{"id":"https://openalex.org/W4415178701","doi":"https://doi.org/10.1109/jiot.2025.3621340","title":"WOA-XGBoost: An Intelligent Detection Method for Anomalous Traffic in Industrial Internet of Things","display_name":"WOA-XGBoost: An Intelligent Detection Method for Anomalous Traffic in Industrial Internet of Things","publication_year":2025,"publication_date":"2025-10-14","ids":{"openalex":"https://openalex.org/W4415178701","doi":"https://doi.org/10.1109/jiot.2025.3621340"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3621340","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3621340","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ruizhe Qi","orcid":"https://orcid.org/0009-0009-2794-1357"},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruizhe Qi","raw_affiliation_strings":["College of Science and the Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan, Hebei, China","College of Science, North China University of Science and Technology, Tangshan, Hebei, China"],"raw_orcid":"https://orcid.org/0009-0009-2794-1357","affiliations":[{"raw_affiliation_string":"College of Science and the Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]},{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109689836","display_name":"Xinpu Zhou","orcid":"https://orcid.org/0009-0002-8845-0235"},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Zhou","raw_affiliation_strings":["College of Science and the Key Laboratory of Engineering Computing, North China University of Science and Technology, Tangshan, Hebei, China","College of Science, North China University of Science and Technology, Tangshan, Hebei, China"],"raw_orcid":"https://orcid.org/0009-0002-8845-0235","affiliations":[{"raw_affiliation_string":"College of Science and the Key Laboratory of Engineering Computing, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]},{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026151248","display_name":"Jiashuo Zhang","orcid":"https://orcid.org/0000-0002-8140-9208"},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiashuo Zhang","raw_affiliation_strings":["College of Science and the Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan, Hebei, China","College of Science, North China University of Science and Technology, Tangshan, Hebei, China"],"raw_orcid":"https://orcid.org/0009-0009-6995-5888","affiliations":[{"raw_affiliation_string":"College of Science and the Key Laboratory of Engineering Computing in Tangshan City, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]},{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017071281","display_name":"Yunjie Bai","orcid":"https://orcid.org/0009-0009-9115-477X"},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunjie Bai","raw_affiliation_strings":["College of Metallurgy and Energy and the Tangshan Intelligent Industry and Image Processing Technology Innovation Center,, North China University of Science and Technology, Tangshan, Hebei, China","College of Metallurgy and Energy, North China University of Science and Technology, Tangshan, Hebei, China"],"raw_orcid":"https://orcid.org/0009-0009-9115-477X","affiliations":[{"raw_affiliation_string":"College of Metallurgy and Energy and the Tangshan Intelligent Industry and Image Processing Technology Innovation Center,, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]},{"raw_affiliation_string":"College of Metallurgy and Energy, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048852821","display_name":"Aimin Yang","orcid":"https://orcid.org/0000-0003-0463-9023"},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aimin Yang","raw_affiliation_strings":["College of Science, Hebei Key Laboratory of Data Science and Application, and Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, North China University of Science and Technology, Tangshan, Hebei, China","College of Science, North China University of Science and Technology, Tangshan, Hebei, China"],"raw_orcid":"https://orcid.org/0000-0003-0463-9023","affiliations":[{"raw_affiliation_string":"College of Science, Hebei Key Laboratory of Data Science and Application, and Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]},{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, Hebei, China","institution_ids":["https://openalex.org/I137506752"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I137506752"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3266898,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"9","first_page":"17943","last_page":"17955"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6891999840736389},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.4465000033378601},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4327999949455261},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.41040000319480896},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4101000130176544},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4099999964237213},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.38830000162124634},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.3537999987602234},{"id":"https://openalex.org/keywords/resampling","display_name":"Resampling","score":0.3386000096797943}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8398000001907349},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6891999840736389},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5946999788284302},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4611999988555908},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.4465000033378601},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4327999949455261},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.41040000319480896},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4101000130176544},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4099999964237213},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3971000015735626},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.38830000162124634},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3537999987602234},{"id":"https://openalex.org/C150921843","wikidata":"https://www.wikidata.org/wiki/Q1170431","display_name":"Resampling","level":2,"score":0.3386000096797943},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3345000147819519},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3253999948501587},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.3244999945163727},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.3174000084400177},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3019999861717224},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2655999958515167},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3621340","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3621340","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6786938870","display_name":null,"funder_award_id":"E2022209110","funder_id":"https://openalex.org/F4320322163","funder_display_name":"Natural Science Foundation of Hebei Province"}],"funders":[{"id":"https://openalex.org/F4320322163","display_name":"Natural Science Foundation of Hebei Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"Industrial":[1],"Internet":[2,55],"of":[3,10,14,22,31,52,56,120,131,144,182,211,255],"Things":[4],"(IIoT),":[5],"while":[6],"improving":[7],"the":[8,12,32,50,77,121,129,135,140,145,147,162,180,186,198,201,207,216,218,249,252],"quality":[9],"products,":[11],"growth":[13],"smart":[15],"devices":[16],"also":[17],"generates":[18],"a":[19,39,62],"huge":[20],"quantity":[21],"network":[23,70,122,228,243,256],"traffic":[24,71,123,244,257],"data,":[25],"which":[26,36],"is":[27,149],"mixed":[28],"with":[29,76,98,200],"part":[30],"unknown":[33],"attack":[34],"traffic,":[35,229],"will":[37],"pose":[38],"certain":[40],"threat":[41],"to":[42,115,127,247],"industrial":[43],"products":[44],"and":[45,83,96,106,134,142,154,158,170,177,179,206,230],"user":[46],"privacy.":[47],"To":[48,138],"ensure":[49],"security":[51],"IIoT":[53,250],"(Industrial":[54],"Things)":[57],"network,":[58],"this":[59,195,212,221],"paper":[60,196,213,222],"proposes":[61],"Whale":[63],"Optimization":[64],"Algorithm-eXtreme":[65],"Gradient":[66],"Boosting":[67],"(WOA-XGBoost)":[68],"intelligent":[69],"anomaly":[72,124,245],"detection":[73,125,204,246],"algorithm":[74],"combined":[75],"Extremely":[78],"Randomized":[79],"Trees":[80],"Classifier":[81],"(ExtraTreesClassifier)":[82],"Synthetic":[84],"Minority":[85],"Over-sampling":[86],"Technique-Edited":[87],"Nearest":[88],"Neighbors":[89],"(SMOTE-ENN)":[90],"Resampling":[91],"Technique":[92],"for":[93,242],"feature":[94],"selection":[95],"dealing":[97],"data":[99],"imbalance.":[100],"Meanwhile,":[101,194],"SHapley":[102],"Additive":[103],"exPlanations":[104],"(SHAP)":[105],"Local":[107],"Interpretable":[108],"Model-agnostic":[109],"Explanations":[110],"(LIME)":[111],"methods":[112],"are":[113,172,190,214],"introduced":[114],"conduct":[116],"an":[117,236],"in-depth":[118],"study":[119],"model":[126,148,163,199,208,219,241],"analyze":[128],"impact":[130],"key":[132],"features":[133],"operation":[136],"principle.":[137],"validate":[139],"credibility":[141],"extensiveness":[143],"model,":[146],"validated":[150],"on":[151,185],"RT-IoT2022":[152,160],"dataset":[153],"UCI":[155,188],"public":[156],"dataset,":[157,161],"in":[159,220,251],"performances":[164],"Accuracy,":[165],"Recall,":[166],"Precision,":[167],"F1":[168],"Score,":[169],"G-mean":[171],"0.9985,":[173,178],"0.9997,":[174],"0.9974,":[175],"0.9985":[176],"values":[181],"each":[183],"index":[184],"five":[187],"datasets":[189],"all":[191,215],"above":[192],"0.85.":[193],"compares":[197],"common":[202],"mathematical":[203],"models,":[205],"performance":[209],"indexes":[210],"highest,":[217],"can":[223,232],"more":[224],"accurately":[225],"detect":[226],"anomalous":[227],"it":[231],"be":[233],"proposed":[234],"as":[235],"effective":[237],"artificial":[238],"intelligence":[239],"numerical":[240],"realize":[248],"Intelligent":[253],"management":[254],"security.":[258]},"counts_by_year":[],"updated_date":"2026-04-25T06:01:18.069262","created_date":"2025-10-15T00:00:00"}
