{"id":"https://openalex.org/W3084499081","doi":"https://doi.org/10.1145/3410530.3414422","title":"Anomaly detection for mobile devices in industrial internet","display_name":"Anomaly detection for mobile devices in industrial internet","publication_year":2020,"publication_date":"2020-09-10","ids":{"openalex":"https://openalex.org/W3084499081","doi":"https://doi.org/10.1145/3410530.3414422","mag":"3084499081"},"language":"en","primary_location":{"id":"doi:10.1145/3410530.3414422","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3410530.3414422","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049044863","display_name":"Ge Ma","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ge Ma","raw_affiliation_strings":["China Academy of Industrial Internet, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054536028","display_name":"Weixi Gu","orcid":"https://orcid.org/0009-0005-5986-5716"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weixi Gu","raw_affiliation_strings":["China Academy of Industrial Internet, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036280519","display_name":"Qiyang Huang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiyang Huang","raw_affiliation_strings":["China Academy of Industrial Internet, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000468040","display_name":"Guowei Zhu","orcid":"https://orcid.org/0000-0002-9009-1537"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guowei Zhu","raw_affiliation_strings":["China Academy of Industrial Internet, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014347094","display_name":"Kan Lv","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kan Lv","raw_affiliation_strings":["China Academy of Industrial Internet, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100680672","display_name":"Yujia Li","orcid":"https://orcid.org/0000-0002-1024-9243"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yujia Li","raw_affiliation_strings":["China Academy of Industrial Internet, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Academy of Industrial Internet, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5049044863"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.10149566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"75","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intellectualization","display_name":"Intellectualization","score":0.9635852575302124},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7271606922149658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6124830842018127},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.5884332656860352},{"id":"https://openalex.org/keywords/mobile-internet","display_name":"Mobile internet","score":0.5663951635360718},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5620812177658081},{"id":"https://openalex.org/keywords/factory","display_name":"Factory (object-oriented programming)","score":0.5227149128913879},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4837898910045624},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.46459531784057617},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4300975799560547},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.4185260832309723},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.41617551445961},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3333277106285095},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2001814842224121},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.18897557258605957},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16477128863334656},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16045904159545898},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10043531656265259},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.07829096913337708}],"concepts":[{"id":"https://openalex.org/C130631938","wikidata":"https://www.wikidata.org/wiki/Q144894","display_name":"Intellectualization","level":2,"score":0.9635852575302124},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7271606922149658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6124830842018127},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.5884332656860352},{"id":"https://openalex.org/C2985706004","wikidata":"https://www.wikidata.org/wiki/Q1043805","display_name":"Mobile internet","level":3,"score":0.5663951635360718},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5620812177658081},{"id":"https://openalex.org/C40149104","wikidata":"https://www.wikidata.org/wiki/Q5620977","display_name":"Factory (object-oriented programming)","level":2,"score":0.5227149128913879},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4837898910045624},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.46459531784057617},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4300975799560547},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.4185260832309723},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.41617551445961},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3333277106285095},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2001814842224121},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.18897557258605957},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16477128863334656},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16045904159545898},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10043531656265259},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.07829096913337708},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3410530.3414422","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3410530.3414422","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2164693138","https://openalex.org/W2571254578","https://openalex.org/W2605181596","https://openalex.org/W2613040410","https://openalex.org/W2971776643"],"related_works":["https://openalex.org/W4308937019","https://openalex.org/W2971541747","https://openalex.org/W2967819419","https://openalex.org/W4283792068","https://openalex.org/W2788972609","https://openalex.org/W1966533376","https://openalex.org/W3161627164","https://openalex.org/W2244219004","https://openalex.org/W3084499081","https://openalex.org/W3132437963"],"abstract_inverted_index":{"The":[0],"concept":[1],"of":[2,19,28,49],"\"Industrial":[3],"Internet\"":[4],"was":[5],"first":[6],"proposed":[7],"by":[8],"General":[9],"Electric":[10],"in":[11,58],"2012.":[12],"It":[13],"aims":[14],"to":[15,67],"promote":[16],"the":[17,20,26,29,47,82],"intellectualization":[18],"whole":[21],"service":[22],"system.":[23],"However,":[24],"with":[25],"development":[27],"Industrial":[30],"Internet,":[31],"some":[32],"criminals":[33],"launch":[34],"attacks":[35],"on":[36],"industrial":[37,50],"control":[38,51],"terminals":[39,52],"(such":[40],"as":[41],"computers":[42],"and":[43,79],"mobile":[44,72],"devices),":[45],"causing":[46],"failure":[48],"or":[53],"wrong":[54],"instructions,":[55],"which":[56],"resulting":[57],"factory":[59],"losses.":[60],"Therefore,":[61],"there":[62],"is":[63],"an":[64],"immediate":[65],"need":[66],"extract":[68],"valuable":[69],"information":[70],"from":[71],"network":[73],"streaming,":[74],"accurately":[75],"detect":[76],"abnormal":[77],"behaviors":[78],"timely":[80],"raise":[81],"alarm.":[83]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
