{"id":"https://openalex.org/W7125925038","doi":"https://doi.org/10.1109/jiot.2026.3657416","title":"LMT-SDNN: A Lightweight Malicious Traffic Detection Method for the Internet of Things Based on Multiteacher Distillation","display_name":"LMT-SDNN: A Lightweight Malicious Traffic Detection Method for the Internet of Things Based on Multiteacher Distillation","publication_year":2026,"publication_date":"2026-01-28","ids":{"openalex":"https://openalex.org/W7125925038","doi":"https://doi.org/10.1109/jiot.2026.3657416"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2026.3657416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3657416","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Dawei Xu","orcid":"https://orcid.org/0000-0003-4422-0606"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dawei Xu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4422-0606","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124123132","display_name":"Yunfang Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunfang Liang","raw_affiliation_strings":["School of Computer Science and Technology, Changchun University, Changchun, China"],"raw_orcid":"https://orcid.org/0009-0002-4242-084X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Changchun University, Changchun, China","institution_ids":["https://openalex.org/I106645853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001395612","display_name":"Chunhai Li","orcid":"https://orcid.org/0000-0003-2543-1678"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunhai Li","raw_affiliation_strings":["Guangxi Engineering Research Center of IndustrialInternet Security and Blockchain, Guilin University of Electronic Technology, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0003-2543-1678","affiliations":[{"raw_affiliation_string":"Guangxi Engineering Research Center of IndustrialInternet Security and Blockchain, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124132800","display_name":"Xiaolong Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolong Zhou","raw_affiliation_strings":["School of Computer Science and Technology, Changchun University, Changchun, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Changchun University, Changchun, China","institution_ids":["https://openalex.org/I106645853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124128969","display_name":"Chuan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-7684-8540","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124092260","display_name":"Liehuang Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3277-3887","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124086749","display_name":"Jian Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Zhao","raw_affiliation_strings":["School of Computer Science and Technology, Changchun University, Changchun, China"],"raw_orcid":"https://orcid.org/0000-0003-3265-6461","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Changchun University, Changchun, China","institution_ids":["https://openalex.org/I106645853"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17755499,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"8","first_page":"15665","last_page":"15677"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.5764999985694885,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.5764999985694885,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.17069999873638153,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.09730000048875809,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5041999816894531},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.42989999055862427},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42649999260902405},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.40540000796318054},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.40149998664855957},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.3813000023365021},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3801000118255615},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3772999942302704},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.3700000047683716},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.365200012922287}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8628000020980835},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5041999816894531},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44530001282691956},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.42989999055862427},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42649999260902405},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.40540000796318054},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40149998664855957},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.3813000023365021},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3801000118255615},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3772999942302704},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.3700000047683716},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.365200012922287},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.36489999294281006},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3610000014305115},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.35030001401901245},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.3467000126838684},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3433000147342682},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3314000070095062},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3278999924659729},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3230000138282776},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.31700000166893005},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.3140000104904175},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31349998712539673},{"id":"https://openalex.org/C204673680","wikidata":"https://www.wikidata.org/wiki/Q1628107","display_name":"Airfield traffic pattern","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.29670000076293945},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2939999997615814},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.2827000021934509},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.28049999475479126},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2671000063419342},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.26649999618530273},{"id":"https://openalex.org/C203274722","wikidata":"https://www.wikidata.org/wiki/Q7001161","display_name":"Network performance","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2026.3657416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3657416","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,47,143,210],"rapid":[1],"proliferation":[2],"of":[3,5,43,135,183,212,239],"Internet":[4,134],"Things":[6,136],"(IoT)":[7,137],"devices,":[8],"coupled":[9],"with":[10,51,170,218],"their":[11],"inherent":[12],"security":[13,40],"vulnerabilities,":[14],"has":[15,80],"significantly":[16],"expanded":[17],"the":[18,39,44,133,147,179,198],"attack":[19],"surface,":[20],"intensifying":[21],"threats":[22],"such":[23,63],"as":[24,64],"man-in-the-middle":[25],"attacks,":[26,33],"traffic":[27,49,91,129,262],"hijacking,":[28],"and":[29,41,56,70,88,96,107,162,228,246],"distributed":[30],"denial-of-service":[31],"(DDoS)":[32],"thereby":[34,205],"posing":[35],"serious":[36],"risks":[37],"to":[38,120,176,196,201],"reliability":[42],"entire":[45],"ecosystem.":[46],"network":[48,184],"associated":[50],"IoT":[52,116,265],"devices":[53],"is":[54,194,214],"diverse":[55],"dynamic,":[57],"often":[58],"exhibiting":[59],"complex":[60,87,180],"structural":[61,181],"features":[62,182],"periodic":[65],"fluctuations,":[66],"varying":[67],"packet":[68],"sizes,":[69],"time-varying":[71],"patterns":[72],"that":[73,233],"make":[74],"detection":[75,130,263],"challenging.":[76],"Although":[77],"deep":[78],"learning":[79,98],"demonstrated":[81],"strong":[82,257],"capabilities":[83],"in":[84,242,264],"efficiently":[85],"identifying":[86],"dynamic":[89],"malicious":[90,128,261],"through":[92,216],"powerful":[93],"feature":[94],"extraction":[95],"adaptive":[97],"abilities,":[99],"its":[100,207,256],"high":[101],"model":[102,244],"complexity,":[103],"substantial":[104],"computational":[105],"demands,":[106],"large":[108],"parameter":[109,247],"sizes":[110],"hinder":[111],"direct":[112],"deployment":[113],"on":[114,139,222],"resource-constrained":[115],"devices.":[117],"In":[118],"order":[119],"tackle":[121],"this":[122,124],"issue,":[123],"paper":[125],"proposes":[126],"a":[127,163,187,236],"framework":[131],"for":[132,259],"based":[138],"multi-teacher":[140],"knowledge":[141],"distillation.":[142],"proposed":[144],"model,":[145],"termed":[146],"Lightweight":[148],"Multi-Teacher":[149],"Spatiotemporal":[150],"Distillation":[151],"Neural":[152],"Network":[153,167],"(LMT-SDNN),":[154],"employs":[155],"two":[156,223],"high-performance":[157],"teacher":[158],"models:":[159],"Residual":[160],"Inception":[161],"One-Dimension":[164],"Convolution":[165],"Netural":[166],"(1D-CNN)":[168],"integrated":[169],"idirectional":[171],"Long":[172],"Short-Term":[173],"Memory":[174],"(BiLSTM),":[175],"effectively":[177],"capture":[178,202],"traffic.":[185],"Furthermore,":[186],"novel":[188],"Time-Related":[189],"Window":[190],"Loss":[191],"(TRW)":[192],"function":[193],"design":[195],"enhance":[197],"student\u2019s":[199],"ability":[200],"temporal":[203],"features,":[204],"improving":[206],"overall":[208],"performance.":[209],"effectiveness":[211],"LMT-SDNN":[213,234],"validated":[215],"comparisons":[217],"five":[219],"baseline":[220],"models":[221],"publicly":[224],"available":[225],"datasets,":[226],"ToN_IoT":[227],"BoT_IoT.":[229],"Experimental":[230],"results":[231],"show":[232],"achieves":[235],"compression":[237],"rate":[238],"over":[240],"99%":[241],"both":[243],"complexity":[245],"count,":[248],"while":[249],"maintaining":[250],"an":[251],"accuracy":[252],"exceeding":[253],"99%,":[254],"indicating":[255],"potential":[258],"multiclass":[260],"environments.":[266]},"counts_by_year":[],"updated_date":"2026-04-09T06:08:40.794217","created_date":"2026-01-29T00:00:00"}
