{"id":"https://openalex.org/W4293900741","doi":"https://doi.org/10.1109/lcn53696.2022.9843689","title":"Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks","display_name":"Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks","publication_year":2022,"publication_date":"2022-08-26","ids":{"openalex":"https://openalex.org/W4293900741","doi":"https://doi.org/10.1109/lcn53696.2022.9843689"},"language":"en","primary_location":{"id":"doi:10.1109/lcn53696.2022.9843689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn53696.2022.9843689","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Wu","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038803327","display_name":"Xingmeng Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingmeng Fan","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032328549"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.2763,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56186882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"140","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8421422243118286},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7342873811721802},{"id":"https://openalex.org/keywords/visibility","display_name":"Visibility","score":0.6962891817092896},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5855923295021057},{"id":"https://openalex.org/keywords/backbone-network","display_name":"Backbone network","score":0.531191349029541},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5025396347045898},{"id":"https://openalex.org/keywords/fragmentation","display_name":"Fragmentation (computing)","score":0.44093000888824463},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.42986780405044556},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4135951101779938},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4011548161506653},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39320001006126404},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37951716780662537},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2468399703502655}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8421422243118286},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7342873811721802},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.6962891817092896},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5855923295021057},{"id":"https://openalex.org/C88796919","wikidata":"https://www.wikidata.org/wiki/Q1142907","display_name":"Backbone network","level":2,"score":0.531191349029541},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5025396347045898},{"id":"https://openalex.org/C191015642","wikidata":"https://www.wikidata.org/wiki/Q1132459","display_name":"Fragmentation (computing)","level":2,"score":0.44093000888824463},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42986780405044556},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4135951101779938},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4011548161506653},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39320001006126404},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37951716780662537},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2468399703502655},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn53696.2022.9843689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn53696.2022.9843689","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W149523093","https://openalex.org/W2749429923","https://openalex.org/W2888505697","https://openalex.org/W2905724129","https://openalex.org/W2917091861","https://openalex.org/W2919493784","https://openalex.org/W2921669466","https://openalex.org/W2944968054","https://openalex.org/W2959627510","https://openalex.org/W3001065717","https://openalex.org/W3034611465","https://openalex.org/W3047208927","https://openalex.org/W3047562633","https://openalex.org/W3082482205","https://openalex.org/W3183084385","https://openalex.org/W3211096890","https://openalex.org/W3217401178","https://openalex.org/W6606098666","https://openalex.org/W6743673742"],"related_works":["https://openalex.org/W2392812199","https://openalex.org/W4200176076","https://openalex.org/W598185802","https://openalex.org/W2355516524","https://openalex.org/W2361471170","https://openalex.org/W2025616642","https://openalex.org/W1954972543","https://openalex.org/W2954738200","https://openalex.org/W4220843223","https://openalex.org/W4226107239"],"abstract_inverted_index":{"Due":[0],"to":[1,27,31,68,75,89],"the":[2,14,36,64,80,103,136,140,144],"heterogeneity,":[3],"fragmentation,":[4],"and":[5,34,71,101,146],"lack":[6],"of":[7,10,130,135,139],"visibility,":[8],"Internet":[9,24],"Things":[11],"has":[12],"become":[13],"new":[15],"target":[16],"for":[17,23,93,114],"attacks.":[18],"Therefore,":[19],"it":[20],"is":[21],"necessary":[22],"Service":[25],"Providers":[26],"identify":[28],"IoT":[29,47,69,95],"devices":[30,70],"prevent":[32],"attacks":[33],"protect":[35],"entire":[37],"network":[38],"in":[39],"time.":[40],"In":[41],"this":[42,77,91],"paper,":[43],"we":[44,62,84,106],"propose":[45],"an":[46,98,128],"device":[48],"identification":[49],"approach":[50,126],"based":[51],"on":[52,120],"lightweight":[53,145],"deep":[54],"learning":[55],"models":[56],"using":[57],"a":[58],"single":[59],"feature.":[60],"Specifically,":[61],"analyze":[63],"traffic":[65],"pattern":[66],"specific":[67],"use":[72,107],"one":[73],"feature":[74,92],"characterize":[76],"pattern,":[78],"reducing":[79],"time":[81,87,137],"consumption.":[82],"Moreover,":[83],"select":[85],"multiple":[86],"scales":[88],"extract":[90],"different":[94],"devices,":[96],"achieving":[97],"accurate":[99],"characterization":[100],"improving":[102],"accuracy.":[104],"Furthermore,":[105],"unidirectional":[108],"flows":[109],"as":[110],"analysis":[111],"objects,":[112],"suitable":[113],"backbone":[115],"networks.":[116],"The":[117],"evaluation":[118],"results":[119],"real-world":[121],"datasets":[122],"show":[123],"that":[124],"our":[125],"achieves":[127],"accuracy":[129],"over":[131],"99%,":[132],"with":[133],"one-seventeenth":[134],"consumption":[138],"state-of-the-art":[141],"approach,":[142],"realizing":[143],"real-time":[147],"requirements.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
