{"id":"https://openalex.org/W4385696098","doi":"https://doi.org/10.1109/tsusc.2023.3303422","title":"An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework","display_name":"An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4385696098","doi":"https://doi.org/10.1109/tsusc.2023.3303422"},"language":"en","primary_location":{"id":"doi:10.1109/tsusc.2023.3303422","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2023.3303422","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000349603","display_name":"Yanika Kongsorot","orcid":"https://orcid.org/0000-0002-2603-0879"},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Yanika Kongsorot","raw_affiliation_strings":["Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand"],"raw_orcid":"https://orcid.org/0000-0002-2603-0879","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand","institution_ids":["https://openalex.org/I179193067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072472657","display_name":"Pakarat Musikawan","orcid":"https://orcid.org/0000-0001-5315-751X"},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Pakarat Musikawan","raw_affiliation_strings":["Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand"],"raw_orcid":"https://orcid.org/0000-0001-5315-751X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand","institution_ids":["https://openalex.org/I179193067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039240662","display_name":"Phet Aimtongkham","orcid":"https://orcid.org/0000-0001-5289-1149"},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Phet Aimtongkham","raw_affiliation_strings":["Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand"],"raw_orcid":"https://orcid.org/0000-0001-5289-1149","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand","institution_ids":["https://openalex.org/I179193067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017792460","display_name":"Ilsun You","orcid":"https://orcid.org/0000-0002-0604-3445"},"institutions":[{"id":"https://openalex.org/I110273157","display_name":"Kookmin University","ror":"https://ror.org/0049erg63","country_code":"KR","type":"education","lineage":["https://openalex.org/I110273157"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ilsun You","raw_affiliation_strings":["Department of Information Security Engineering, Cryptology and Mathematics, Kookmin University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-0604-3445","affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Cryptology and Mathematics, Kookmin University, Seoul, South Korea","institution_ids":["https://openalex.org/I110273157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060341203","display_name":"Abderrahim Benslimane","orcid":"https://orcid.org/0000-0001-9307-6132"},"institutions":[{"id":"https://openalex.org/I198415970","display_name":"Universit\u00e9 d'Avignon et des Pays de Vaucluse","ror":"https://ror.org/00mfpxb84","country_code":"FR","type":"education","lineage":["https://openalex.org/I198415970"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abderrahim Benslimane","raw_affiliation_strings":["Faculty of Sciences and Technology, Avignon University, Avignon, France"],"raw_orcid":"https://orcid.org/0000-0001-9307-6132","affiliations":[{"raw_affiliation_string":"Faculty of Sciences and Technology, Avignon University, Avignon, France","institution_ids":["https://openalex.org/I198415970"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055624785","display_name":"Chakchai So\u2013In","orcid":"https://orcid.org/0000-0003-1026-191X"},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Chakchai So-In","raw_affiliation_strings":["Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand"],"raw_orcid":"https://orcid.org/0000-0003-1026-191X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, Thailand","institution_ids":["https://openalex.org/I179193067"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5000349603"],"corresponding_institution_ids":["https://openalex.org/I179193067"],"apc_list":null,"apc_paid":null,"fwci":3.148,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92183625,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"8","issue":"4","first_page":"596","last_page":"613"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8049106597900391},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6488560438156128},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6176551580429077},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5965697169303894},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5823342800140381},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5132701396942139},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49484819173812866},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.4917042851448059},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48925304412841797},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4775617718696594},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4537246525287628},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09806951880455017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8049106597900391},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6488560438156128},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6176551580429077},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5965697169303894},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5823342800140381},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5132701396942139},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49484819173812866},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.4917042851448059},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48925304412841797},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4775617718696594},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4537246525287628},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09806951880455017},{"id":"https://openalex.org/C21880701","wikidata":"https://www.wikidata.org/wiki/Q2144042","display_name":"Process engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsusc.2023.3303422","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2023.3303422","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322335","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50"},{"id":"https://openalex.org/F4320322817","display_name":"National Research Council of Thailand","ror":"https://ror.org/018wfhg78"},{"id":"https://openalex.org/F4320332869","display_name":"College of Computing","ror":"https://ror.org/01zkghx44"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W195047088","https://openalex.org/W1534477342","https://openalex.org/W2056132907","https://openalex.org/W2076063813","https://openalex.org/W2100537916","https://openalex.org/W2150757437","https://openalex.org/W2215444025","https://openalex.org/W2294798173","https://openalex.org/W2768947629","https://openalex.org/W2776074343","https://openalex.org/W2800326138","https://openalex.org/W2807319534","https://openalex.org/W2810443361","https://openalex.org/W2883753518","https://openalex.org/W2884561390","https://openalex.org/W2899090608","https://openalex.org/W2911090220","https://openalex.org/W2921708219","https://openalex.org/W2922526186","https://openalex.org/W2963197901","https://openalex.org/W2963748489","https://openalex.org/W2964200838","https://openalex.org/W2971617190","https://openalex.org/W2974181782","https://openalex.org/W2986055611","https://openalex.org/W3022218140","https://openalex.org/W3028069824","https://openalex.org/W3034143844","https://openalex.org/W3037964625","https://openalex.org/W3048836559","https://openalex.org/W3085955590","https://openalex.org/W3092008631","https://openalex.org/W3093117838","https://openalex.org/W3094686023","https://openalex.org/W3095531713","https://openalex.org/W3110474728","https://openalex.org/W3118198986","https://openalex.org/W3130490915","https://openalex.org/W3131541364","https://openalex.org/W3131860561","https://openalex.org/W3136021864","https://openalex.org/W3160220648","https://openalex.org/W3160412534","https://openalex.org/W3162883843","https://openalex.org/W3162956350","https://openalex.org/W3171509770","https://openalex.org/W3173873035","https://openalex.org/W3191127680","https://openalex.org/W3195023532","https://openalex.org/W3196037479","https://openalex.org/W3201381148","https://openalex.org/W3210361010","https://openalex.org/W3211097470","https://openalex.org/W3214146295","https://openalex.org/W4200363845","https://openalex.org/W4206530705","https://openalex.org/W4206672858","https://openalex.org/W4206931805","https://openalex.org/W4225662012","https://openalex.org/W4249992252","https://openalex.org/W4280638404","https://openalex.org/W4284896151","https://openalex.org/W4285127639","https://openalex.org/W4285818296","https://openalex.org/W4285818738","https://openalex.org/W4292023222","https://openalex.org/W4308222912","https://openalex.org/W4308661080","https://openalex.org/W4319966124"],"related_works":["https://openalex.org/W1979583797","https://openalex.org/W3082848404","https://openalex.org/W2016864125","https://openalex.org/W2372254676","https://openalex.org/W2953302367","https://openalex.org/W2945706271","https://openalex.org/W4387435415","https://openalex.org/W2114169842","https://openalex.org/W2535808783","https://openalex.org/W3183408266"],"abstract_inverted_index":{"Owing":[0],"to":[1,19,24,72,108,152],"the":[2,9,30,86,89,114,128,134,154,184],"exponential":[3],"proliferation":[4],"of":[5,11,33,35,41,116,133,178],"internet":[6],"services":[7],"and":[8,29,44,56,84,131,137,182,194],"sophistication":[10],"intrusions,":[12],"traditional":[13],"intrusion":[14],"detection":[15],"algorithms":[16],"are":[17],"unable":[18],"handle":[20],"complex":[21,82],"invasions":[22],"due":[23],"their":[25],"limited":[26],"representation":[27,57,100],"capabilities":[28],"unbalanced":[31],"nature":[32],"Internet":[34],"Things":[36],"(IoT)-related":[37],"data":[38],"in":[39,53,59,176],"terms":[40,177],"both":[42,192],"telemetry":[43,193],"network":[45,195],"traffic.":[46],"Drawing":[47],"inspiration":[48],"from":[49],"deep":[50,68,104],"learning":[51,69],"achievements":[52],"feature":[54,99,123],"extraction":[55],"learning,":[58,105],"this":[60],"study,":[61],"we":[62],"propose":[63],"an":[64,143],"accurate":[65],"hybrid":[66],"ensemble":[67,135],"framework":[70],"(HEDLF)":[71],"protect":[73],"against":[74,173],"obfuscated":[75],"cyber-attacks":[76],"on":[77,103,191],"IoT":[78],"networks.":[79],"To":[80],"address":[81],"features":[83],"alleviate":[85],"imbalance":[87,163],"problem,":[88],"proposed":[90,185],"HEDLF":[91,186],"includes":[92],"three":[93],"key":[94],"components:":[95],"1)":[96],"a":[97,120,139,148],"hierarchical":[98],"technique":[101],"based":[102],"which":[106,146],"aims":[107],"extract":[109],"specific":[110],"information":[111],"by":[112],"supervising":[113],"loss":[115],"gradient":[117],"information;":[118],"2)":[119],"balanced":[121],"rotated":[122],"extractor":[124],"that":[125,170],"simultaneously":[126],"encourages":[127],"individual":[129],"accuracy":[130],"diversity":[132],"classifier;":[136],"3)":[138],"meta-classifier":[140],"acting":[141],"as":[142],"aggregation":[144],"method,":[145],"leverages":[147],"semisparse":[149],"group":[150],"regularizer":[151],"analyze":[153],"base":[155],"classifiers\u2019":[156],"outputs.":[157],"Additionally,":[158],"these":[159],"improvements":[160],"take":[161],"class":[162],"into":[164],"account.":[165],"The":[166],"experimental":[167],"results":[168,190],"show":[169],"when":[171],"compared":[172],"state-of-the-art":[174],"techniques":[175],"accuracy,":[179],"precision,":[180],"recall,":[181],"F1-score,":[183],"can":[187],"achieve":[188],"promising":[189],"traffic":[196],"data.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
