{"id":"https://openalex.org/W4312414679","doi":"https://doi.org/10.1109/tii.2022.3218722","title":"Traffic Load Learning Towards Early Detection of Intrusion in Industrial mMTC Networks","display_name":"Traffic Load Learning Towards Early Detection of Intrusion in Industrial mMTC Networks","publication_year":2022,"publication_date":"2022-11-04","ids":{"openalex":"https://openalex.org/W4312414679","doi":"https://doi.org/10.1109/tii.2022.3218722"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2022.3218722","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3218722","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079652678","display_name":"Zixiao Zhao","orcid":"https://orcid.org/0000-0001-8259-6941"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zixiao Zhao","raw_affiliation_strings":["School of Information and Communications Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communications Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054096196","display_name":"Qinghe Du","orcid":"https://orcid.org/0000-0002-4992-9166"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinghe Du","raw_affiliation_strings":["School of Information and Communications Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communications Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079301418","display_name":"Houbing Song","orcid":"https://orcid.org/0000-0003-2631-9223"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houbing Song","raw_affiliation_strings":["Department of Information Systems, University of Maryland Baltimore County, Baltimore, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, University of Maryland Baltimore County, Baltimore, MD, USA","institution_ids":["https://openalex.org/I79272384"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079652678"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":1.7234,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86966405,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"19","issue":"7","first_page":"8441","last_page":"8451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6743810176849365},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6677617430686951},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5557535886764526},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4957962930202484},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.437167763710022},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42226290702819824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3972771465778351},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0989806056022644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6743810176849365},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6677617430686951},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5557535886764526},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4957962930202484},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.437167763710022},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42226290702819824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3972771465778351},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0989806056022644},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2022.3218722","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3218722","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1518016665","https://openalex.org/W1773550527","https://openalex.org/W2043089557","https://openalex.org/W2080375052","https://openalex.org/W2334263353","https://openalex.org/W2522693205","https://openalex.org/W2560162835","https://openalex.org/W2797153665","https://openalex.org/W2806061530","https://openalex.org/W2819211778","https://openalex.org/W2900034845","https://openalex.org/W2911505293","https://openalex.org/W2919358060","https://openalex.org/W2929049293","https://openalex.org/W2955014922","https://openalex.org/W2962715987","https://openalex.org/W2964133168","https://openalex.org/W2995802802","https://openalex.org/W3003685271","https://openalex.org/W3008052774","https://openalex.org/W3027993135","https://openalex.org/W3080516458","https://openalex.org/W3080962733","https://openalex.org/W3086419524","https://openalex.org/W3097179687","https://openalex.org/W3098774053","https://openalex.org/W3125147344","https://openalex.org/W3125694668","https://openalex.org/W3171918319","https://openalex.org/W3179046031","https://openalex.org/W3196085846","https://openalex.org/W3208438735","https://openalex.org/W4292483811","https://openalex.org/W6680738024"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2065457896","https://openalex.org/W3173234801","https://openalex.org/W2361044160"],"abstract_inverted_index":{"The":[0],"fifth":[1],"generation":[2],"network":[3,55,83,104],"offers":[4],"a":[5,53],"powerful":[6],"infrastructure":[7],"for":[8,35],"Industrial":[9],"internet":[10],"of":[11,68,85,111,132],"things":[12],"(IoT)":[13],"in":[14,48],"that":[15,123],"its":[16],"support":[17],"on":[18],"massive":[19],"machine-type":[20],"communications":[21],"(mMTC).":[22],"Recently,":[23],"grant-free":[24],"access":[25,33,69,74],"has":[26],"been":[27],"recognized":[28],"as":[29],"the":[30,41,62,124,130],"promising":[31],"new":[32],"approach":[34],"mMTC;":[36],"however,":[37],"it":[38],"also":[39],"introduces":[40],"potential":[42],"risk.":[43],"To":[44],"timely":[45],"discover":[46],"intrusion,":[47,112],"this":[49],"article,":[50],"we":[51],"propose":[52],"learning":[54,82,103],"by":[56,138],"extracting":[57],"traffic":[58,91,94],"load":[59,92,95],"information":[60],"from":[61],"states":[63],"(success,":[64],"collision,":[65],"and":[66,76,97,117,142],"idle)":[67],"resources":[70],"observed":[71],"at":[72],"media":[73],"control":[75],"physical":[77],"layers.":[78],"In":[79],"particular,":[80],"our":[81,101],"consists":[84],"three":[86],"concatenated":[87],"function":[88],"modules,":[89],"i.e.,":[90,113],"estimation,":[93],"prediction,":[96],"intrusion":[98],"identification.":[99],"Moreover,":[100],"proposed":[102,125],"is":[105],"able":[106],"to":[107],"identify":[108],"two":[109],"types":[110],"false":[114],"data":[115],"dissemination":[116],"congestion":[118],"attack.":[119],"Simulation":[120],"results":[121],"indicate":[122],"scheme":[126],"can":[127],"effectively":[128],"capture":[129],"number":[131],"active":[133],"devices,":[134],"provide":[135],"reasonable":[136],"prediction":[137],"using":[139],"history":[140],"records,":[141],"eventually,":[143],"achieve":[144],"more":[145],"accurate":[146],"detection":[147],"compared":[148],"with":[149],"baseline":[150],"approaches.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
