{"id":"https://openalex.org/W4313306374","doi":"https://doi.org/10.1109/mnet.001.2100754","title":"Deep-Learning-Based Weak Electromagnetic Intrusion Detection Method for Zero Touch Networks on Industrial IoT","display_name":"Deep-Learning-Based Weak Electromagnetic Intrusion Detection Method for Zero Touch Networks on Industrial IoT","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4313306374","doi":"https://doi.org/10.1109/mnet.001.2100754"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.001.2100754","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.001.2100754","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100447723","display_name":"Tingting Wang","orcid":"https://orcid.org/0000-0002-2666-7159"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":true,"raw_author_name":"Tingting Wang","raw_affiliation_strings":["Macau University of Science and Technology,China","Macau University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Macau University of Science and Technology,China","institution_ids":["https://openalex.org/I111950717"]},{"raw_affiliation_string":"Macau University of Science and Technology, China","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100641152","display_name":"Jianqing Li","orcid":"https://orcid.org/0000-0002-6768-1483"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Jianqing Li","raw_affiliation_strings":["Macau University of Science and Technology,China","Macau University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Macau University of Science and Technology,China","institution_ids":["https://openalex.org/I111950717"]},{"raw_affiliation_string":"Macau University of Science and Technology, China","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100323752","display_name":"Wei Wei","orcid":"https://orcid.org/0000-0002-7566-2995"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wei","raw_affiliation_strings":["Xi&#x0027;an University of Technology,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x0027;an University of Technology,China","institution_ids":["https://openalex.org/I4210131919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391896","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-1717-5785"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Sun Yat-sen University,China","Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University,China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061880171","display_name":"Kai Fang","orcid":"https://orcid.org/0000-0003-0419-1468"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Kai Fang","raw_affiliation_strings":["Macau University of Science and Technology,China","Macau University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Macau University of Science and Technology,China","institution_ids":["https://openalex.org/I111950717"]},{"raw_affiliation_string":"Macau University of Science and Technology, China","institution_ids":["https://openalex.org/I111950717"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100447723"],"corresponding_institution_ids":["https://openalex.org/I111950717"],"apc_list":null,"apc_paid":null,"fwci":6.5421,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.97649322,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"36","issue":"6","first_page":"236","last_page":"242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8057301640510559},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6847416162490845},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.636421263217926},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6318414807319641},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5513963103294373},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49689891934394836},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4923020601272583},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.474413126707077},{"id":"https://openalex.org/keywords/interconnection","display_name":"Interconnection","score":0.45588693022727966},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4441084563732147},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4352349638938904},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4299023747444153},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3639819622039795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2811266779899597},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21500417590141296},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.1777506172657013}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8057301640510559},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6847416162490845},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.636421263217926},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6318414807319641},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5513963103294373},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49689891934394836},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4923020601272583},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.474413126707077},{"id":"https://openalex.org/C123745756","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnection","level":2,"score":0.45588693022727966},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4441084563732147},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4352349638938904},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4299023747444153},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3639819622039795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2811266779899597},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21500417590141296},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.1777506172657013},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.001.2100754","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.001.2100754","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G3645213774","display_name":null,"funder_award_id":"61876168","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2737188128","https://openalex.org/W2944954104","https://openalex.org/W2954828948","https://openalex.org/W2965519056","https://openalex.org/W3016219164","https://openalex.org/W3034008850","https://openalex.org/W3090223178","https://openalex.org/W3096766476","https://openalex.org/W3115308930","https://openalex.org/W3196410189","https://openalex.org/W3199201165","https://openalex.org/W3203836509","https://openalex.org/W4205540438","https://openalex.org/W4210954051","https://openalex.org/W4285105643"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2014709025","https://openalex.org/W2625093826","https://openalex.org/W2155019192","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261"],"abstract_inverted_index":{"The":[0],"Industrial":[1],"Internet":[2],"of":[3,7,11,16,20,40,52,61,91,109,142,187],"Things":[4],"(IIoT),":[5],"consisting":[6],"a":[8,45,88,122,126,175],"large":[9],"number":[10],"self-organized":[12],"sensors,":[13],"is":[14,65,113,132,179],"one":[15],"the":[17,33,38,53,58,66,95,107,110,119,140,149,154,163,182,185,188],"prominent":[18],"representatives":[19],"zero":[21,41,62,77],"touch":[22,42,63,78],"networks,":[23],"which":[24,112],"will":[25,84],"be":[26,85,104],"widely":[27],"used":[28],"for":[29,76],"information":[30],"interconnection.":[31],"With":[32],"advancement":[34],"in":[35,48,134,148],"intelligent":[36],"manufacturing,":[37],"security":[39],"IIoT":[43,64],"becomes":[44],"critical":[46],"issue":[47],"various":[49],"applications.":[50],"One":[51],"main":[54],"factors":[55],"that":[56],"endanger":[57],"normal":[59,116],"operation":[60],"weak":[67],"electromagnetic":[68],"interference":[69],"(WEMI)":[70],"attack,":[71],"making":[72],"special":[73],"precautions":[74],"necessary":[75],"IIoT.":[79],"In":[80],"real-life":[81],"applications,":[82],"sensors":[83],"injected":[86],"with":[87],"specific":[89],"type":[90],"noise":[92,102],"due":[93],"to":[94,171],"unique":[96],"manufacturing":[97],"process":[98],"and":[99,144,156,174],"environment.":[100],"This":[101],"can":[103],"considered":[105],"as":[106],"finger-print":[108],"sensor,":[111],"stable":[114],"under":[115],"conditions":[117],"unless":[118],"sensor":[120],"experiences":[121],"WEMI":[123,128,189],"attack.":[124],"Hence,":[125],"deep-learning-based":[127],"intrusion":[129,172,190],"detection":[130,191],"method":[131],"employed":[133],"this":[135],"study.":[136],"First,":[137],"we":[138],"introduce":[139],"application":[141],"Kalman":[143],"moving":[145],"average":[146],"filters":[147],"fingerprint":[150],"extraction":[151],"stage.":[152],"Second,":[153],"frequency":[155],"time":[157],"domain":[158],"features":[159],"were":[160],"extracted":[161],"from":[162],"fingerprint.":[164],"Third,":[165],"deep":[166],"learning":[167],"models":[168],"are":[169],"applied":[170],"detection,":[173],"cloud-edge-end":[176],"computing":[177],"framework":[178],"proposed.":[180],"Finally,":[181],"experiment":[183],"analyzes":[184],"performance":[186],"method.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
