043","display_name":"Chao Lu","orcid":"https://orcid.org/0000-0001-7517-2868"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chao Lu","raw_affiliation_strings":["Department of Computer and Information Sciences, Towson University, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Towson University, MD, USA","institution_ids":["https://openalex.org/I4322298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062031330"],"corresponding_institution_ids":["https://openalex.org/I4322298"],"apc_list":null,"apc_paid":null,"fwci":0.3084,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60508913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7180994749069214},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6108801960945129},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5517647862434387},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.4961288869380951},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.48545295000076294},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4310719072818756},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.41858434677124023},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3708766996860504},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3355332612991333},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18791860342025757}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7180994749069214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6108801960945129},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5517647862434387},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.4961288869380951},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.48545295000076294},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4310719072818756},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.41858434677124023},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3708766996860504},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3355332612991333},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18791860342025757},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9148951","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148951","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1570018622","https://openalex.org/W1986085123","https://openalex.org/W2044121999","https://openalex.org/W2088445921","https://openalex.org/W2098897917","https://openalex.org/W2109156380","https://openalex.org/W2148719904","https://openalex.org/W2342932645","https://openalex.org/W2559052892","https://openalex.org/W2596636257","https://openalex.org/W2742173809","https://openalex.org/W2768475350","https://openalex.org/W2963720577","https://openalex.org/W2982636346"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Internet":[0],"of":[1,9,24,64,95],"Things":[2],"(IoT)":[3],"communications":[4],"include":[5],"an":[6],"exceptional":[7],"number":[8,23,94],"Machine-to-Machine":[10],"(M2M)":[11],"devices":[12,98],"to":[13,46,83,88,126],"enable":[14],"automation":[15],"in":[16,22,41,123],"smart-world":[17],"systems.":[18],"Given":[19],"the":[20,62,93],"explosion":[21],"distributed":[25],"computing":[26],"devices,":[27],"traffic":[28,39],"modeling":[29,106],"and":[30,36,55,107,129],"forecasting":[31],"(TMF)":[32],"schemes,":[33],"which":[34],"imitate":[35],"predict":[37],"device":[38],"dynamics":[40],"M2M":[42,81,90,97],"communications,":[43],"become":[44],"critical":[45],"providing":[47],"useful":[48],"guidance":[49],"for":[50],"constrained":[51],"network":[52],"resource":[53],"planning":[54],"scheduling.":[56],"In":[57],"this":[58],"paper,":[59],"we":[60,73],"explore":[61],"vulnerability":[63],"TMF,":[65],"particularly":[66],"focusing":[67],"on":[68,111],"data":[69,118],"integrity":[70,119],"attacks.":[71],"Specifically,":[72],"consider":[74],"a":[75],"generic":[76],"attack":[77,109],"with":[78],"adversaries":[79],"impersonating":[80],"networks":[82],"send":[84],"fake":[85],"triggering":[86],"messages":[87],"detached":[89],"devices.":[91],"Thus,":[92],"attached":[96],"can":[99],"be":[100],"manipulated.":[101],"We":[102],"additionally":[103],"conduct":[104],"threat":[105],"investigate":[108],"impacts":[110],"TMF.":[112],"Our":[113],"experimental":[114],"results":[115],"show":[116],"that":[117],"attacks":[120],"are":[121],"effective":[122],"disrupting":[124],"TMF":[125],"reduce":[127],"goodness-of-fit":[128],"prediction":[130],"accuracy.":[131]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
