{"id":"https://openalex.org/W4394698935","doi":"https://doi.org/10.1109/jiot.2024.3387090","title":"MFGD3QN: Enhancing Edge Intelligence Defense Against DDoS With Mean-Field Games and Dueling Double Deep <i>Q</i>-Network","display_name":"MFGD3QN: Enhancing Edge Intelligence Defense Against DDoS With Mean-Field Games and Dueling Double Deep <i>Q</i>-Network","publication_year":2024,"publication_date":"2024-04-10","ids":{"openalex":"https://openalex.org/W4394698935","doi":"https://doi.org/10.1109/jiot.2024.3387090"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3387090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3387090","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030903260","display_name":"Shigen Shen","orcid":"https://orcid.org/0000-0002-7558-5379"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shigen Shen","raw_affiliation_strings":["School of Information Engineering, Huzhou University, Huzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Huzhou University, Huzhou, China","institution_ids":["https://openalex.org/I3018263800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101334600","display_name":"Chenpeng Cai","orcid":"https://orcid.org/0009-0009-8856-7557"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenpeng Cai","raw_affiliation_strings":["School of Information Engineering, Huzhou University, Huzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Huzhou University, Huzhou, China","institution_ids":["https://openalex.org/I3018263800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021656350","display_name":"Yizhou Shen","orcid":"https://orcid.org/0000-0002-3769-7193"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yizhou Shen","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K","School of Computing, Newcastle University, Newcastle upon Tyne, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, United Kingdom","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085123220","display_name":"Xiaoping Wu","orcid":"https://orcid.org/0000-0002-3588-9001"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoping Wu","raw_affiliation_strings":["School of Information Engineering, Huzhou University, Huzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Huzhou University, Huzhou, China","institution_ids":["https://openalex.org/I3018263800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072204073","display_name":"Wenlong Ke","orcid":"https://orcid.org/0000-0001-6733-1056"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenlong Ke","raw_affiliation_strings":["School of Information Engineering, Huzhou University, Huzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Huzhou University, Huzhou, China","institution_ids":["https://openalex.org/I3018263800"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Computer Science, University of Technology Sydney, Sydney, NSW, Australia","School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030903260"],"corresponding_institution_ids":["https://openalex.org/I3018263800"],"apc_list":null,"apc_paid":null,"fwci":9.4592,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.98768564,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"11","issue":"13","first_page":"23931","last_page":"23945"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9715999960899353,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7471184730529785},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7229833602905273},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4637826681137085},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.42474913597106934},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3417547643184662},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3293032646179199},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12191617488861084},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08297410607337952},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0672113299369812}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7471184730529785},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7229833602905273},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4637826681137085},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.42474913597106934},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3417547643184662},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3293032646179199},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12191617488861084},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08297410607337952},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0672113299369812},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3387090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3387090","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3753519066","display_name":null,"funder_award_id":"LZ22F020002","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W1023560205","https://openalex.org/W1987806716","https://openalex.org/W2283934557","https://openalex.org/W2516474116","https://openalex.org/W2746553466","https://openalex.org/W2761873684","https://openalex.org/W2794810159","https://openalex.org/W2806732601","https://openalex.org/W2891372471","https://openalex.org/W2892142441","https://openalex.org/W2896089337","https://openalex.org/W2908261578","https://openalex.org/W2950865323","https://openalex.org/W2952298682","https://openalex.org/W2962706750","https://openalex.org/W2962814013","https://openalex.org/W2963832942","https://openalex.org/W2964061570","https://openalex.org/W2967136126","https://openalex.org/W3013198216","https://openalex.org/W3024476475","https://openalex.org/W3026402304","https://openalex.org/W3040914594","https://openalex.org/W3098486933","https://openalex.org/W3121372681","https://openalex.org/W3126468572","https://openalex.org/W3126956508","https://openalex.org/W3136817238","https://openalex.org/W3155683139","https://openalex.org/W3161868942","https://openalex.org/W3190955496","https://openalex.org/W4212808029","https://openalex.org/W4224213267","https://openalex.org/W4226326930","https://openalex.org/W4226452241","https://openalex.org/W4280572029","https://openalex.org/W4285113455","https://openalex.org/W4285591252","https://openalex.org/W4293208285","https://openalex.org/W4294192982","https://openalex.org/W4294691500","https://openalex.org/W4306786778","https://openalex.org/W4312236930","https://openalex.org/W4312905669","https://openalex.org/W4312967715","https://openalex.org/W4313484354","https://openalex.org/W4321438421","https://openalex.org/W4322627042","https://openalex.org/W4366149343","https://openalex.org/W4366286067","https://openalex.org/W4377079722","https://openalex.org/W4380881505","https://openalex.org/W4385486390","https://openalex.org/W4386090462","https://openalex.org/W4386914101","https://openalex.org/W4388819958","https://openalex.org/W4388905985","https://openalex.org/W4389321138","https://openalex.org/W4389321233"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4230824443","https://openalex.org/W4377970398","https://openalex.org/W3026018975","https://openalex.org/W2185673024","https://openalex.org/W1484565796","https://openalex.org/W2142794587"],"abstract_inverted_index":{"Distributed":[0],"Denial-of-Service":[1],"(DDoS)":[2],"attacks":[3],"pose":[4],"a":[5,47,66,120,126,132],"serious":[6],"threat":[7],"to":[8,98,148],"the":[9,24,34,51,80,86,94,99,105,111,115,150,157,161,172,175,192,199,213,218],"stability":[10],"and":[11,32,41,61,85,104,118,170,203,215],"security":[12],"of":[13,26,114,174,191,198,207,217],"edge":[14,27,37,88,106,180,200,208],"intelligence":[15,28,38,89,107,181,201,209],"devices.":[16],"To":[17],"solve":[18,149],"this":[19],"issue,":[20],"we":[21,130,163],"first":[22],"describe":[23],"cost":[25],"environments":[29],"in":[30,178],"detail":[31],"introduce":[33],"mean-field":[35,67,116,121],"term,":[36],"repair":[39,91,205],"speed,":[40],"DDoS":[42,73,82,102,152],"attack":[43,83],"intensity,":[44],"which":[45,211],"provide":[46],"theoretical":[48],"basis":[49],"for":[50],"subsequent":[52],"model":[53,68,124],"construction.":[54],"Secondly,":[55],"based":[56],"on":[57,188],"Hamilton-Jacobi-Bellman":[58],"(HJB)":[59],"backward":[60],"Fokker-Planck-Kolmogorov":[62],"(FPK)":[63],"forward":[64],"equations,":[65],"is":[69,76,96],"proposed.":[70],"The":[71],"optimal":[72,151],"defense":[74,153],"policy":[75,154],"then":[77],"solved":[78],"considering":[79],"strongest":[81],"intensity":[84],"best":[87],"device":[90],"speed.":[92],"Further,":[93],"focus":[95],"turned":[97],"interaction":[100],"between":[101],"attackers":[103],"environment.":[108,182],"We":[109,183],"give":[110],"update":[112],"rule":[113],"term":[117],"construct":[119],"game":[122],"(MFG)":[123],"with":[125,141,166],"value":[127],"function.":[128],"Finally,":[129],"propose":[131],"multi-agent":[133],"deep":[134],"reinforcement":[135],"learning":[136],"algorithm":[137,177],"called":[138],"Mean-Field":[139],"Games":[140],"Dueling":[142],"Double":[143],"Deep":[144],"Q-learning":[145],"Network":[146],"(MFGD3QN)":[147],"problem":[155],"under":[156],"MFG":[158],"model.":[159],"In":[160],"experiment,":[162],"compare":[164],"MFGD3QN":[165,176,193],"several":[167],"benchmark":[168],"algorithms":[169],"verify":[171,212],"superiority":[173],"an":[179],"also":[184],"carry":[185],"out":[186],"experiments":[187],"different":[189,204],"parameters":[190],"algorithm,":[194],"lower":[195],"visibility":[196],"conditions":[197],"environment,":[202],"speeds":[206],"devices,":[210],"robustness":[214],"feasibility":[216],"algorithm.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2024-04-11T00:00:00"}
