{"id":"https://openalex.org/W2920405617","doi":"https://doi.org/10.1145/3297156.3297226","title":"Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs","display_name":"Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs","publication_year":2018,"publication_date":"2018-12-08","ids":{"openalex":"https://openalex.org/W2920405617","doi":"https://doi.org/10.1145/3297156.3297226","mag":"2920405617"},"language":"en","primary_location":{"id":"doi:10.1145/3297156.3297226","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297226","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065328628","display_name":"Shiqiang Zhang","orcid":"https://orcid.org/0000-0002-5063-3362"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shiqiang Zhang","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083384474","display_name":"Zhenhu Ning","orcid":"https://orcid.org/0000-0001-6793-2118"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenhu Ning","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004299336","display_name":"Yang Cao","orcid":"https://orcid.org/0000-0002-2891-4379"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Cao","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065328628"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.5457,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.7108288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"468","last_page":"473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.760931134223938},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.747542142868042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7427977323532104},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7138710618019104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5664260983467102},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.4768610894680023},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.42615389823913574},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4141538143157959},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3494870066642761},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3317526578903198},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13753879070281982},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11947715282440186},{"id":"https://openalex.org/keywords/gene","display_name":"Gene","score":0.06554585695266724}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.760931134223938},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.747542142868042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7427977323532104},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7138710618019104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5664260983467102},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.4768610894680023},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.42615389823913574},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4141538143157959},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3494870066642761},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3317526578903198},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13753879070281982},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11947715282440186},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.06554585695266724},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3297156.3297226","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297226","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1940397557","https://openalex.org/W1979088465","https://openalex.org/W2043286325","https://openalex.org/W2071961821","https://openalex.org/W2136236364","https://openalex.org/W2151993488","https://openalex.org/W2296616510","https://openalex.org/W2375702490","https://openalex.org/W4250955649"],"related_works":["https://openalex.org/W2377327490","https://openalex.org/W2560253012","https://openalex.org/W1524590520","https://openalex.org/W2412288087","https://openalex.org/W2371792548","https://openalex.org/W1697705604","https://openalex.org/W2419862115","https://openalex.org/W2017092658","https://openalex.org/W2770713575","https://openalex.org/W2372288163"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1],"networks":[2],"deployed":[3],"in":[4,24,46,78],"open":[5],"environments":[6],"are":[7,99],"vulnerable":[8],"to":[9,54,70,101],"clone":[10,14,17],"attacks.":[11],"For":[12],"this":[13],"attack,":[15],"a":[16,25],"detection":[18,36,94],"method":[19],"based":[20],"on":[21],"compressed":[22],"sensing":[23],"cluster":[26,40,48,56],"network":[27],"is":[28],"proposed.":[29],"It":[30],"combines":[31],"the":[32,44,47,51,55,63,67,72,76,79,82,85,93,108,113],"local":[33],"and":[34,49,96,104,110],"global":[35],"of":[37,66,75,84,112],"nodes.":[38,58],"The":[39,59,88],"head":[41,57],"node":[42,61],"detects":[43],"nodes":[45,53,69,77],"sets":[50],"monitoring":[52],"convergence":[60],"uses":[62],"sparse":[64],"characteristics":[65],"cloned":[68,86],"collect":[71],"identity":[73,83],"information":[74],"network.":[80,114],"Determine":[81],"node.":[87],"experimental":[89],"results":[90],"show":[91],"that":[92],"rate":[95],"communication":[97],"cost":[98],"superior":[100],"other":[102],"methods,":[103],"can":[105],"further":[106],"enhance":[107],"security":[109],"life":[111]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
