{"id":"https://openalex.org/W4414693441","doi":"https://doi.org/10.1109/jiot.2025.3616339","title":"MRMamba: Multi-Resolution State-Space Modeling for Robust Multisensor Traffic Attack Detection in Wireless Sensor Networks","display_name":"MRMamba: Multi-Resolution State-Space Modeling for Robust Multisensor Traffic Attack Detection in Wireless Sensor Networks","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4414693441","doi":"https://doi.org/10.1109/jiot.2025.3616339"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3616339","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3616339","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112117783","display_name":"Siyuan Liu","orcid":"https://orcid.org/0009-0009-2138-5740"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Siyuan Liu","raw_affiliation_strings":["Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100746961","display_name":"Qian He","orcid":"https://orcid.org/0000-0003-3020-2896"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian He","raw_affiliation_strings":["Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100348274","display_name":"Yi-Ting Chen","orcid":"https://orcid.org/0009-0000-6537-8926"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiting Chen","raw_affiliation_strings":["Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109399239","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0002-6714-9534"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["School of Information and Communication, Guilin University of Electronic Technology, Guilin, China","School of Information and Communication, Guilin University of Electronic Technology, Guilin, Guangxi, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075435434","display_name":"Anfeng Liu","orcid":"https://orcid.org/0000-0001-5190-4761"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anfeng Liu","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112117783"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30952481,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"24","first_page":"53441","last_page":"53457"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7404000163078308},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6955999732017517},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.6506999731063843},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5060999989509583},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4049000144004822},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.36169999837875366},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.3562000095844269},{"id":"https://openalex.org/keywords/context-model","display_name":"Context model","score":0.3465000092983246},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.3416999876499176}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8626999855041504},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7404000163078308},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6955999732017517},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.6506999731063843},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5060999989509583},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42800000309944153},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4049000144004822},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.391400009393692},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.36169999837875366},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3562000095844269},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.3465000092983246},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3416999876499176},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.3296000063419342},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C79487989","wikidata":"https://www.wikidata.org/wiki/Q934680","display_name":"Vehicle dynamics","level":2,"score":0.32499998807907104},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.32120001316070557},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.31949999928474426},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31709998846054077},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.3066999912261963},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.29420000314712524},{"id":"https://openalex.org/C72434380","wikidata":"https://www.wikidata.org/wiki/Q230930","display_name":"State space","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2799000144004822},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26589998602867126},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C149102469","wikidata":"https://www.wikidata.org/wiki/Q7936624","display_name":"Visual sensor network","level":5,"score":0.2572999894618988},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3616339","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3616339","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2021690714","display_name":null,"funder_award_id":"2024GXNSFDA010067","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G3344346079","display_name":null,"funder_award_id":"U24A20248","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G689236611","display_name":null,"funder_award_id":"62162018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7446115368","display_name":null,"funder_award_id":"AB25069157","funder_id":"https://openalex.org/F4320335774","funder_display_name":"Key Technologies Research and Development Program"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null},{"id":"https://openalex.org/F4320335774","display_name":"Key Technologies Research and Development Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W2052684427","https://openalex.org/W2125027820","https://openalex.org/W2132870739","https://openalex.org/W2786827964","https://openalex.org/W2911946608","https://openalex.org/W2939009161","https://openalex.org/W2950361482","https://openalex.org/W2958498061","https://openalex.org/W2963166639","https://openalex.org/W3085139254","https://openalex.org/W3124002030","https://openalex.org/W3131922516","https://openalex.org/W3169330763","https://openalex.org/W3177318507","https://openalex.org/W3190441617","https://openalex.org/W3190748826","https://openalex.org/W4200353584","https://openalex.org/W4226060502","https://openalex.org/W4285082635","https://openalex.org/W4285236840","https://openalex.org/W4292092647","https://openalex.org/W4367016885","https://openalex.org/W4382281941","https://openalex.org/W4385245566","https://openalex.org/W4385656664","https://openalex.org/W4387501456","https://openalex.org/W4392347784","https://openalex.org/W4396707597","https://openalex.org/W4400612489","https://openalex.org/W4401163369","https://openalex.org/W4402035331","https://openalex.org/W4402486426","https://openalex.org/W4402509009","https://openalex.org/W4402883814","https://openalex.org/W4402912693","https://openalex.org/W4403150406","https://openalex.org/W4403895659","https://openalex.org/W4404903289","https://openalex.org/W4405778752","https://openalex.org/W4407397674","https://openalex.org/W4407453581","https://openalex.org/W4408667555","https://openalex.org/W4408918479","https://openalex.org/W4413146346"],"related_works":[],"abstract_inverted_index":{"Wireless":[0],"Sensor":[1],"Networks":[2],"(WSNs)":[3],"face":[4],"critical":[5],"security":[6],"challenges":[7],"due":[8],"to":[9,36,66,135,170],"their":[10],"distributed":[11],"architecture,":[12],"dynamic":[13],"topologies,":[14],"and":[15,32,95,121,144,174],"the":[16,165,179,182],"complexity":[17],"introduced":[18],"by":[19,168],"multisensor":[20],"nodes.":[21],"These":[22],"factors":[23],"result":[24],"in":[25,45],"highly":[26],"variable":[27],"traffic":[28],"patterns,":[29],"making":[30,52],"stealthy":[31],"long-duration":[33],"attacks":[34,137],"difficult":[35],"detect.":[37],"Recent":[38],"Mamba-based":[39],"sequence":[40],"models":[41],"have":[42],"shown":[43],"promise":[44],"capturing":[46],"long-range":[47,124],"dependencies":[48],"with":[49,93],"high":[50],"efficiency,":[51],"them":[53],"attractive":[54],"for":[55,74],"such":[56],"scenarios.":[57],"However,":[58],"Mamba\u2019s":[59],"inherent":[60],"causal":[61],"modeling":[62,97],"limits":[63],"its":[64],"ability":[65],"fully":[67],"exploit":[68],"hierarchical":[69],"patterns":[70],"that":[71,90,107,155],"are":[72],"crucial":[73],"detecting":[75],"subtle":[76],"or":[77],"dispersed":[78],"attacks.":[79],"In":[80],"this":[81],"work,":[82],"we":[83],"propose":[84],"MRMamba,":[85],"a":[86,102,128],"multi-resolution":[87],"state-space":[88],"architecture":[89,130],"equips":[91],"Mamba":[92],"non-causal":[94],"cross-scale":[96,109],"capabilities.":[98],"Specifically,":[99],"MRMamba":[100,134,156],"introduces":[101],"Multi-Resolution":[103],"State":[104],"Space":[105],"Module":[106],"performs":[108],"attention":[110],"fusion.":[111],"This":[112],"mechanism":[113],"dynamically":[114],"integrates":[115],"context":[116],"at":[117],"multiple":[118],"temporal":[119],"resolutions":[120],"helps":[122],"alleviate":[123],"dependency":[125],"decay.":[126],"Furthermore,":[127],"dual-branch":[129],"is":[131],"constructed":[132],"around":[133],"model":[136],"from":[138],"complementary":[139],"perspectives,":[140],"enabling":[141],"more":[142],"accurate":[143],"robust":[145],"detection.":[146],"Extensive":[147],"experiments":[148],"on":[149,172,176],"five":[150],"real-world":[151],"public":[152],"datasets":[153],"show":[154],"consistently":[157],"outperforms":[158],"existing":[159],"attack":[160],"detection":[161],"methods.":[162,184],"It":[163],"improves":[164],"F1":[166],"score":[167],"up":[169],"4.53%":[171],"CIC2023":[173],"6.6%":[175],"IoM2024":[177],"over":[178],"best":[180],"of":[181],"compared":[183]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
