{"id":"https://openalex.org/W4388819958","doi":"https://doi.org/10.1109/jiot.2023.3333903","title":"Deep <i>Q</i>-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things","display_name":"Deep <i>Q</i>-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things","publication_year":2023,"publication_date":"2023-11-20","ids":{"openalex":"https://openalex.org/W4388819958","doi":"https://doi.org/10.1109/jiot.2023.3333903"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3333903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3333903","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029707367","display_name":"Shoujian Yu","orcid":"https://orcid.org/0000-0002-8092-7556"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]},{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["AU","CN"],"is_corresponding":true,"raw_author_name":"Shoujian Yu","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, China","School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]},{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rong Zhai","orcid":null},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Zhai","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021656350","display_name":"Yizhou Shen","orcid":"https://orcid.org/0000-0002-3769-7193"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yizhou Shen","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K","School of Computing, Newcastle University, Newcastle upon Tyne, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-3769-7193","affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, United Kingdom","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063366789","display_name":"Guowen Wu","orcid":"https://orcid.org/0000-0001-6464-0208"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guowen Wu","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-6464-0208","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430361","display_name":"Hong Zhang","orcid":"https://orcid.org/0000-0003-3607-0177"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0003-3607-0177","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]},{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, China","School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0003-4485-6743","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]},{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030903260","display_name":"Shigen Shen","orcid":"https://orcid.org/0000-0002-7558-5379"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shigen Shen","raw_affiliation_strings":["School of Information Engineering, Huzhou University, Huzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7558-5379","affiliations":[{"raw_affiliation_string":"School of Information Engineering, Huzhou University, Huzhou, China","institution_ids":["https://openalex.org/I3018263800"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5029707367"],"corresponding_institution_ids":["https://openalex.org/I114017466","https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":10.6246,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.9873398,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"11","issue":"7","first_page":"12536","last_page":"12550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8519853949546814},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6635844111442566},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5267621278762817},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.48460090160369873},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.4843667447566986},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.4667551517486572},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4570789635181427},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4339962303638458},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4053894281387329},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38498371839523315},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.36108291149139404},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.32153844833374023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28145307302474976}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8519853949546814},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6635844111442566},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5267621278762817},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.48460090160369873},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.4843667447566986},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.4667551517486572},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4570789635181427},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4339962303638458},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4053894281387329},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38498371839523315},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.36108291149139404},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.32153844833374023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28145307302474976},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3333903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3333903","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G3753519066","display_name":null,"funder_award_id":"LZ22F020002","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2604589052","https://openalex.org/W2783398758","https://openalex.org/W2885070483","https://openalex.org/W2890946036","https://openalex.org/W2924211215","https://openalex.org/W2944210580","https://openalex.org/W2946127746","https://openalex.org/W2969699559","https://openalex.org/W2973862992","https://openalex.org/W3005641848","https://openalex.org/W3006503311","https://openalex.org/W3033179699","https://openalex.org/W3035254752","https://openalex.org/W3037958117","https://openalex.org/W3101076092","https://openalex.org/W3104227430","https://openalex.org/W3126389064","https://openalex.org/W3129369183","https://openalex.org/W3162620147","https://openalex.org/W3163210918","https://openalex.org/W3165871547","https://openalex.org/W3196498627","https://openalex.org/W3200780444","https://openalex.org/W4221003802","https://openalex.org/W4280572029","https://openalex.org/W4292262762","https://openalex.org/W4296884725","https://openalex.org/W4304197403","https://openalex.org/W4312989743","https://openalex.org/W4317532053","https://openalex.org/W4321438421","https://openalex.org/W4322627042","https://openalex.org/W4328007138","https://openalex.org/W4366149343","https://openalex.org/W4366286067","https://openalex.org/W4377079722","https://openalex.org/W4386090462","https://openalex.org/W4386914101","https://openalex.org/W4389321233","https://openalex.org/W6771919375"],"related_works":["https://openalex.org/W4400868993","https://openalex.org/W3096874164","https://openalex.org/W1985560493","https://openalex.org/W2386410636","https://openalex.org/W2357975469","https://openalex.org/W2145363145","https://openalex.org/W1626977535","https://openalex.org/W4284974072","https://openalex.org/W2341346307","https://openalex.org/W4404955202"],"abstract_inverted_index":{"Industrial":[0],"Internet":[1],"of":[2,9,141,151,170,179,183,191],"Things":[3],"(IIoT)":[4],"has":[5],"brought":[6],"a":[7,75,90],"lot":[8],"convenience":[10],"for":[11,41,55],"the":[12,65,97,103,131,138,148,168,180,189,192],"industrial":[13],"world":[14],"to":[15,86,96,129,158,195],"digitization,":[16],"automation":[17],"and":[18,80,121],"intelligence,":[19],"but":[20],"it":[21],"inevitably":[22],"introduces":[23],"inherent":[24],"cyber":[25],"security":[26],"risks,":[27],"resulting":[28],"in":[29,69,100,107,177],"an":[30,50],"issue":[31],"that":[32],"traditional":[33],"intrusion":[34,70,108],"detection":[35,71,109],"techniques":[36],"are":[37],"no":[38],"longer":[39],"sufficient":[40],"IIoT":[42,56,164],"environments.":[43],"To":[44],"solve":[45,87,130],"this":[46,63],"issue,":[47],"we":[48,154],"propose":[49],"open-set":[51,66,104],"solution":[52],"called":[53],"DC-IDS":[54,171],"based":[57],"on":[58,163],"deep":[59],"reinforcement":[60],"learning.":[61],"In":[62],"solution,":[64],"recognition":[67,105,124,181],"problem":[68,106,120],"is":[72,84,94,110,144],"modeled":[73],"as":[74,186,188],"discrete-time":[76],"Markov":[77],"decision":[78],"process,":[79],"Deep":[81],"Q-Network":[82],"(DQN)":[83],"employed":[85],"it.":[88],"Meanwhile,":[89],"Conditional":[91],"Variational":[92],"Auto-Encoder":[93],"introduced":[95],"value":[98],"network":[99],"DQN.":[101],"Therefore,":[102],"divided":[111],"into":[112],"two":[113],"subproblems,":[114],"namely":[115],"known":[116,132,142],"traffic":[117,133,143],"fine-grained":[118,134],"classification":[119,135],"unknown":[122,152,160,184],"attacks":[123,185],"problem.":[125,136],"We":[126],"use":[127,155],"DQN":[128],"Since":[137],"reconstruction":[139,149,156],"error":[140,150,157],"generally":[145],"smaller":[146],"than":[147],"attacks,":[153],"recognize":[159],"attacks.":[161],"Experiments":[162],"dataset":[165],"TON-IoT":[166],"demonstrate":[167],"effectiveness":[169],"model,":[172],"which":[173],"achieves":[174],"better":[175],"performance":[176],"terms":[178],"rate":[182],"well":[187],"stability":[190],"model":[193],"compared":[194],"previous":[196],"proposed":[197],"methods.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":28},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
