{"id":"https://openalex.org/W7123358224","doi":"https://doi.org/10.1109/tce.2026.3651524","title":"Auto-EAD: An Automated Ensemble Anomaly Detection Framework for the CEN-IoT","display_name":"Auto-EAD: An Automated Ensemble Anomaly Detection Framework for the CEN-IoT","publication_year":2026,"publication_date":"2026-01-12","ids":{"openalex":"https://openalex.org/W7123358224","doi":"https://doi.org/10.1109/tce.2026.3651524"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2026.3651524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2026.3651524","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122898038","display_name":"Lei Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Ding","raw_affiliation_strings":["School of Cyber Science and Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121914104","display_name":"Wenli Shang","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenli Shang","raw_affiliation_strings":["School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122851748","display_name":"Shuang Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"education","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Wang","raw_affiliation_strings":["Institute of Science, Technology and Innovation, Civil Aviation University of China, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Institute of Science, Technology and Innovation, Civil Aviation University of China, Tianjin, China","institution_ids":["https://openalex.org/I28813325"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122906454","display_name":"Haoran Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoran Gao","raw_affiliation_strings":["School of Cyber Science and Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121018958","display_name":"Lianhai Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lianhai Wang","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5122898038"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0848334,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"2368","last_page":"2382"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.4268999993801117,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.4268999993801117,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.23119999468326569,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.07349999994039536,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.715399980545044},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.48969998955726624},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.47600001096725464},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.45080000162124634},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.412200003862381},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.397599995136261},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.39239999651908875},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3910999894142151},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.37290000915527344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7278000116348267},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.715399980545044},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5392000079154968},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5321999788284302},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.48969998955726624},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.47600001096725464},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4555000066757202},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.45080000162124634},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.412200003862381},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.397599995136261},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.39239999651908875},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3910999894142151},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.37290000915527344},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.37229999899864197},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.3474999964237213},{"id":"https://openalex.org/C2778049539","wikidata":"https://www.wikidata.org/wiki/Q17002908","display_name":"Bayesian optimization","level":2,"score":0.33629998564720154},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.3361999988555908},{"id":"https://openalex.org/C101814296","wikidata":"https://www.wikidata.org/wiki/Q5439685","display_name":"Feature model","level":3,"score":0.33550000190734863},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3305000066757202},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.322299987077713},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.29919999837875366},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.28600001335144043},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.28119999170303345},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.27250000834465027},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C82142266","wikidata":"https://www.wikidata.org/wiki/Q3456604","display_name":"Dynamic Bayesian network","level":3,"score":0.25920000672340393},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.25859999656677246},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2026.3651524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2026.3651524","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6694690585136414}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":63,"referenced_works":["https://openalex.org/W2621135414","https://openalex.org/W2899750879","https://openalex.org/W2958333154","https://openalex.org/W2963666666","https://openalex.org/W3010176271","https://openalex.org/W3023012876","https://openalex.org/W3093074257","https://openalex.org/W3110902746","https://openalex.org/W3119781401","https://openalex.org/W3120253499","https://openalex.org/W3120353641","https://openalex.org/W3139250374","https://openalex.org/W3156522613","https://openalex.org/W3175386426","https://openalex.org/W3179240416","https://openalex.org/W3202417356","https://openalex.org/W3202760407","https://openalex.org/W3211805421","https://openalex.org/W3216015240","https://openalex.org/W3216272927","https://openalex.org/W3217016149","https://openalex.org/W4200037416","https://openalex.org/W4210471555","https://openalex.org/W4220922367","https://openalex.org/W4224217785","https://openalex.org/W4285820203","https://openalex.org/W4288061065","https://openalex.org/W4291034555","https://openalex.org/W4306377369","https://openalex.org/W4306650020","https://openalex.org/W4308936934","https://openalex.org/W4312204688","https://openalex.org/W4312753067","https://openalex.org/W4312767611","https://openalex.org/W4321021465","https://openalex.org/W4367669895","https://openalex.org/W4378188875","https://openalex.org/W4378195073","https://openalex.org/W4379380408","https://openalex.org/W4382865033","https://openalex.org/W4389538721","https://openalex.org/W4390576916","https://openalex.org/W4393158476","https://openalex.org/W4394927283","https://openalex.org/W4394985087","https://openalex.org/W4396835482","https://openalex.org/W4399342916","https://openalex.org/W4401692221","https://openalex.org/W4401726558","https://openalex.org/W4401833791","https://openalex.org/W4401863288","https://openalex.org/W4402304597","https://openalex.org/W4402829053","https://openalex.org/W4403321208","https://openalex.org/W4403458147","https://openalex.org/W4403555713","https://openalex.org/W4404056368","https://openalex.org/W4404279286","https://openalex.org/W4404884764","https://openalex.org/W4405232523","https://openalex.org/W4406110711","https://openalex.org/W4408145489","https://openalex.org/W4409139680"],"related_works":[],"abstract_inverted_index":{"The":[0,19,132,177,222,267],"Internet":[1],"of":[2,21,105,123,136,190,219,243,277],"Things":[3],"(IoT)":[4],"based":[5,48,71],"on":[6,49,72,227],"consumer":[7,128],"electronic":[8],"networks":[9],"(CEN-IoT)":[10],"is":[11,57,184,202],"confronting":[12],"diverse,":[13],"stealthy,":[14],"and":[15,43,153,174,215,233,251,258,283],"large-scale":[16],"network":[17,130,265],"attacks.":[18],"targets":[20],"attackers":[22],"are":[23,76],"no":[24],"longer":[25],"limited":[26],"to":[27,35,61,64,102,211,248,274],"individual":[28],"devices":[29],"or":[30],"data,":[31],"but":[32,93],"also":[33,94],"extend":[34],"multiple":[36],"domains,":[37],"including":[38],"device":[39],"hijacking,":[40],"data":[41,138,162,168,175],"exfiltration,":[42],"service":[44],"disruption.":[45],"Anomaly":[46,115],"detection":[47,69],"machine":[50,192],"learning,":[51],"as":[52],"an":[53,112],"effective":[54],"defensive":[55],"measure,":[56],"gradually":[58],"being":[59],"applied":[60],"IoT":[62,234],"systems":[63],"enhance":[65],"cybersecurity.":[66],"Although":[67],"anomaly":[68,220],"algorithms":[70],"artificial":[73],"intelligence/machine":[74],"learning":[75,146,193],"widely":[77],"employed":[78,165],"in":[79,126,256,262],"constructing":[80],"cybersecurity":[81,107,278],"mechanisms,":[82],"such":[83],"technologies":[84],"not":[85],"only":[86],"require":[87],"substantial":[88],"support":[89],"from":[90,96],"human":[91,213],"experts":[92],"suffer":[95],"model":[97,134,145,151,155,206,208,246],"drift,":[98],"posing":[99],"considerable":[100],"challenges":[101],"the":[103,120,159,244,275],"development":[104],"autonomous":[106,281],"measures.":[108],"This":[109],"paper":[110,269],"proposes":[111],"Automated":[113],"Ensemble":[114],"Detection":[116],"Framework":[117],"(Auto-EAD)":[118],"for":[119,186,204],"automatic":[121,167],"identification":[122],"abnormal":[124,260],"behaviors":[125,261],"dynamic":[127],"electronics":[129],"environments.":[131,266],"proposed":[133,203,245],"consists":[135],"automated":[137,140,143,150,154,161,205],"preprocessing,":[139],"feature":[141,172],"engineering,":[142],"base":[144],"with":[147,238,280],"hyperparameter":[148,187],"optimization,":[149],"selection,":[152],"integration":[156],"modules.":[157],"Specifically,":[158],"primary":[160],"preprocessing":[163],"techniques":[164],"include":[166],"transformation,":[169,171],"inverse":[170],"standardization,":[173],"balancing.":[176],"Covariance":[178],"Matrix":[179],"Adaptation":[180],"Evolution":[181],"Strategy":[182],"(CMA-ES)":[183],"utilized":[185],"optimization":[188],"(HPO)":[189],"tree-based":[191],"(ML)":[194],"models,":[195],"while":[196],"a":[197,271],"novel":[198,272],"stair":[199],"ensemble":[200],"method":[201],"ensemble.This":[207],"was":[209,225],"developed":[210],"minimize":[212],"intervention":[214],"achieve":[216],"full-lifecycle":[217],"automation":[218],"detection.":[221],"Auto-EAD":[223],"framework":[224],"evaluated":[226],"three":[228],"public":[229],"datasets":[230],"(SWaT,":[231],"WADI,":[232],"Network":[235],"Intrusion":[236],"Dataset),":[237],"results":[239],"showing":[240],"superior":[241],"performance":[242],"compared":[247],"state-of-the-art":[249],"methods,":[250],"thereby":[252],"highlighting":[253],"its":[254],"effectiveness":[255],"handling":[257],"detecting":[259],"dynamically":[263],"complex":[264],"present":[268],"offers":[270],"approach":[273],"construction":[276],"ecosystems":[279],"decision-making":[282],"response":[284],"capabilities.":[285]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-14T00:00:00"}
