{"id":"https://openalex.org/W2023987263","doi":"https://doi.org/10.1145/2757743.2757751","title":"The Enhancement of GSD Algorithm with Data Preprocessing Technique for WSN","display_name":"The Enhancement of GSD Algorithm with Data Preprocessing Technique for WSN","publication_year":2015,"publication_date":"2015-06-12","ids":{"openalex":"https://openalex.org/W2023987263","doi":"https://doi.org/10.1145/2757743.2757751","mag":"2023987263"},"language":"en","primary_location":{"id":"doi:10.1145/2757743.2757751","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2757743.2757751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002221907","display_name":"Dongyang Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145761","display_name":"Shenzhen Institutes of Advanced Technology","ror":"https://ror.org/04gh4er46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongyang Luo","raw_affiliation_strings":["Shenzhen Institutes of Advanced Technology, CAS, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, CAS, Shenzhen, China","institution_ids":["https://openalex.org/I4210145761"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084795658","display_name":"Yanwen Wang","orcid":"https://orcid.org/0000-0002-8754-4355"},"institutions":[{"id":"https://openalex.org/I4210106808","display_name":"Guangzhou Institute of Advanced Technology","ror":"https://ror.org/01vcw4681","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210106808"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanwen Wang","raw_affiliation_strings":["Guangzhou Institute of Advanced Technology, CAS, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou Institute of Advanced Technology, CAS, Guangzhou, China","institution_ids":["https://openalex.org/I4210106808"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100655843","display_name":"Xiaoling Wu","orcid":"https://orcid.org/0000-0002-3228-0647"},"institutions":[{"id":"https://openalex.org/I4210145761","display_name":"Shenzhen Institutes of Advanced Technology","ror":"https://ror.org/04gh4er46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoling Wu","raw_affiliation_strings":["Shenzhen Institutes of Advanced Technology, CAS, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, CAS, Shenzhen, China","institution_ids":["https://openalex.org/I4210145761"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007723627","display_name":"Lei Shu","orcid":"https://orcid.org/0000-0002-6700-9347"},"institutions":[{"id":"https://openalex.org/I4210128140","display_name":"Guangdong University of Petrochemical Technology","ror":"https://ror.org/030ffke25","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210128140"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Shu","raw_affiliation_strings":["Guangdong University of Petrochemical Technology, Maoming, China"],"affiliations":[{"raw_affiliation_string":"Guangdong University of Petrochemical Technology, Maoming, China","institution_ids":["https://openalex.org/I4210128140"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047580399","display_name":"Hainan Chen","orcid":"https://orcid.org/0000-0002-6864-6268"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hainan Chen","raw_affiliation_strings":["Guangdong University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I139024713"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5002221907"],"corresponding_institution_ids":["https://openalex.org/I4210145761"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07616144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"31","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7857449650764465},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7359353303909302},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6748054027557373},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.6199394464492798},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6013525724411011},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5870870351791382},{"id":"https://openalex.org/keywords/sliding-window-protocol","display_name":"Sliding window protocol","score":0.5729766488075256},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5702560544013977},{"id":"https://openalex.org/keywords/statistic","display_name":"Statistic","score":0.5478987693786621},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49895143508911133},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.4912793040275574},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4394097626209259},{"id":"https://openalex.org/keywords/window","display_name":"Window (computing)","score":0.39773303270339966},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3888709545135498},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.36186057329177856},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26546892523765564},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1603480875492096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11808419227600098},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09945598244667053},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09439906477928162}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7857449650764465},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7359353303909302},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6748054027557373},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6199394464492798},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6013525724411011},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5870870351791382},{"id":"https://openalex.org/C102392041","wikidata":"https://www.wikidata.org/wiki/Q592860","display_name":"Sliding window protocol","level":3,"score":0.5729766488075256},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5702560544013977},{"id":"https://openalex.org/C89128539","wikidata":"https://www.wikidata.org/wiki/Q1949963","display_name":"Statistic","level":2,"score":0.5478987693786621},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49895143508911133},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.4912793040275574},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4394097626209259},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.39773303270339966},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3888709545135498},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.36186057329177856},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26546892523765564},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1603480875492096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11808419227600098},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09945598244667053},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09439906477928162},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2757743.2757751","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2757743.2757751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2012249349","https://openalex.org/W2040441293","https://openalex.org/W2040621929","https://openalex.org/W2043417537","https://openalex.org/W2050468990","https://openalex.org/W2056771385","https://openalex.org/W2122729527","https://openalex.org/W2123117681","https://openalex.org/W2133994260","https://openalex.org/W2140372921","https://openalex.org/W2148306323","https://openalex.org/W2158264625","https://openalex.org/W2542500079","https://openalex.org/W3150011815"],"related_works":["https://openalex.org/W2989490741","https://openalex.org/W3092506759","https://openalex.org/W2367545121","https://openalex.org/W4248881655","https://openalex.org/W2482165163","https://openalex.org/W3010890513","https://openalex.org/W120741642","https://openalex.org/W138569904","https://openalex.org/W2390914021","https://openalex.org/W3088957430"],"abstract_inverted_index":{"As":[0],"the":[1,14,29,35,84,90],"application":[2],"scope":[3],"of":[4,17,67],"wireless":[5],"sensor":[6],"network":[7],"(WSN)":[8],"grows":[9],"at":[10],"an":[11,51],"amazing":[12],"rate,":[13],"security":[15,30],"issue":[16],"WSN":[18,68],"is":[19],"becoming":[20],"increasingly":[21],"important.":[22],"Considering":[23],"a":[24],"distinct":[25],"way":[26],"to":[27],"address":[28],"problem":[31],"rather":[32],"than":[33],"using":[34],"two":[36],"most":[37],"common":[38],"methods":[39,74],"which":[40],"are":[41],"data":[42,53,66,88],"encryption":[43],"and":[44,64,72,86],"authentication,":[45],"in":[46,100],"this":[47],"paper,":[48],"we":[49],"enhance":[50],"off-the-shelf":[52],"clustering":[54],"based":[55],"method":[56],"called":[57],"GSD":[58,96],"by":[59,82],"focusing":[60],"on":[61],"preprocessing":[62,83],"RSSI":[63,85],"LQI":[65,87],"with":[69,89],"sliding":[70],"window":[71],"statistic":[73],"for":[75,103],"intrusion":[76,101],"detection.":[77],"Our":[78],"results":[79],"show":[80],"that":[81],"proposed":[91],"Moving":[92],"Average":[93],"Variance":[94],"method,":[95],"algorithm":[97],"performs":[98],"better":[99],"detection":[102],"WSNs.":[104]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
