{"id":"https://openalex.org/W4415179180","doi":"https://doi.org/10.1109/tnse.2025.3620678","title":"DRL-Aided Trust Evaluation for Malicious Host Detection in Artificial Intelligence of Things","display_name":"DRL-Aided Trust Evaluation for Malicious Host Detection in Artificial Intelligence of Things","publication_year":2025,"publication_date":"2025-10-14","ids":{"openalex":"https://openalex.org/W4415179180","doi":"https://doi.org/10.1109/tnse.2025.3620678"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3620678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3620678","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yu Xia","orcid":"https://orcid.org/0009-0001-7203-1418"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Xia","raw_affiliation_strings":["State Key Laboratory of Advanced Rail Autonomous Operation, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0001-7203-1418","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Advanced Rail Autonomous Operation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ying Liu","orcid":"https://orcid.org/0000-0001-7521-5880"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Liu","raw_affiliation_strings":["State Key Laboratory of Advanced Rail Autonomous Operation, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-7521-5880","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Advanced Rail Autonomous Operation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076675337","display_name":"Weiting Zhang","orcid":"https://orcid.org/0000-0003-2626-4883"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiting Zhang","raw_affiliation_strings":["School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2626-4883","affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102508620","display_name":"Jianhui Yin","orcid":"https://orcid.org/0009-0005-9715-1773"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhui Yin","raw_affiliation_strings":["School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0005-9715-1773","affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017670686","display_name":"Jinju Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinju Hu","raw_affiliation_strings":["School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tong Liang","orcid":"https://orcid.org/0009-0000-0735-7692"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Liang","raw_affiliation_strings":["School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0000-0735-7692","affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091713195","display_name":"Hongke Zhang","orcid":"https://orcid.org/0000-0001-8906-813X"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongke Zhang","raw_affiliation_strings":["School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8906-813X","affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32825477,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"2777","last_page":"2792"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.7131999731063843},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5320000052452087},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5044999718666077},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.47699999809265137},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.40529999136924744},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.39629998803138733},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.3939000070095062},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.39250001311302185},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.39169999957084656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7682999968528748},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.7131999731063843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.667900025844574},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5320000052452087},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5044999718666077},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.47699999809265137},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.40529999136924744},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.39629998803138733},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3939000070095062},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.39250001311302185},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.39169999957084656},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.38530001044273376},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.38530001044273376},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3709000051021576},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.33309999108314514},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.3310999870300293},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3142000138759613},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30399999022483826},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.29980000853538513},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.2851000130176544},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.2734000086784363},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3620678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3620678","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4234240715","display_name":null,"funder_award_id":"62471030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4892979250","display_name":null,"funder_award_id":"2024JBGP002","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":70,"referenced_works":["https://openalex.org/W2047301871","https://openalex.org/W2111942706","https://openalex.org/W2118404561","https://openalex.org/W2137816628","https://openalex.org/W2305409997","https://openalex.org/W2342992012","https://openalex.org/W2752291283","https://openalex.org/W2769200374","https://openalex.org/W2789694608","https://openalex.org/W2789746206","https://openalex.org/W2790319134","https://openalex.org/W2795128199","https://openalex.org/W2797742547","https://openalex.org/W2799758613","https://openalex.org/W2893388915","https://openalex.org/W2914295391","https://openalex.org/W2947413395","https://openalex.org/W2953030092","https://openalex.org/W2954535343","https://openalex.org/W2986268773","https://openalex.org/W2991722918","https://openalex.org/W2999613521","https://openalex.org/W3000193443","https://openalex.org/W3010704820","https://openalex.org/W3026820624","https://openalex.org/W3033250580","https://openalex.org/W3040628207","https://openalex.org/W3049341082","https://openalex.org/W3082110198","https://openalex.org/W3087852527","https://openalex.org/W3091319359","https://openalex.org/W3109340983","https://openalex.org/W3118352709","https://openalex.org/W3127021526","https://openalex.org/W3147376395","https://openalex.org/W3185153723","https://openalex.org/W3186314399","https://openalex.org/W3187651881","https://openalex.org/W3197159805","https://openalex.org/W4205352200","https://openalex.org/W4220693827","https://openalex.org/W4225718750","https://openalex.org/W4226085896","https://openalex.org/W4285183609","https://openalex.org/W4285310054","https://openalex.org/W4300860518","https://openalex.org/W4360995354","https://openalex.org/W4380569857","https://openalex.org/W4388407891","https://openalex.org/W4389352673","https://openalex.org/W4389403359","https://openalex.org/W4389664993","https://openalex.org/W4390534695","https://openalex.org/W4391019797","https://openalex.org/W4394674411","https://openalex.org/W4394730827","https://openalex.org/W4395480738","https://openalex.org/W4396712504","https://openalex.org/W4399909126","https://openalex.org/W4399994563","https://openalex.org/W4401943608","https://openalex.org/W4404520562","https://openalex.org/W4404562994","https://openalex.org/W4406046965","https://openalex.org/W4406321517","https://openalex.org/W4407213024","https://openalex.org/W4408222626","https://openalex.org/W4411358654","https://openalex.org/W4414123601","https://openalex.org/W4415971195"],"related_works":[],"abstract_inverted_index":{"Artificial":[0],"Intelligence":[1],"of":[2,10,30,119,165,188],"Things":[3],"(AIoT),":[4],"built":[5],"upon":[6],"the":[7,27,31,40,45,117,124,133,162,170,180,186],"AI-empowered":[8],"Internet":[9],"Things,":[11],"provides":[12],"powerful":[13],"perception":[14],"and":[15,26,74,107,128,139,148,153,179,240],"decision-making":[16],"support":[17],"for":[18,111],"smart":[19],"applications.":[20],"However,":[21],"network":[22,137],"openness,":[23],"host":[24,90,155,219,237],"diversity,":[25],"high":[28],"security":[29],"computing":[32,41],"center":[33,42],"motivate":[34],"attackers":[35],"to":[36,39,44,66,102,115,123,150,159,161,184,197,216],"target":[37],"links":[38,60],"due":[43,122],"low":[46],"operational":[47],"cost.":[48],"The":[49],"link":[50],"flooding":[51],"attack":[52,57,64,72,75,127,172,200],"(LFA)":[53],"is":[54],"a":[55,88,176],"stealthy":[56],"targeting":[58],"critical":[59],"by":[61,70,169],"aggregating":[62],"distributed":[63],"traffic":[65,76,110,120,224],"cause":[67],"congestion,":[68],"characterized":[69],"rolling":[71,171],"patterns":[73],"disguised":[77],"as":[78],"legitimate.":[79],"To":[80],"defend":[81],"against":[82],"this":[83,85],"threat,":[84],"paper":[86],"proposes":[87],"malicious":[89,105,166,191,218,236],"detection":[91,220,238],"scheme":[92],"based":[93,210],"on":[94,193,211],"dynamic":[95,163],"trust":[96,142,156,194,206],"management,":[97],"named":[98],"<italic":[99,230],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[100,231],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AttSF</i>,":[101],"effectively":[103],"detect":[104],"hosts":[106,167,192],"proactively":[108],"block":[109],"long-term":[112],"defense.":[113],"First,":[114],"address":[116],"ineffectiveness":[118],"classification":[121],"similarity":[125],"between":[126],"benign":[129],"traffic,":[130],"we":[131,174,202],"capture":[132],"host's":[134],"behavior":[135,146],"within":[136],"events":[138],"define":[140],"multi-dimensional":[141],"evidence,":[143],"including":[144],"participation,":[145],"consistency,":[147],"variation,":[149],"obtain":[151],"robust":[152],"direct":[154],"estimation.":[157,195],"Second,":[158],"adapt":[160],"participation":[164],"caused":[168],"pattern,":[173],"introduce":[175],"sliding":[177],"window":[178],"historical":[181],"influence":[182],"factor":[183],"mitigate":[185],"effect":[187],"intermittently":[189],"low-participation":[190],"Finally,":[196],"withstand":[198],"changing":[199],"patterns,":[201],"propose":[203],"an":[204],"adaptive":[205],"penalty":[207],"thresholding":[208],"approach":[209],"deep":[212],"reinforcement":[213],"learning":[214],"(DRL)":[215],"improve":[217],"while":[221],"actively":[222],"enforcing":[223],"restriction.":[225],"Simulation":[226],"results":[227],"demonstrate":[228],"that":[229],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AttSF</i>":[232],"has":[233],"advantages":[234],"in":[235,241,245],"accuracy":[239],"reducing":[242],"false":[243],"positives":[244],"AIoT.":[246]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-15T00:00:00"}
