{"id":"https://openalex.org/W4410491798","doi":"https://doi.org/10.1109/jiot.2025.3571621","title":"Causal Interpretability Methods for IoT Anomaly Traffic Detection","display_name":"Causal Interpretability Methods for IoT Anomaly Traffic Detection","publication_year":2025,"publication_date":"2025-05-19","ids":{"openalex":"https://openalex.org/W4410491798","doi":"https://doi.org/10.1109/jiot.2025.3571621"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3571621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3571621","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028312915","display_name":"Zengri Zeng","orcid":"https://orcid.org/0000-0002-5329-0713"},"institutions":[{"id":"https://openalex.org/I257545875","display_name":"Hunan University of Humanities, Science and Technology","ror":"https://ror.org/00s7jmd98","country_code":"CN","type":"education","lineage":["https://openalex.org/I257545875"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zengri Zeng","raw_affiliation_strings":["School of Information, Hunan University of Humanities, Science and Technology, Loudi, Hunan, China","School of Information, Hunan University of Humanities, Science and Technology, LouDi, Hunan, China"],"raw_orcid":"https://orcid.org/0000-0002-5329-0713","affiliations":[{"raw_affiliation_string":"School of Information, Hunan University of Humanities, Science and Technology, Loudi, Hunan, China","institution_ids":["https://openalex.org/I257545875"]},{"raw_affiliation_string":"School of Information, Hunan University of Humanities, Science and Technology, LouDi, Hunan, China","institution_ids":["https://openalex.org/I257545875"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055202882","display_name":"Baokang Zhao","orcid":"https://orcid.org/0000-0001-9200-9018"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baokang Zhao","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, Hunan, China"],"raw_orcid":"https://orcid.org/0000-0001-9200-9018","affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666706","display_name":"Xuhui Liu","orcid":"https://orcid.org/0000-0002-2537-7838"},"institutions":[{"id":"https://openalex.org/I3019120426","display_name":"China Iron and Steel Research Institute Group","ror":"https://ror.org/02e42hc22","country_code":"CN","type":"facility","lineage":["https://openalex.org/I3019120426"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuhui Liu","raw_affiliation_strings":["Iron and Steel Research Institute, Hunan Valin Lianyuan Iron &#x0026; Steel Co., Ltd, Loudi, Hunan, China","Lianyuan Steel, LouDi, Hunan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Iron and Steel Research Institute, Hunan Valin Lianyuan Iron &#x0026; Steel Co., Ltd, Loudi, Hunan, China","institution_ids":["https://openalex.org/I3019120426"]},{"raw_affiliation_string":"Lianyuan Steel, LouDi, Hunan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086816845","display_name":"Xiaoheng Deng","orcid":"https://orcid.org/0000-0003-2740-8025"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoheng Deng","raw_affiliation_strings":["College of Electronic Information, Central South University, Changsha, Hunan, China"],"raw_orcid":"https://orcid.org/0000-0003-2740-8025","affiliations":[{"raw_affiliation_string":"College of Electronic Information, Central South University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028312915"],"corresponding_institution_ids":["https://openalex.org/I257545875"],"apc_list":null,"apc_paid":null,"fwci":1.3517,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81633844,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":"15","first_page":"30765","last_page":"30777"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9642999768257141,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.9359298944473267},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7515039443969727},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7096372842788696},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4476288855075836},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4333059787750244},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.42641839385032654},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33568423986434937},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32630455493927},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.238773912191391}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.9359298944473267},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7515039443969727},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7096372842788696},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4476288855075836},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4333059787750244},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.42641839385032654},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33568423986434937},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32630455493927},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.238773912191391},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3571621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3571621","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1307449587","display_name":null,"funder_award_id":"no. U22B2005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1623947923","display_name":null,"funder_award_id":"24C0539","funder_id":"https://openalex.org/F4320333642","funder_display_name":"Scientific Research Foundation of Hunan Provincial Education Department"},{"id":"https://openalex.org/G3302886985","display_name":null,"funder_award_id":"2023JJ50490","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G4431063190","display_name":null,"funder_award_id":"2025JJ70343","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G6760061280","display_name":null,"funder_award_id":"U22B2005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null},{"id":"https://openalex.org/F4320333642","display_name":"Scientific Research Foundation of Hunan Provincial Education Department","ror":null},{"id":"https://openalex.org/F4320335888","display_name":"Innovation-Driven Project of Central South University","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1493047125","https://openalex.org/W2119038268","https://openalex.org/W2132917208","https://openalex.org/W2945434604","https://openalex.org/W2947802941","https://openalex.org/W2982853004","https://openalex.org/W2990352665","https://openalex.org/W3000565120","https://openalex.org/W3048817558","https://openalex.org/W3180303049","https://openalex.org/W3195279647","https://openalex.org/W3199155356","https://openalex.org/W4200572601","https://openalex.org/W4210250501","https://openalex.org/W4213447687","https://openalex.org/W4224223554","https://openalex.org/W4224294679","https://openalex.org/W4280575251","https://openalex.org/W4286579686","https://openalex.org/W4313534169","https://openalex.org/W4323545746","https://openalex.org/W4362737863","https://openalex.org/W4386065890","https://openalex.org/W4402302376","https://openalex.org/W4403426486","https://openalex.org/W4405270529","https://openalex.org/W4405375153","https://openalex.org/W4406110760","https://openalex.org/W4407385647","https://openalex.org/W6783582129","https://openalex.org/W6802061597","https://openalex.org/W6810656592"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"With":[0],"the":[1,18,44,84],"continuous":[2],"development":[3],"of":[4,6,13,23,49,86],"Internet":[5],"Things":[7],"(IoT)":[8],"technology,":[9],"an":[10],"increasing":[11],"number":[12],"devices":[14],"are":[15,92],"connected":[16],"to":[17,34,80,97,141],"internet,":[19],"generating":[20],"large":[21],"amounts":[22],"highdimensional":[24],"redundant":[25],"information.":[26],"Moreover,":[27],"significant":[28],"environmental":[29],"and":[30,36,46,110,130,138,148,155,164,183],"device":[31],"heterogeneity":[32],"leads":[33],"nonindependent":[35],"identically":[37],"distributed":[38],"(N-IID)":[39],"samples.":[40],"These":[41],"challenges":[42],"compromise":[43],"stability":[45,182],"causal":[47,72,88,101,134,144,165,186],"interpretability":[48],"existing":[50],"IoT":[51,74,189],"detection":[52,77,169],"methods,":[53],"limiting":[54],"their":[55,95],"effectiveness":[56],"in":[57],"providing":[58,184],"actionable":[59],"insights":[60],"for":[61,94,114,188],"network":[62,190],"security":[63],"defense.":[64],"To":[65],"address":[66],"these":[67],"limitations,":[68],"we":[69],"propose":[70],"a":[71],"interpretabilitydriven":[73],"abnormal":[75],"traffic":[76,149],"approach.":[78],"Central":[79],"this":[81],"method":[82],"is":[83],"adoption":[85],"structural":[87],"models":[89],"(SCMs),":[90],"which":[91],"chosen":[93],"ability":[96],"explicitly":[98],"model":[99],"direct":[100],"linkages,":[102],"suppress":[103],"confounding":[104],"effects,":[105],"ensure":[106],"robust":[107],"cross-deployment":[108],"detection,":[109],"enable":[111],"counterfactual":[112,139],"reasoning":[113],"precise":[115],"attack":[116],"attribution.":[117],"The":[118],"approach":[119],"first":[120],"eliminates":[121],"spurious":[122],"feature":[123],"associations":[124],"via":[125],"Fourier":[126],"transformation,":[127],"then":[128],"constructs":[129],"prunes":[131],"SCMs":[132],"using":[133],"effect":[135],"analysis,":[136],"KNN,":[137],"diagnosis":[140],"restore":[142],"genuine":[143],"relationships":[145],"between":[146],"anomalies":[147],"features.":[150],"Experiments":[151],"on":[152,174],"CI-CIDS2019,":[153],"ToNIoT,":[154],"NSL-KDD":[156,175],"datasets":[157],"demonstrate":[158],"effective":[159],"noise":[160],"reduction,":[161],"redundancy":[162],"elimination,":[163],"relationship":[166],"recovery.":[167],"Notably,":[168],"accuracy":[170],"improves":[171],"by":[172],">19%":[173],"data":[176],"under":[177],"polluted":[178],"conditions,":[179],"while":[180],"maintaining":[181],"clear":[185],"explanations":[187],"anomalies.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
