{"id":"https://openalex.org/W3115360974","doi":"https://doi.org/10.1109/jiot.2020.3048038","title":"Adversarial Attacks Against Network Intrusion Detection in IoT Systems","display_name":"Adversarial Attacks Against Network Intrusion Detection in IoT Systems","publication_year":2020,"publication_date":"2020-12-30","ids":{"openalex":"https://openalex.org/W3115360974","doi":"https://doi.org/10.1109/jiot.2020.3048038","mag":"3115360974"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3048038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3048038","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019692903","display_name":"Han Qiu","orcid":"https://orcid.org/0000-0003-2678-8070"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"id":"https://openalex.org/I4210165912","display_name":"Laboratoire Traitement et Communication de l\u2019Information","ror":"https://ror.org/057er4c39","country_code":"FR","type":"facility","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102","https://openalex.org/I4210165912"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Han Qiu","raw_affiliation_strings":["LTCI, Telecom Paris, Palaiseau, France","Laboratory of Information, Network and Communication Sciences"],"affiliations":[{"raw_affiliation_string":"LTCI, Telecom Paris, Palaiseau, France","institution_ids":["https://openalex.org/I4210165912","https://openalex.org/I12356871"]},{"raw_affiliation_string":"Laboratory of Information, Network and Communication Sciences","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105471300","display_name":"Tian Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Dong","raw_affiliation_strings":["SPEIT, Shanghai Jiao Tong University, Shanghai, China","SPEIT, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"SPEIT, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"SPEIT, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101591101","display_name":"Tianwei Zhang","orcid":"https://orcid.org/0000-0001-6595-6650"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Tianwei Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore","School of Computer Engineering [Singapore]"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Computer Engineering [Singapore]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050019300","display_name":"Jialiang Lu","orcid":"https://orcid.org/0000-0002-6752-7224"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jialiang Lu","raw_affiliation_strings":["SPEIT, Shanghai Jiao Tong University, Shanghai, China","SPEIT, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"SPEIT, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"SPEIT, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022189378","display_name":"G\u00e9rard Memmi","orcid":"https://orcid.org/0000-0002-3380-8394"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]},{"id":"https://openalex.org/I4210145666","display_name":"Embedded Systems (United States)","ror":"https://ror.org/04742eh45","country_code":"US","type":"company","lineage":["https://openalex.org/I4210145666"]},{"id":"https://openalex.org/I4210165912","display_name":"Laboratoire Traitement et Communication de l\u2019Information","ror":"https://ror.org/057er4c39","country_code":"FR","type":"facility","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102","https://openalex.org/I4210165912"]}],"countries":["FR","US"],"is_corresponding":false,"raw_author_name":"Gerard Memmi","raw_affiliation_strings":["LTCI, Telecom Paris, Palaiseau, France","Autonomic and Critical Embedded Systems","D\u00e9partement Informatique et R\u00e9seaux"],"affiliations":[{"raw_affiliation_string":"LTCI, Telecom Paris, Palaiseau, France","institution_ids":["https://openalex.org/I4210165912","https://openalex.org/I12356871"]},{"raw_affiliation_string":"Autonomic and Critical Embedded Systems","institution_ids":["https://openalex.org/I4210145666"]},{"raw_affiliation_string":"D\u00e9partement Informatique et R\u00e9seaux","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083330935","display_name":"Meikang Qiu","orcid":"https://orcid.org/0000-0002-1004-0140"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"East Texas A&M University","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meikang Qiu","raw_affiliation_strings":["Department of Computer Science, Texas A&M University Commerce, Commerce, TX, USA","Texas A&M University\u2013Commerce"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas A&M University Commerce, Commerce, TX, USA","institution_ids":["https://openalex.org/I206651237"]},{"raw_affiliation_string":"Texas A&M University\u2013Commerce","institution_ids":["https://openalex.org/I206651237"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5019692903"],"corresponding_institution_ids":["https://openalex.org/I12356871","https://openalex.org/I4210165912"],"apc_list":null,"apc_paid":null,"fwci":29.762,"has_fulltext":false,"cited_by_count":304,"citation_normalized_percentile":{"value":0.99836985,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"8","issue":"13","first_page":"10327","last_page":"10335"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.848031759262085},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.7026522159576416},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6751765012741089},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.653916597366333},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6324415802955627},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5390147566795349},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4815676212310791},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.47940847277641296},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47902125120162964},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4570086896419525},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4520943760871887},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38191720843315125},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3587283492088318},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08936461806297302},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08722272515296936}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.848031759262085},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.7026522159576416},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6751765012741089},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.653916597366333},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6324415802955627},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5390147566795349},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4815676212310791},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.47940847277641296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47902125120162964},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4570086896419525},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4520943760871887},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38191720843315125},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3587283492088318},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08936461806297302},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08722272515296936}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2020.3048038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3048038","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-03559698v1","is_oa":false,"landing_page_url":"https://telecom-paris.hal.science/hal-03559698","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Internet of Things Journal, 2021, 8 (13), pp.10327-10335. &#x27E8;10.1109/JIOT.2020.3048038&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/159849","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/159849","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1616262590","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2006508099","https://openalex.org/W2142889610","https://openalex.org/W2212216676","https://openalex.org/W2461943168","https://openalex.org/W2560666832","https://openalex.org/W2584408238","https://openalex.org/W2748868501","https://openalex.org/W2760355118","https://openalex.org/W2765739766","https://openalex.org/W2766130346","https://openalex.org/W2783741806","https://openalex.org/W2888704015","https://openalex.org/W2890277584","https://openalex.org/W2892023843","https://openalex.org/W2911505293","https://openalex.org/W2923778952","https://openalex.org/W2934843808","https://openalex.org/W2963197901","https://openalex.org/W2963207607","https://openalex.org/W2964153729","https://openalex.org/W2964301649","https://openalex.org/W2964318098","https://openalex.org/W2991408690","https://openalex.org/W2997293639","https://openalex.org/W3015001695","https://openalex.org/W3024548636","https://openalex.org/W3024673672","https://openalex.org/W3037830434","https://openalex.org/W3089683609","https://openalex.org/W3102431071","https://openalex.org/W3103340107","https://openalex.org/W4302016602","https://openalex.org/W6743493502","https://openalex.org/W6777367609"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W98994209","https://openalex.org/W2502115930","https://openalex.org/W67940504","https://openalex.org/W2066014542","https://openalex.org/W2024170198","https://openalex.org/W4307079546","https://openalex.org/W4283317927","https://openalex.org/W1537875328"],"abstract_inverted_index":{"Deep":[0],"learning":[1],"(DL)":[2],"has":[3],"gained":[4],"popularity":[5],"in":[6,67,79,159],"network":[7,23,62],"intrusion":[8,63],"detection,":[9],"due":[10],"to":[11,33,45,75,91,111,131,152,163],"its":[12],"strong":[13],"capability":[14],"of":[15,28,100,115,157],"recognizing":[16],"subtle":[17],"differences":[18],"between":[19],"normal":[20],"and":[21,103,123],"malicious":[22,161],"activities.":[24],"Although":[25],"a":[26,56,97,105],"variety":[27],"methods":[29],"have":[30],"been":[31],"designed":[32],"leverage":[34],"DL":[35,77],"models":[36],"for":[37],"security":[38],"protection,":[39],"whether":[40],"these":[41,139],"systems":[42,65],"are":[43],"vulnerable":[44],"adversarial":[46,58],"examples":[47],"(AEs)":[48],"is":[49,89,108],"unknown.":[50],"In":[51],"this":[52],"article,":[53],"we":[54,141],"design":[55],"novel":[57],"attack":[59,168],"against":[60],"DL-based":[61],"detection":[64,121],"(NIDSs)":[66],"the":[68,76,93,113,120,124,148,160],"Internet-of-Things":[69],"environment,":[70],"with":[71,96],"only":[72,150],"black-box":[73,94],"accesses":[74],"model":[78,87,95],"such":[80],"NIDS.":[81],"We":[82],"introduce":[83],"two":[84],"techniques:":[85],"1)":[86],"extraction":[88],"adopted":[90],"replicate":[92],"small":[98],"amount":[99],"training":[101],"data":[102],"2)":[104],"saliency":[106],"map":[107],"then":[109],"used":[110],"disclose":[112],"impact":[114],"each":[116],"packet":[117],"attribute":[118],"on":[119],"results,":[122],"most":[125],"critical":[126],"features.":[127],"This":[128],"enables":[129],"us":[130],"efficiently":[132],"generate":[133],"AEs":[134],"using":[135],"conventional":[136],"methods.":[137],"With":[138],"tehniques,":[140],"successfully":[142],"compromise":[143],"one":[144],"state-of-the-art":[145],"NIDS,":[146],"Kitsune:":[147],"adversary":[149],"needs":[151],"modify":[153],"less":[154],"than":[155],"0.005%":[156],"bytes":[158],"packets":[162],"achieve":[164],"an":[165],"average":[166],"94.31%":[167],"success":[169],"rate.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":10},{"year":2025,"cited_by_count":56},{"year":2024,"cited_by_count":54},{"year":2023,"cited_by_count":90},{"year":2022,"cited_by_count":73},{"year":2021,"cited_by_count":21}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
