{"id":"https://openalex.org/W3087041179","doi":"https://doi.org/10.1109/tcyb.2020.3013416","title":"Learning Latent Representation for IoT Anomaly Detection","display_name":"Learning Latent Representation for IoT Anomaly Detection","publication_year":2020,"publication_date":"2020-09-18","ids":{"openalex":"https://openalex.org/W3087041179","doi":"https://doi.org/10.1109/tcyb.2020.3013416","mag":"3087041179","pmid":"https://pubmed.ncbi.nlm.nih.gov/32946404"},"language":"en","primary_location":{"id":"doi:10.1109/tcyb.2020.3013416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2020.3013416","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://opus.lib.uts.edu.au/bitstream/10453/142003/3/Learning%20Latent%20Representation%20for%20IoT%20Anomaly%20Detection.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048085986","display_name":"Ly Vu","orcid":"https://orcid.org/0000-0001-6311-1056"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Ly Vu","raw_affiliation_strings":["Faculty of Information Technology, Le Quy Don Technical University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082857079","display_name":"Van Loi Cao","orcid":"https://orcid.org/0000-0002-3637-9230"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van Loi Cao","raw_affiliation_strings":["Faculty of Information Technology, Le Quy Don Technical University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101400536","display_name":"Quang Uy Nguyen","orcid":"https://orcid.org/0000-0001-7099-5187"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Quang Uy Nguyen","raw_affiliation_strings":["Faculty of Information Technology, Le Quy Don Technical University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100697893","display_name":"Diep N. Nguyen","orcid":"https://orcid.org/0000-0003-2659-8648"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Diep N. Nguyen","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007992576","display_name":"Dinh Thai Hoang","orcid":"https://orcid.org/0000-0002-9528-0863"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Thai Hoang","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063537942","display_name":"Eryk Dutkiewicz","orcid":"https://orcid.org/0000-0002-4268-9286"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Eryk Dutkiewicz","raw_affiliation_strings":["School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5048085986"],"corresponding_institution_ids":["https://openalex.org/I131359167"],"apc_list":null,"apc_paid":null,"fwci":6.9527,"has_fulltext":true,"cited_by_count":85,"citation_normalized_percentile":{"value":0.97146922,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"52","issue":"5","first_page":"3769","last_page":"3782"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8264874815940857},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7570642232894897},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6435852646827698},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6032201051712036},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5593394041061401},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4722651243209839},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4719506800174713},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45710310339927673},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4330795407295227},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4227932095527649},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2449125051498413},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.13738694787025452}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8264874815940857},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7570642232894897},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6435852646827698},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6032201051712036},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5593394041061401},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4722651243209839},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4719506800174713},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45710310339927673},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4330795407295227},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4227932095527649},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2449125051498413},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.13738694787025452},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tcyb.2020.3013416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcyb.2020.3013416","pdf_url":null,"source":{"id":"https://openalex.org/S4210191041","display_name":"IEEE Transactions on Cybernetics","issn_l":"2168-2267","issn":["2168-2267","2168-2275"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cybernetics","raw_type":"journal-article"},{"id":"pmid:32946404","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/32946404","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on cybernetics","raw_type":null},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/142003","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/142003","pdf_url":"https://opus.lib.uts.edu.au/bitstream/10453/142003/3/Learning%20Latent%20Representation%20for%20IoT%20Anomaly%20Detection.pdf","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:opus.lib.uts.edu.au:10453/142003","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/142003","pdf_url":"https://opus.lib.uts.edu.au/bitstream/10453/142003/3/Learning%20Latent%20Representation%20for%20IoT%20Anomaly%20Detection.pdf","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8787149317","display_name":null,"funder_award_id":"102.05-2019.05","funder_id":"https://openalex.org/F4320313223","funder_display_name":"Vietnam Academy of Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320313223","display_name":"Vietnam Academy of Science and Technology","ror":"https://ror.org/02wsd5p50"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3087041179.pdf","grobid_xml":"https://content.openalex.org/works/W3087041179.grobid-xml"},"referenced_works_count":54,"referenced_works":["https://openalex.org/W1503432700","https://openalex.org/W1522301498","https://openalex.org/W1832693441","https://openalex.org/W1959608418","https://openalex.org/W1966809779","https://openalex.org/W2065323196","https://openalex.org/W2096451472","https://openalex.org/W2100537916","https://openalex.org/W2101234009","https://openalex.org/W2110798204","https://openalex.org/W2119821739","https://openalex.org/W2122646361","https://openalex.org/W2145094598","https://openalex.org/W2294271434","https://openalex.org/W2312490072","https://openalex.org/W2321627895","https://openalex.org/W2342992012","https://openalex.org/W2473283431","https://openalex.org/W2508881195","https://openalex.org/W2516866958","https://openalex.org/W2555676925","https://openalex.org/W2562908385","https://openalex.org/W2606697812","https://openalex.org/W2748868501","https://openalex.org/W2754804809","https://openalex.org/W2756396702","https://openalex.org/W2766315530","https://openalex.org/W2772303842","https://openalex.org/W2783685331","https://openalex.org/W2788455797","https://openalex.org/W2799758613","https://openalex.org/W2808472075","https://openalex.org/W2902132692","https://openalex.org/W2907310707","https://openalex.org/W2907516583","https://openalex.org/W2908736334","https://openalex.org/W2910068345","https://openalex.org/W2914421493","https://openalex.org/W2919115771","https://openalex.org/W2961448107","https://openalex.org/W2963518686","https://openalex.org/W2991510021","https://openalex.org/W2997574889","https://openalex.org/W3004538749","https://openalex.org/W3122864121","https://openalex.org/W3147637501","https://openalex.org/W4230953519","https://openalex.org/W4238869593","https://openalex.org/W6607232846","https://openalex.org/W6630210095","https://openalex.org/W6631943919","https://openalex.org/W6675354045","https://openalex.org/W6681096077","https://openalex.org/W6696675015"],"related_works":["https://openalex.org/W2595172197","https://openalex.org/W2084856301","https://openalex.org/W2127970246","https://openalex.org/W2885125400","https://openalex.org/W1989889224","https://openalex.org/W4382618745","https://openalex.org/W1973775000","https://openalex.org/W2748922771","https://openalex.org/W1987128138","https://openalex.org/W2743976221"],"abstract_inverted_index":{"Internet":[0],"of":[1,20,47,52,76,85,102,151,166,208,226,243,250,258],"Things":[2],"(IoT)":[3],"has":[4],"emerged":[5],"as":[6,96,186],"a":[7,44,128,156,172],"cutting-edge":[8],"technology":[9],"that":[10,216,265],"is":[11,65,261,266],"changing":[12],"human":[13],"life.":[14],"The":[15,163,212,255],"rapid":[16],"and":[17,55,73,79,82,107,114,178,247],"widespread":[18],"applications":[19],"IoT,":[21],"however,":[22],"make":[23],"cyberspace":[24],"more":[25,94],"vulnerable,":[26],"especially":[27],"to":[28,37,69,111,133,154,204,239],"IoT-based":[29,58,88],"attacks":[30,59,98,181],"in":[31,123,171,230],"which":[32],"IoT":[33,48,77,180,202,233],"devices":[34,49,78],"are":[35,60,92],"used":[36,185],"launch":[38],"attack":[39],"on":[40,199,252],"cyber-physical":[41],"systems.":[42,117],"Given":[43],"massive":[45],"number":[46],"(in":[50],"order":[51],"billions),":[53],"detecting":[54,231],"preventing":[56],"these":[57,97,167,259],"critical.":[61],"However,":[62],"this":[63,124],"task":[64],"very":[66],"challenging":[67],"due":[68],"the":[70,80,103,116,160,187,206,209,217,224,241,244,248],"limited":[71],"energy":[72],"computing":[74],"capabilities":[75],"continuous":[81],"fast":[83],"evolution":[84],"attackers.":[86],"Among":[87],"attacks,":[89,122,138],"unknown":[90,137,232],"ones":[91],"far":[93],"devastating":[95],"could":[99],"surpass":[100],"most":[101,269],"current":[104],"security":[105],"systems":[106],"it":[108],"takes":[109],"time":[110,257],"detect":[112,120],"them":[113],"\"cure\"":[115],"To":[118],"effectively":[119],"new/unknown":[121],"article,":[125],"we":[126,146],"propose":[127],"novel":[129],"representation":[130,158,220],"learning":[131,228],"method":[132],"better":[134],"predictively":[135],"\"describe\"":[136],"facilitating":[139],"supervised":[140,173,227],"learning-based":[141],"anomaly":[142],"detection":[143],"methods.":[144],"Specifically,":[145],"develop":[147],"three":[148],"regularized":[149,168],"versions":[150],"autoencoders":[152],"(AEs)":[153],"learn":[155],"latent":[157,219],"from":[159],"input":[161,189],"data.":[162],"bottleneck":[164],"layers":[165],"AEs":[169],"trained":[170],"manner":[174],"using":[175],"normal":[176],"data":[177],"known":[179],"will":[182],"then":[183],"be":[184],"new":[188,218],"features":[190],"for":[191,268],"classification":[192],"algorithms.":[193],"We":[194,235],"carry":[195],"out":[196],"extensive":[197],"experiments":[198,238],"nine":[200],"recent":[201],"datasets":[203],"evaluate":[205],"performance":[207,225],"proposed":[210,245],"models.":[211],"experimental":[213],"results":[214],"demonstrate":[215],"can":[221],"significantly":[222],"enhance":[223],"methods":[229],"attacks.":[234],"also":[236],"conduct":[237],"investigate":[240],"characteristics":[242],"models":[246,260],"influence":[249],"hyperparameters":[251],"their":[253],"performance.":[254],"running":[256],"about":[262],"1.3":[263],"ms":[264],"pragmatic":[267],"applications.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
