{"id":"https://openalex.org/W4386514128","doi":"https://doi.org/10.1145/3587716.3587792","title":"Anomaly Detection of IoT traffic Based on LSTM and Attention Mechanism","display_name":"Anomaly Detection of IoT traffic Based on LSTM and Attention Mechanism","publication_year":2023,"publication_date":"2023-02-17","ids":{"openalex":"https://openalex.org/W4386514128","doi":"https://doi.org/10.1145/3587716.3587792"},"language":"en","primary_location":{"id":"doi:10.1145/3587716.3587792","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3587716.3587792","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 15th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101867099","display_name":"Qi Li","orcid":"https://orcid.org/0009-0004-0234-6723"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Li","raw_affiliation_strings":["Guangdong University of Technology, China"],"raw_orcid":"https://orcid.org/0009-0004-0234-6723","affiliations":[{"raw_affiliation_string":"Guangdong University of Technology, China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009219404","display_name":"Xiaoling Wu","orcid":"https://orcid.org/0009-0004-9067-2093"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoling Wu","raw_affiliation_strings":["Guangdong University of Technology, China"],"raw_orcid":"https://orcid.org/0009-0004-9067-2093","affiliations":[{"raw_affiliation_string":"Guangdong University of Technology, China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111036483","display_name":"Zhixiong Cao","orcid":"https://orcid.org/0000-0002-3007-1569"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhixiong Cao","raw_affiliation_strings":["Guangdong University of Technology, China"],"raw_orcid":"https://orcid.org/0000-0002-3007-1569","affiliations":[{"raw_affiliation_string":"Guangdong University of Technology, China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071647529","display_name":"Jie Ling","orcid":"https://orcid.org/0000-0001-7736-1566"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Ling","raw_affiliation_strings":["Guangdong University of Technology, China"],"raw_orcid":"https://orcid.org/0000-0001-7736-1566","affiliations":[{"raw_affiliation_string":"Guangdong University of Technology, China","institution_ids":["https://openalex.org/I139024713"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101867099"],"corresponding_institution_ids":["https://openalex.org/I139024713"],"apc_list":null,"apc_paid":null,"fwci":0.787,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73708399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"457","last_page":"463"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8557001352310181},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6315019726753235},{"id":"https://openalex.org/keywords/offset","display_name":"Offset (computer science)","score":0.5183685421943665},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5018143653869629},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48171931505203247},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46917039155960083},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.45506545901298523},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4524000883102417},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4491989016532898},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4278588891029358},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4152100384235382},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34973204135894775},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12117460370063782}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8557001352310181},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6315019726753235},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.5183685421943665},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5018143653869629},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48171931505203247},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46917039155960083},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.45506545901298523},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4524000883102417},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4491989016532898},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4278588891029358},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4152100384235382},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34973204135894775},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12117460370063782},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3587716.3587792","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3587716.3587792","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 15th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2963420686","https://openalex.org/W2969646944","https://openalex.org/W2998528699","https://openalex.org/W2998722477","https://openalex.org/W3018495625","https://openalex.org/W3047624172","https://openalex.org/W3086737406","https://openalex.org/W3089536181","https://openalex.org/W3111341023","https://openalex.org/W3115696055","https://openalex.org/W3130508033","https://openalex.org/W3167091510","https://openalex.org/W3177145331","https://openalex.org/W3193401134","https://openalex.org/W3200030991","https://openalex.org/W3203151276","https://openalex.org/W3213149587","https://openalex.org/W3217532417","https://openalex.org/W4200034442","https://openalex.org/W4211032618","https://openalex.org/W4224240205","https://openalex.org/W4225655117","https://openalex.org/W4225994670"],"related_works":["https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W2910064364","https://openalex.org/W4255224757","https://openalex.org/W2499527417","https://openalex.org/W2218513093","https://openalex.org/W4311097251"],"abstract_inverted_index":{"IoT":[0,9,39,109],"traffic":[1,40],"anomaly":[2,41],"detection":[3,42],"is":[4,175],"a":[5,35],"vital":[6],"part":[7],"of":[8,16,85,94,97,115,122,141,172,186],"security.":[10],"However,":[11],"it":[12,64],"has":[13],"the":[14,30,56,66,71,77,82,86,91,98,105,112,116,120,123,128,132,137,142,145,150,158,161,165,187],"characteristics":[15],"long-time":[17],"dimension":[18,79,147],"and":[19,53,58,62,80,100,148,182],"huge":[20],"uneven":[21],"feature":[22,138],"information":[23,151],"which":[24,135,174],"brings":[25],"big":[26],"challenges.":[27],"To":[28],"address":[29],"above":[31],"issues,":[32],"we":[33,51,60,126],"propose":[34],"new":[36],"scheme":[37],"for":[38,108],"based":[43],"on":[44,157],"CNN-LSTM":[45,133],"model.":[46],"For":[47],"data":[48],"set":[49],"pre-processing,":[50],"filter":[52],"zero":[54],"pad":[55],"dataset,":[57,160],"then":[59],"offset":[61],"stitch":[63],"in":[65,76,144,189],"time":[67,146],"dimension.":[68],"It":[69],"enables":[70],"CNN":[72],"to":[73,103,131],"extract":[74],"features":[75],"temporal":[78],"reduces":[81],"computational":[83],"complexity":[84],"LSTM.":[87],"We":[88],"also":[89],"catch":[90],"prediction":[92,113],"result":[93],"each":[95],"moment":[96],"LSTM":[99],"output":[101],"them":[102],"meet":[104],"timeliness":[106],"required":[107],"anti-intrusion.":[110],"Moreover,":[111],"results":[114,162],"whole":[117],"model":[118,143,167,188],"guarantee":[119],"reliability":[121],"scheme.":[124],"Finally,":[125],"introduce":[127],"attention":[129],"mechanism":[130],"model,":[134],"improves":[136],"extraction":[139],"ability":[140],"solves":[149],"overload":[152],"problem.":[153],"Validated":[154],"by":[155],"experiments":[156],"IoT-23":[159],"show":[163],"that":[164],"proposed":[166],"achieves":[168],"an":[169],"average":[170],"accuracy":[171],"91.6%":[173],"about":[176],"6%":[177],"increase":[178],"over":[179],"related":[180],"algorithms,":[181],"demonstrates":[183],"its":[184],"effectiveness":[185],"smart":[190],"home":[191],"application":[192],"scenarios.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
