{"id":"https://openalex.org/W4285199572","doi":"https://doi.org/10.1109/jiot.2022.3188224","title":"Industrial IoT Intrusion Detection via Evolutionary Cost-Sensitive Learning and Fog Computing","display_name":"Industrial IoT Intrusion Detection via Evolutionary Cost-Sensitive Learning and Fog Computing","publication_year":2022,"publication_date":"2022-07-04","ids":{"openalex":"https://openalex.org/W4285199572","doi":"https://doi.org/10.1109/jiot.2022.3188224"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3188224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3188224","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046224094","display_name":"Akbar Telikani","orcid":"https://orcid.org/0000-0003-4467-4915"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Akbar Telikani","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031318875","display_name":"Jun Shen","orcid":"https://orcid.org/0000-0002-9403-7140"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Shen","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101445040","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0003-1317-8142"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100396039","display_name":"Peng Wang","orcid":"https://orcid.org/0000-0002-5397-9115"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Peng Wang","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046224094"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":null,"apc_paid":null,"fwci":7.7076,"has_fulltext":false,"cited_by_count":57,"citation_normalized_percentile":{"value":0.97818258,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"9","issue":"22","first_page":"23260","last_page":"23271"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.807140052318573},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7511459589004517},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6272756457328796},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5594828128814697},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5585280656814575},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5348485708236694},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5279055237770081},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5145418047904968},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4999513626098633},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4611068367958069},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3407895863056183},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2783922255039215},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1256386637687683},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09862607717514038}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.807140052318573},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7511459589004517},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6272756457328796},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5594828128814697},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5585280656814575},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5348485708236694},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5279055237770081},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5145418047904968},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4999513626098633},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4611068367958069},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3407895863056183},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2783922255039215},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1256386637687683},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09862607717514038},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2022.3188224","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3188224","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-11409","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/5862","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1595159159","https://openalex.org/W2148143831","https://openalex.org/W2155529731","https://openalex.org/W2296509296","https://openalex.org/W2570296101","https://openalex.org/W2800167607","https://openalex.org/W2883672015","https://openalex.org/W2910962950","https://openalex.org/W2921134108","https://openalex.org/W2970941190","https://openalex.org/W2978153077","https://openalex.org/W2986387098","https://openalex.org/W3007517706","https://openalex.org/W3009195050","https://openalex.org/W3017752721","https://openalex.org/W3022218140","https://openalex.org/W3027095011","https://openalex.org/W3028069824","https://openalex.org/W3040916395","https://openalex.org/W3044515030","https://openalex.org/W3044855437","https://openalex.org/W3086579950","https://openalex.org/W3087849800","https://openalex.org/W3091669872","https://openalex.org/W3096688134","https://openalex.org/W3105324058","https://openalex.org/W3162956350","https://openalex.org/W3175613352","https://openalex.org/W3204162860","https://openalex.org/W3207404093","https://openalex.org/W6764733053","https://openalex.org/W6802388392"],"related_works":["https://openalex.org/W4312417841","https://openalex.org/W4321369474","https://openalex.org/W2731899572","https://openalex.org/W3133861977","https://openalex.org/W4200173597","https://openalex.org/W3116150086","https://openalex.org/W2364921833","https://openalex.org/W2274254580","https://openalex.org/W2999805992","https://openalex.org/W3014300295"],"abstract_inverted_index":{"Cyber":[0],"attacks":[1],"and":[2,55,89,140,174,184,199,220,236],"intrusions":[3],"have":[4],"become":[5],"the":[6,10,13,72,76,97,114,118,122,133,152,154,159,172,180,208,215,229,243,247],"major":[7],"obstacles":[8],"to":[9,70,151,158,178],"adoption":[11],"of":[12,16,51,86,99,167,182,201,214,233,253],"Industrial":[14],"Internet":[15],"Things":[17],"(IIoT)":[18],"in":[19,29],"critical":[20],"industries.":[21],"Imbalanced":[22],"data":[23,95,115,176,205,230],"distribution":[24],"is":[25,111,135,156,169],"a":[26,48,61,105],"common":[27],"problem":[28,198],"IIoT":[30,100,203],"environments":[31],"that":[32,189],"negatively":[33],"influence":[34],"machine":[35],"learning-based":[36],"intrusion":[37],"detection":[38,146],"systems":[39],"(IDSs).":[40],"To":[41],"address":[42],"this":[43,103],"issue,":[44],"we":[45],"introduce":[46],"EvolCostDeep,":[47],"hybrid":[49],"model":[50,124],"stacked":[52],"autoencoders":[53],"(SAE)":[54],"convolutional":[56],"neural":[57],"networks":[58],"(CNNs)":[59],"with":[60,125,207],"new":[62],"cost-dependent":[63],"loss":[64,67],"function.":[65],"The":[66,84,186,211],"function":[68],"aims":[69],"optimize":[71],"model\u2019s":[73],"parameters,":[74],"where":[75,117],"costs":[77],"are":[78,232,240],"determined":[79],"using":[80],"an":[81,250],"evolutionary":[82,87],"algorithm.":[83],"combination":[85],"algorithms":[88],"deep":[90],"learning":[91],"(DL)":[92],"on":[93,171,228],"Big":[94],"hinders":[96],"scalability":[98,200],"IDSs.":[101],"In":[102,128],"regard,":[104],"fog":[106,130],"computing-enabled":[107],"framework,":[108],"called":[109],"DeepIDSFog,":[110],"designed":[112],"at":[113],"level,":[116],"master":[119],"node":[120],"shares":[121],"EvolCostDeep":[123,134,183,216],"worker":[126,131,149],"nodes.":[127],"each":[129],"node,":[132],"parallelized":[136],"through":[137],"one":[138],"task-level":[139],"two":[141],"model-level":[142],"mechanisms.":[143],"After":[144],"aggregating":[145],"outputs":[147],"from":[148],"nodes":[150],"master,":[153],"result":[155],"passed":[157],"cloud":[160],"platform":[161],"for":[162,217],"mitigating":[163],"attacks.":[164],"A":[165],"series":[166],"experiments":[168],"conducted":[170],"ToN-IoT":[173],"UNSW-NB15":[175],"sets":[177,231],"evaluate":[179],"performance":[181],"DeepIDSFog.":[185],"results":[187],"show":[188],"our":[190],"frameworks":[191],"can":[192],"effectively":[193],"handle":[194],"both":[195],"class":[196],"imbalance":[197],"big":[202],"traffic":[204],"compared":[206,244],"other":[209,262],"models.":[210,264],"averaged":[212],"values":[213],"recall,":[218],"precision,":[219],"<inline-formula":[221,254],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[222,255],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[223,256],"<tex-math":[224,257],"notation=\"LaTeX\">$F1$":[225],"</tex-math></inline-formula>":[226,260],"-score":[227],"93.3%,":[234],"97.6%,":[235],"95.2%,":[237],"respectively,":[238],"which":[239],"higher":[241],"than":[242],"methods.":[245],"Also,":[246],"DeepIDSFog":[248],"provides":[249],"average":[251],"speedup":[252],"notation=\"LaTeX\">$38.7\\times":[258],"$":[259],"over":[261],"comparing":[263]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
