{"id":"https://openalex.org/W4412444911","doi":"https://doi.org/10.1109/tnse.2025.3588739","title":"IoT-TSO: An Unsupervised Method for Classifying Malicious IoT Traffic via Tensor Self-Optimization","display_name":"IoT-TSO: An Unsupervised Method for Classifying Malicious IoT Traffic via Tensor Self-Optimization","publication_year":2025,"publication_date":"2025-07-15","ids":{"openalex":"https://openalex.org/W4412444911","doi":"https://doi.org/10.1109/tnse.2025.3588739"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3588739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3588739","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093837330","display_name":"Fengyuan Nie","orcid":"https://orcid.org/0009-0003-8085-7011"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fengyuan Nie","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359503","display_name":"Weiwei Liu","orcid":"https://orcid.org/0000-0001-7353-9136"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiwei Liu","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062243742","display_name":"Guangjie Liu","orcid":"https://orcid.org/0000-0003-4729-7406"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangjie Liu","raw_affiliation_strings":["School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102994219","display_name":"Bo Gao","orcid":"https://orcid.org/0000-0002-1787-6194"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Gao","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071102944","display_name":"Jianan Huang","orcid":"https://orcid.org/0009-0001-4002-378X"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Huang","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060020877","display_name":"Chau Yuen","orcid":"https://orcid.org/0000-0002-9307-2120"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chau Yuen","raw_affiliation_strings":["School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5093837330"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.85983378,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"13","issue":null,"first_page":"966","last_page":"979"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9531000256538391,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13650","display_name":"Computational Physics and Python Applications","score":0.9448000192642212,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.697192907333374},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5199043154716492},{"id":"https://openalex.org/keywords/tensor","display_name":"Tensor (intrinsic definition)","score":0.49770787358283997},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3903028964996338},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38327425718307495},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3819993734359741},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2762323319911957},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20566335320472717}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.697192907333374},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5199043154716492},{"id":"https://openalex.org/C155281189","wikidata":"https://www.wikidata.org/wiki/Q3518150","display_name":"Tensor (intrinsic definition)","level":2,"score":0.49770787358283997},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3903028964996338},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38327425718307495},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3819993734359741},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2762323319911957},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20566335320472717},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3588739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3588739","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1521553548","https://openalex.org/W1977556410","https://openalex.org/W1992426838","https://openalex.org/W1993962865","https://openalex.org/W1997201895","https://openalex.org/W2030927653","https://openalex.org/W2043571470","https://openalex.org/W2080843093","https://openalex.org/W2091449379","https://openalex.org/W2113076747","https://openalex.org/W2149229264","https://openalex.org/W2156410054","https://openalex.org/W2190207511","https://openalex.org/W2412278696","https://openalex.org/W2527153419","https://openalex.org/W2565835729","https://openalex.org/W2808135560","https://openalex.org/W2888505697","https://openalex.org/W2892556724","https://openalex.org/W2900853407","https://openalex.org/W2911505293","https://openalex.org/W2962911132","https://openalex.org/W2963840432","https://openalex.org/W3005645561","https://openalex.org/W3019954098","https://openalex.org/W3048975637","https://openalex.org/W3082129402","https://openalex.org/W3082179621","https://openalex.org/W3096448935","https://openalex.org/W3128341305","https://openalex.org/W3134226201","https://openalex.org/W3166596953","https://openalex.org/W3167788848","https://openalex.org/W3173170122","https://openalex.org/W3183098327","https://openalex.org/W4220957574","https://openalex.org/W4235169531","https://openalex.org/W4286364155","https://openalex.org/W4295789122","https://openalex.org/W4296229353","https://openalex.org/W4303022557","https://openalex.org/W4308085832","https://openalex.org/W4312988191","https://openalex.org/W4318761280","https://openalex.org/W4328102479","https://openalex.org/W4367047070","https://openalex.org/W4379116847","https://openalex.org/W4385776184","https://openalex.org/W4386322011","https://openalex.org/W4390547394","https://openalex.org/W4391426515","https://openalex.org/W4400747953","https://openalex.org/W4401113387","https://openalex.org/W4402105908","https://openalex.org/W4410935332"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Machine":[0],"learning-based":[1],"network":[2,85],"traffic":[3,42,59,77,93,108,123,146,174,183],"classification":[4,94,179],"is":[5,22,33,44,131],"crucial":[6],"for":[7,24,61,104,152],"ensuring":[8],"communication":[9],"security":[10],"in":[11,35,88],"Internet":[12],"of":[13,68],"Things":[14],"(IoT),":[15],"particularly":[16],"with":[17,72,192],"unsupervised":[18,49,102,201],"methods.":[19],"This":[20],"approach":[21],"valued":[23],"its":[25,196],"low":[26],"dependency":[27],"on":[28,53],"manually":[29],"labeled":[30],"samples,":[31],"which":[32],"beneficial":[34],"scenarios":[36,90],"where":[37],"collecting":[38],"sufficiently":[39],"diverse":[40],"malicious":[41,73,106],"samples":[43],"challenging.":[45],"However,":[46],"most":[47],"existing":[48],"methods":[50],"heavily":[51],"rely":[52],"expert":[54],"knowledge":[55],"to":[56,133,161,176,187],"extract":[57],"shallow":[58],"features":[60,70],"constructing":[62],"representations,":[63,165],"limiting":[64],"the":[65,145,156,169,189],"effective":[66],"utilization":[67],"deep":[69],"associated":[71],"traffic.":[74],"Moreover,":[75],"incomplete":[76],"data":[78],"resulting":[79],"from":[80],"various":[81],"efficient":[82],"but":[83],"unreliable":[84],"transmission":[86],"protocols":[87],"IoT":[89,107,182],"significantly":[91],"impact":[92],"performance.":[95,180],"In":[96],"this":[97],"paper,":[98],"we":[99],"propose":[100],"an":[101,149],"method":[103],"classifying":[105],"using":[109],"tensor":[110,126,135,147],"self-optimization":[111],"(IoT-TSO).":[112],"First,":[113],"packet-wise":[114],"representations":[115],"are":[116,185],"extracted":[117],"and":[118,139],"constructed":[119],"into":[120,148],"a":[121],"high-order":[122],"tensor.":[124],"Then,":[125],"singular":[127],"value":[128],"decomposition":[129],"(t-SVD)":[130],"employed":[132],"achieve":[134],"self-completion":[136],"optimization":[137,141],"(SCO)":[138],"self-expressive":[140],"(SEO)":[142],"strategies,":[143],"transforming":[144],"optimized":[150],"form":[151],"clustering.":[153],"SCO":[154],"leverages":[155],"spatio-temporal":[157],"correlations":[158],"among":[159],"packets":[160],"recover":[162],"missing":[163],"packet":[164],"while":[166],"SEO":[167],"explores":[168],"intrinsic":[170],"relationships":[171],"between":[172],"different":[173],"flows":[175],"further":[177],"enhance":[178],"Typical":[181],"datasets":[184],"used":[186],"benchmark":[188],"proposed":[190],"method,":[191],"experimental":[193],"results":[194],"demonstrating":[195],"superior":[197],"performance":[198],"over":[199],"state-of-the-art":[200],"approaches.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-23T05:10:03.516525","created_date":"2025-10-10T00:00:00"}
