{"id":"https://openalex.org/W4224331011","doi":"https://doi.org/10.1109/tii.2022.3164770","title":"Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach","display_name":"Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach","publication_year":2022,"publication_date":"2022-04-05","ids":{"openalex":"https://openalex.org/W4224331011","doi":"https://doi.org/10.1109/tii.2022.3164770"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2022.3164770","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3164770","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2204.04837","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089746748","display_name":"Sk. Tanzir Mehedi","orcid":"https://orcid.org/0000-0003-4435-7856"},"institutions":[{"id":"https://openalex.org/I41173762","display_name":"Mawlana Bhashani Science and Technology University","ror":"https://ror.org/00gvj4587","country_code":"BD","type":"education","lineage":["https://openalex.org/I41173762"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Sk. Tanzir Mehedi","raw_affiliation_strings":["Department of ICT, Mawlana Bhashani Science and Technology University, Santosh, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of ICT, Mawlana Bhashani Science and Technology University, Santosh, Bangladesh","institution_ids":["https://openalex.org/I41173762"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Adnan Anwar","orcid":"https://orcid.org/0000-0003-0070-182X"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Adnan Anwar","raw_affiliation_strings":["CSRI, Deakin University, Burwood, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"CSRI, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100601783","display_name":"Ziaur Rahman","orcid":"https://orcid.org/0000-0002-7759-3428"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ziaur Rahman","raw_affiliation_strings":["School of CT, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of CT, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020570233","display_name":"Kawsar Ahmed","orcid":"https://orcid.org/0000-0002-4034-9819"},"institutions":[{"id":"https://openalex.org/I32625721","display_name":"University of Saskatchewan","ror":"https://ror.org/010x8gc63","country_code":"CA","type":"education","lineage":["https://openalex.org/I32625721"]},{"id":"https://openalex.org/I41173762","display_name":"Mawlana Bhashani Science and Technology University","ror":"https://ror.org/00gvj4587","country_code":"BD","type":"education","lineage":["https://openalex.org/I41173762"]}],"countries":["BD","CA"],"is_corresponding":false,"raw_author_name":"Kawsar Ahmed","raw_affiliation_strings":["Department of ICT, Mawlana Bhashani Science and Technology University, Santosh, Bangladesh","Department of ECE, University of Saskatchewan, Saskatoon, SK, Canada"],"affiliations":[{"raw_affiliation_string":"Department of ICT, Mawlana Bhashani Science and Technology University, Santosh, Bangladesh","institution_ids":["https://openalex.org/I41173762"]},{"raw_affiliation_string":"Department of ECE, University of Saskatchewan, Saskatoon, SK, Canada","institution_ids":["https://openalex.org/I32625721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065820146","display_name":"Rafiqul Islam","orcid":"https://orcid.org/0000-0001-8317-5727"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rafiqul Islam","raw_affiliation_strings":["School of CME, Charles Sturt University Study Centres, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of CME, Charles Sturt University Study Centres, Sydney, Australia","institution_ids":["https://openalex.org/I153230381"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089746748"],"corresponding_institution_ids":["https://openalex.org/I41173762"],"apc_list":null,"apc_paid":null,"fwci":21.4091,"has_fulltext":false,"cited_by_count":159,"citation_normalized_percentile":{"value":0.99706997,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"19","issue":"1","first_page":"1006","last_page":"1017"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.8508050441741943},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7805192470550537},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7283574938774109},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6994611620903015},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6606796979904175},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.6517945528030396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5087819695472717},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.49697044491767883},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.369204044342041},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3603980541229248},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32224351167678833},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.09728217124938965}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.8508050441741943},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7805192470550537},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7283574938774109},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6994611620903015},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6606796979904175},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.6517945528030396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5087819695472717},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.49697044491767883},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.369204044342041},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3603980541229248},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32224351167678833},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.09728217124938965},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tii.2022.3164770","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3164770","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2204.04837","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2204.04837","pdf_url":"https://arxiv.org/pdf/2204.04837","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:figshare.com:article/27556251","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2204.04837","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2204.04837","pdf_url":"https://arxiv.org/pdf/2204.04837","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1976262362","https://openalex.org/W1986614398","https://openalex.org/W2032536435","https://openalex.org/W2038194220","https://openalex.org/W2099419573","https://openalex.org/W2111619626","https://openalex.org/W2122838776","https://openalex.org/W2158265827","https://openalex.org/W2165744911","https://openalex.org/W2293605433","https://openalex.org/W2524594657","https://openalex.org/W2614904885","https://openalex.org/W2748868501","https://openalex.org/W2763978449","https://openalex.org/W2796215551","https://openalex.org/W2811266402","https://openalex.org/W2870670057","https://openalex.org/W2884745705","https://openalex.org/W2895028054","https://openalex.org/W2955014922","https://openalex.org/W2972000667","https://openalex.org/W2991513836","https://openalex.org/W2998376881","https://openalex.org/W3006624784","https://openalex.org/W3034006490","https://openalex.org/W3042715689","https://openalex.org/W3043459281","https://openalex.org/W3085955590","https://openalex.org/W3098503018","https://openalex.org/W3185646120","https://openalex.org/W3189862813","https://openalex.org/W3194661225","https://openalex.org/W3195028221","https://openalex.org/W3208097639","https://openalex.org/W3211147144","https://openalex.org/W4205236679","https://openalex.org/W6737662033","https://openalex.org/W6743493502","https://openalex.org/W6753923876","https://openalex.org/W6767711306"],"related_works":["https://openalex.org/W4252527915","https://openalex.org/W2409287660","https://openalex.org/W2233357156","https://openalex.org/W1976489385","https://openalex.org/W4256317220","https://openalex.org/W1506225852","https://openalex.org/W2141414364","https://openalex.org/W2376514150","https://openalex.org/W1523265213","https://openalex.org/W2363668972"],"abstract_inverted_index":{"Security":[0],"concerns":[1],"for":[2,99,161],"Internet":[3],"of":[4,12,47,68,119,165],"Things":[5],"(IoT)":[6],"applications":[7,25],"have":[8,83,93,109],"been":[9,191],"alarming":[10],"because":[11],"their":[13],"widespread":[14],"use":[15],"in":[16,89,123],"different":[17,90],"enterprise":[18],"systems.":[19],"The":[20,144],"potential":[21,97],"threats":[22],"to":[23,62,112,155],"these":[24],"are":[26,38],"constantly":[27],"emerging":[28,107],"and":[29,34,50,79,85,92,106,117,158,177,195,207],"changing,":[30],"and,":[31],"therefore,":[32],"sophisticated":[33],"dependable":[35,100,136,170],"defense":[36],"solutions":[37],"necessary":[39],"against":[40],"such":[41],"threats.":[42],"With":[43],"the":[44,54,65,69,113,120,200],"rapid":[45],"development":[46],"IoT":[48,72,126],"networks":[49],"evolving":[51],"threat":[52],"types,":[53],"traditional":[55,121],"machine":[56],"learning":[57,78,82,134,173],"based":[58,135,174],"IDS":[59,122,137],"must":[60],"update":[61],"cope":[63],"with":[64],"security":[66],"requirements":[67],"current":[70],"sustainable":[71],"environment.":[73],"In":[74],"recent":[75],"years,":[76],"deep":[77,80,132,171],"transfer":[81,133,172],"progressed":[84],"experienced":[86],"great":[87],"success":[88],"fields":[91],"emerged":[94],"as":[95],"a":[96,124,131,162,169,185],"solution":[98],"network":[101],"intrusion":[102],"detection.":[103],"However,":[104],"new":[105],"challenges":[108],"arisen":[110],"related":[111],"accuracy,":[114],"efficiency,":[115],"scalability,":[116],"dependability":[118],"heterogeneous":[125],"setup.":[127],"This":[128],"manuscript":[129],"proposes":[130],"model":[138,176,202],"that":[139,199],"outperforms":[140],"several":[141],"existing":[142],"approaches.":[143],"unique":[145],"contributions":[146],"include":[147],"effective":[148],"attribute":[149],"selection,":[150],"which":[151],"is":[152,203],"best":[153],"suited":[154],"identify":[156],"normal":[157],"attack":[159],"scenarios":[160],"small":[163],"amount":[164],"labeled":[166],"data,":[167],"designing":[168],"ResNet":[175],"evaluating":[178],"considering":[179],"real-world":[180],"data.":[181],"To":[182],"this":[183],"end,":[184],"comprehensive":[186],"experimental":[187],"performance":[188,196],"evaluation":[189,197],"has":[190,208],"conducted.":[192],"Extensive":[193],"analysis":[194],"show":[198],"proposed":[201],"robust,":[204],"more":[205],"efficient,":[206],"demonstrated":[209],"better":[210],"performance,":[211],"ensuring":[212],"dependability.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":57},{"year":2024,"cited_by_count":46},{"year":2023,"cited_by_count":40},{"year":2022,"cited_by_count":7}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
