{"id":"https://openalex.org/W4200042272","doi":"https://doi.org/10.1109/pst52912.2021.9647828","title":"Intrusion Detection in Internet of Things using Convolutional Neural Networks","display_name":"Intrusion Detection in Internet of Things using Convolutional Neural Networks","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200042272","doi":"https://doi.org/10.1109/pst52912.2021.9647828"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2211.10062","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071955130","display_name":"Martin Kody\u0161","orcid":"https://orcid.org/0009-0001-3809-2153"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Martin Kodys","raw_affiliation_strings":["ST Engineering, Cyber Security Strategic Technology Centre, Singapore"],"affiliations":[{"raw_affiliation_string":"ST Engineering, Cyber Security Strategic Technology Centre, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088224525","display_name":"Zhi Lu","orcid":"https://orcid.org/0000-0002-0440-9175"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhi Lu","raw_affiliation_strings":["ST Engineering, Cyber Security Strategic Technology Centre, Singapore"],"affiliations":[{"raw_affiliation_string":"ST Engineering, Cyber Security Strategic Technology Centre, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059071970","display_name":"Kar Wai Fok","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kar Wai Fok","raw_affiliation_strings":["ST Engineering, Cyber Security Strategic Technology Centre, Singapore"],"affiliations":[{"raw_affiliation_string":"ST Engineering, Cyber Security Strategic Technology Centre, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040321131","display_name":"Vrizlynn L. L. Thing","orcid":"https://orcid.org/0000-0003-4424-8596"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vrizlynn L. L. Thing","raw_affiliation_strings":["ST Engineering, Cyber Security Strategic Technology Centre, Singapore"],"affiliations":[{"raw_affiliation_string":"ST Engineering, Cyber Security Strategic Technology Centre, Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071955130"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.7076,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.90562617,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8450173735618591},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7812944650650024},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6887420415878296},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6793197393417358},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5890828371047974},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5805299282073975},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5366135835647583},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5098118185997009},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4570891559123993},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.44288545846939087},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44082725048065186},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.43584078550338745},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4198001027107239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39425015449523926},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3623383641242981},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09908992052078247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8450173735618591},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7812944650650024},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6887420415878296},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6793197393417358},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5890828371047974},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5805299282073975},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5366135835647583},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5098118185997009},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4570891559123993},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.44288545846939087},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44082725048065186},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.43584078550338745},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4198001027107239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39425015449523926},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3623383641242981},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09908992052078247},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst52912.2021.9647828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2211.10062","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2211.10062","pdf_url":"https://arxiv.org/pdf/2211.10062","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2211.10062","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2211.10062","pdf_url":"https://arxiv.org/pdf/2211.10062","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5400000214576721,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2590373591","https://openalex.org/W2604813584","https://openalex.org/W2606697812","https://openalex.org/W2783741806","https://openalex.org/W2786245267","https://openalex.org/W2796549675","https://openalex.org/W2808266100","https://openalex.org/W2885917234","https://openalex.org/W2897202622","https://openalex.org/W2897852178","https://openalex.org/W2921453769","https://openalex.org/W2929803724","https://openalex.org/W2940895343","https://openalex.org/W2955425717","https://openalex.org/W2959392253","https://openalex.org/W2963582967","https://openalex.org/W2964059069","https://openalex.org/W3003377235","https://openalex.org/W3006926329","https://openalex.org/W3016266335","https://openalex.org/W3020687048","https://openalex.org/W3032266608","https://openalex.org/W3032315266","https://openalex.org/W3085955590","https://openalex.org/W3092771185","https://openalex.org/W3095300783","https://openalex.org/W3099027680","https://openalex.org/W3128470182","https://openalex.org/W3134260321","https://openalex.org/W3141567114","https://openalex.org/W3156826814","https://openalex.org/W6681750758","https://openalex.org/W6750511567","https://openalex.org/W6762718338"],"related_works":["https://openalex.org/W2393267898","https://openalex.org/W2369874171","https://openalex.org/W2013909972","https://openalex.org/W2383301100","https://openalex.org/W2392864074","https://openalex.org/W2352639800","https://openalex.org/W2280598164","https://openalex.org/W4388425184","https://openalex.org/W3112374511","https://openalex.org/W2189092700"],"abstract_inverted_index":{"Internet":[0],"of":[1,12,32,103],"Things":[2],"(IoT)":[3],"has":[4,53],"become":[5],"a":[6,121],"popular":[7],"paradigm":[8],"to":[9,65,76,124,141,193],"fulfil":[10],"needs":[11],"the":[13,30,57,62,125,138,143,146,172,194],"industry":[14],"such":[15,68],"as":[16,107,137],"asset":[17],"tracking,":[18],"resource":[19],"monitoring":[20],"and":[21,42,99,169,188],"automation.":[22],"As":[23],"security":[24,59],"mechanisms":[25],"are":[26,36,91,109,152],"often":[27],"neglected":[28],"during":[29],"deployment":[31],"IoT":[33,129],"devices,":[34],"they":[35,108],"more":[37],"easily":[38],"attacked":[39],"by":[40,56,157],"complicated":[41],"large":[43],"volume":[44],"intrusion":[45,126],"attacks":[46,127,155],"using":[47,131,196],"advanced":[48],"techniques.":[49],"Artificial":[50],"Intelligence":[51],"(AI)":[52],"been":[54],"used":[55],"cyber":[58],"community":[60],"in":[61,105,183],"past":[63],"decade":[64],"automatically":[66],"identify":[67],"attacks.":[69],"However,":[70],"deep":[71],"learning":[72],"methods":[73],"have":[74],"yet":[75],"be":[77],"extensively":[78],"explored":[79],"for":[80,86,113,154],"Intrusion":[81],"Detection":[82],"Systems":[83],"(IDS)":[84],"specifically":[85],"IoT.":[87],"Most":[88],"recent":[89],"works":[90],"based":[92],"on":[93],"time":[94,150],"sequential":[95],"models":[96],"like":[97],"LSTM":[98],"there":[100],"is":[101,135,162,175],"short":[102],"research":[104],"CNNs":[106],"not":[110],"naturally":[111],"suited":[112],"this":[114,117],"problem.":[115],"In":[116],"article,":[118],"we":[119],"propose":[120],"novel":[122],"solution":[123],"against":[128],"devices":[130],"CNNs.":[132,158],"The":[133,159,177],"data":[134,148],"encoded":[136],"convolutional":[139],"operations":[140],"capture":[142],"patterns":[144],"from":[145],"sensors":[147],"along":[149],"that":[151],"useful":[153],"detection":[156,173],"proposed":[160],"method":[161],"integrated":[163],"with":[164],"two":[165],"classical":[166],"CNNs:":[167],"ResNet":[168],"EfficientNet,":[170],"where":[171],"performance":[174],"evaluated.":[176],"experimental":[178],"results":[179],"show":[180],"significant":[181],"improvement":[182],"both":[184],"true":[185],"positive":[186,190],"rate":[187,191],"false":[189],"compared":[192],"baseline":[195],"LSTM.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-12-31T00:00:00"}
