{"id":"https://openalex.org/W4414758151","doi":"https://doi.org/10.1109/tnsm.2025.3616966","title":"SLIoTDI: Scalable and Lightweight IoT Device Identification With Session-Level Grayscale Fingerprinting and Adversarial Training","display_name":"SLIoTDI: Scalable and Lightweight IoT Device Identification With Session-Level Grayscale Fingerprinting and Adversarial Training","publication_year":2025,"publication_date":"2025-10-02","ids":{"openalex":"https://openalex.org/W4414758151","doi":"https://doi.org/10.1109/tnsm.2025.3616966"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3616966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3616966","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017509557","display_name":"Qian Lu","orcid":"https://orcid.org/0000-0003-4816-7697"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qian Lu","raw_affiliation_strings":["Department of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113741246","display_name":"Zaiting Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zaiting Xu","raw_affiliation_strings":["Department of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101598769","display_name":"Hanlin Zhang","orcid":"https://orcid.org/0000-0001-8869-6863"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanlin Zhang","raw_affiliation_strings":["Department of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074238461","display_name":"Hequn Xian","orcid":"https://orcid.org/0000-0002-7538-338X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hequn Xian","raw_affiliation_strings":["Department of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017509557"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2619819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"6","first_page":"6177","last_page":"6189"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7612000107765198},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6675000190734863},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6001999974250793},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.49059998989105225},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.48809999227523804},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4309000074863434},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4291999936103821},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.42419999837875366},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.40389999747276306}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8697999715805054},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7612000107765198},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6675000190734863},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6001999974250793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5378999710083008},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.48809999227523804},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4309000074863434},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4291999936103821},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.42419999837875366},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.40389999747276306},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3763999938964844},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.34040001034736633},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33009999990463257},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3059999942779541},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.3001999855041504},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28459998965263367},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.2825999855995178},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2603999972343445},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.2535000145435333},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.25099998712539673},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3616966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3616966","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3751837828","display_name":null,"funder_award_id":"ZR202102190210","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G641606531","display_name":null,"funder_award_id":"62102212","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2574448563","https://openalex.org/W2768718335","https://openalex.org/W2888505697","https://openalex.org/W2889693115","https://openalex.org/W2895909303","https://openalex.org/W2930144424","https://openalex.org/W2963373072","https://openalex.org/W2963446712","https://openalex.org/W2963469388","https://openalex.org/W2964248614","https://openalex.org/W2980558733","https://openalex.org/W3005444580","https://openalex.org/W3036818015","https://openalex.org/W3138917762","https://openalex.org/W3181667991","https://openalex.org/W3189227796","https://openalex.org/W3194740358","https://openalex.org/W3198732682","https://openalex.org/W3216593926","https://openalex.org/W4206702214","https://openalex.org/W4285226206","https://openalex.org/W4293093536","https://openalex.org/W4293233810","https://openalex.org/W4309616586","https://openalex.org/W4377141523","https://openalex.org/W4378904838","https://openalex.org/W4379986344","https://openalex.org/W4383200176","https://openalex.org/W4388320214","https://openalex.org/W4389371084","https://openalex.org/W4392523448","https://openalex.org/W4394699133","https://openalex.org/W4399849921"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"expansion":[2],"of":[3,6,133],"the":[4,29,103,131,136],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9],"revolutionized":[10],"various":[11],"domains":[12],"but":[13],"also":[14],"introduced":[15],"critical":[16],"security":[17,162],"challenges,":[18,67],"such":[19],"as":[20],"device":[21,34,77,164],"spoofing":[22],"and":[23,40,53,74,86,97,126,142,151,163],"unauthorized":[24],"access.":[25],"These":[26],"vulnerabilities":[27],"underscore":[28],"urgent":[30],"need":[31],"for":[32,108],"effective":[33],"identification":[35,78,137],"to":[36,93,115,140,148,159],"safeguard":[37],"IoT":[38,62,76,117,161],"networks":[39],"services.":[41],"Despite":[42],"ongoing":[43],"research":[44],"efforts,":[45],"existing":[46],"methods":[47],"often":[48],"fall":[49],"short":[50],"in":[51,60,166],"scalability":[52],"lightweight":[54,75],"design,":[55],"which":[56],"limits":[57],"their":[58],"deployment":[59,129],"real-world":[61,128,167],"environments.":[63],"To":[64],"address":[65],"these":[66],"we":[68],"propose":[69],"SLIoTDI,":[70,134],"a":[71,95,127,156],"novel":[72],"scalable":[73,98],"approach.":[79],"SLIoTDI":[80,145],"uses":[81],"session-level":[82],"grayscale":[83],"image-based":[84],"fingerprinting":[85],"incorporates":[87],"adversarial":[88],"training":[89],"with":[90],"data":[91],"augmentation":[92],"develop":[94],"robust":[96],"feature":[99],"extractor.":[100],"Once":[101],"trained,":[102],"extractor":[104],"can":[105],"generate":[106],"fingerprints":[107],"unseen":[109],"devices":[110],"without":[111],"retraining,":[112],"ensuring":[113],"adaptability":[114],"evolving":[116],"settings.":[118],"Comprehensive":[119],"experiments":[120],"conducted":[121],"on":[122],"four":[123],"public":[124],"datasets":[125],"validate":[130],"effectiveness":[132],"achieving":[135],"accuracies":[138],"up":[139],"99.98%":[141],"99.16%,":[143],"respectively.":[144],"is":[146],"open-sourced":[147],"promote":[149],"transparency":[150],"enable":[152],"further":[153],"research,":[154],"offering":[155],"practical":[157],"solution":[158],"enhance":[160],"management":[165],"applications.":[168]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
