{"id":"https://openalex.org/W4400021419","doi":"https://doi.org/10.1109/jiot.2024.3418955","title":"Signal Game and Compact Particle Swarm Optimization Based on Pareto Distribution for Attack\u2013Defense Eavesdropping Confrontation Analysis in Internet of Things","display_name":"Signal Game and Compact Particle Swarm Optimization Based on Pareto Distribution for Attack\u2013Defense Eavesdropping Confrontation Analysis in Internet of Things","publication_year":2024,"publication_date":"2024-06-25","ids":{"openalex":"https://openalex.org/W4400021419","doi":"https://doi.org/10.1109/jiot.2024.3418955"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3418955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3418955","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103145088","display_name":"Ning Liu","orcid":"https://orcid.org/0000-0003-2907-0662"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ning Liu","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022821709","display_name":"Shangkun Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangkun Liu","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051176301","display_name":"Qing-Wei Chai","orcid":"https://orcid.org/0000-0001-5587-0589"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing-Wei Chai","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101861168","display_name":"Weimin Zheng","orcid":"https://orcid.org/0000-0003-3860-4208"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei-Min Zheng","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103145088"],"corresponding_institution_ids":["https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":0.3663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58034836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"11","issue":"19","first_page":"31587","last_page":"31601"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8540999889373779,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8540999889373779,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9532046318054199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7577152252197266},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.6461371183395386},{"id":"https://openalex.org/keywords/pareto-principle","display_name":"Pareto principle","score":0.5178554654121399},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5134575963020325},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4942898750305176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4914132356643677},{"id":"https://openalex.org/keywords/pareto-distribution","display_name":"Pareto distribution","score":0.4426875710487366},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3509314954280853},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.339898020029068},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1911287009716034},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12026113271713257}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9532046318054199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7577152252197266},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.6461371183395386},{"id":"https://openalex.org/C137635306","wikidata":"https://www.wikidata.org/wiki/Q182667","display_name":"Pareto principle","level":2,"score":0.5178554654121399},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5134575963020325},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4942898750305176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4914132356643677},{"id":"https://openalex.org/C190373308","wikidata":"https://www.wikidata.org/wiki/Q837683","display_name":"Pareto distribution","level":2,"score":0.4426875710487366},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3509314954280853},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.339898020029068},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1911287009716034},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12026113271713257},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3418955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3418955","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.44999998807907104,"display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G1010105751","display_name":null,"funder_award_id":"61932005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W69705385","https://openalex.org/W161150829","https://openalex.org/W1999077811","https://openalex.org/W2024518622","https://openalex.org/W2030295525","https://openalex.org/W2040166386","https://openalex.org/W2056811412","https://openalex.org/W2061438946","https://openalex.org/W2126759136","https://openalex.org/W2152195021","https://openalex.org/W2290883490","https://openalex.org/W2917884856","https://openalex.org/W2985845430","https://openalex.org/W3011016572","https://openalex.org/W3025487410","https://openalex.org/W3121056417","https://openalex.org/W3157963763","https://openalex.org/W3195542062","https://openalex.org/W3196456941","https://openalex.org/W3204028971","https://openalex.org/W4206017890","https://openalex.org/W4206171243","https://openalex.org/W4206822447","https://openalex.org/W4206994277","https://openalex.org/W4210863342","https://openalex.org/W4212993228","https://openalex.org/W4212993510","https://openalex.org/W4282594895","https://openalex.org/W4285210647","https://openalex.org/W4285792577","https://openalex.org/W4286567167","https://openalex.org/W4290996581","https://openalex.org/W4293812121","https://openalex.org/W4297227993","https://openalex.org/W4313559326","https://openalex.org/W4315777510","https://openalex.org/W4317038588","https://openalex.org/W4362720284","https://openalex.org/W4375947652","https://openalex.org/W4384158405","https://openalex.org/W4384787568","https://openalex.org/W4385269681","https://openalex.org/W4387010514","https://openalex.org/W4387682052","https://openalex.org/W4388426441","https://openalex.org/W4388461534","https://openalex.org/W4388642360","https://openalex.org/W6759768743"],"related_works":["https://openalex.org/W2047851142","https://openalex.org/W1896412130","https://openalex.org/W2009947662","https://openalex.org/W2094924735","https://openalex.org/W4240829493","https://openalex.org/W3178384524","https://openalex.org/W4399575534","https://openalex.org/W1527123750","https://openalex.org/W2950549043","https://openalex.org/W2025222650"],"abstract_inverted_index":{"The":[0,56,108,123,147,161,172],"information":[1],"transmission":[2],"in":[3,23,44,70],"Internet":[4],"of":[5,37,58,121,131,144,155,169,210],"Things":[6],"(IoT)":[7],"communication":[8],"brings":[9],"eavesdropping":[10,21],"attacks":[11,22],"to":[12,15,19,32,91,101,105,206],"people.":[13],"How":[14],"take":[16],"defense":[17,135,139],"strategy":[18],"defend":[20],"IoT":[24],"is":[25,42,50,68,77,89,97],"a":[26,39,79,98],"significant":[27],"research":[28],"content.":[29],"In":[30],"order":[31],"analyze":[33,207],"the":[34,59,75,113,119,128,142,145,153,156,165,170,178],"attack-defense":[35,208],"confrontation":[36,209],"eavesdropping,":[38],"signal":[40,54,60],"game":[41,61],"established":[43],"this":[45,71,93],"article.":[46,72],"Nash":[47],"equilibrium":[48],"(NE)":[49],"important":[51,202],"for":[52,204],"analyzing":[53],"game.":[55],"NE":[57,76],"from":[62],"both":[63],"macro":[64],"and":[65,138,167,195],"micro":[66],"levels":[67],"analyzed":[69],"Because":[73],"solving":[74],"difficult,":[78],"particle":[80],"swarm":[81],"optimization":[82,114],"algorithm":[83],"based":[84],"on":[85,152],"Pareto":[86],"distribution":[87],"(pCPSO)":[88],"proposed":[90],"solve":[92,106],"hard":[94],"problem.":[95],"It":[96],"new":[99],"idea":[100,203],"use":[102,120],"intelligent":[103],"computing":[104],"NE.":[107],"pCPSO":[109,181],"not":[110],"only":[111],"improve":[112],"performance,":[115],"but":[116],"also":[117,175],"reduce":[118],"memory.":[122],"simulation":[124],"experiment":[125],"analyzes":[126],"how":[127],"changing":[129],"value":[130],"parameters":[132],"direct":[133,159],"benefit,":[134],"benefit":[136],"(DB),":[137],"cost":[140],"influence":[141,151],"profit":[143,154,185],"defender.":[146],"DB":[148],"has":[149],"greater":[150],"defender":[157,179,205],"than":[158,186],"benefit.":[160],"experimental":[162,173],"results":[163,174],"prove":[164],"reliability":[166],"availability":[168],"model.":[171],"show":[176],"that":[177],"using":[180,187],"can":[182],"obtain":[183],"higher":[184],"posterior,":[188],"prior,":[189],"PSO,":[190],"nonlinear":[191],"optimization,":[192,194],"convex":[193],"gradient":[196],"ascent.":[197],"This":[198],"article":[199],"provides":[200],"an":[201],"eavesdropping.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
