{"id":"https://openalex.org/W4288528695","doi":"https://doi.org/10.23919/jcin.2019.8916642","title":"Anomalous Power-Usage Behavior Detection from Smart Home Wireless Communications","display_name":"Anomalous Power-Usage Behavior Detection from Smart Home Wireless Communications","publication_year":2019,"publication_date":"2019-03-01","ids":{"openalex":"https://openalex.org/W4288528695","doi":"https://doi.org/10.23919/jcin.2019.8916642"},"language":"en","primary_location":{"id":"doi:10.23919/jcin.2019.8916642","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2019.8916642","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089061086","display_name":"Jian Mao","orcid":"https://orcid.org/0000-0002-0404-6466"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Mao","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing 100191, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing 100191, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054686073","display_name":"Shishi Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shishi Zhu","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028914486","display_name":"Jingdong Bian","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingdong Bian","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040134639","display_name":"Qixiao Lin","orcid":"https://orcid.org/0000-0002-1359-9636"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qixiao Lin","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing 100191, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing 100191, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100425107","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0003-2965-3518"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing 100191, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing 100191, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089061086"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.7074,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75382653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":"1","first_page":"13","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9531999826431274,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9509000182151794,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7553898692131042},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.6671252250671387},{"id":"https://openalex.org/keywords/behavioral-pattern","display_name":"Behavioral pattern","score":0.6322586536407471},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6133216023445129},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.557016909122467},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5513316988945007},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5353518128395081},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4813823997974396},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4457368552684784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31813377141952515},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3118622303009033},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2185525894165039}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7553898692131042},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.6671252250671387},{"id":"https://openalex.org/C83804111","wikidata":"https://www.wikidata.org/wiki/Q1063558","display_name":"Behavioral pattern","level":2,"score":0.6322586536407471},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6133216023445129},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.557016909122467},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5513316988945007},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5353518128395081},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4813823997974396},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4457368552684784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31813377141952515},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3118622303009033},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2185525894165039},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/jcin.2019.8916642","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2019.8916642","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3204184292","https://openalex.org/W3176564347","https://openalex.org/W1985458517","https://openalex.org/W2355833770","https://openalex.org/W3031039437","https://openalex.org/W3095877357","https://openalex.org/W183202219","https://openalex.org/W10861731","https://openalex.org/W3161928361","https://openalex.org/W3111735654"],"abstract_inverted_index":{"With":[0],"the":[1,58,66,71,76,85,92,98,107,110,114,118,126,131,137,143,149,160,167,184],"rapid":[2],"development":[3],"of":[4,6,87,117,186],"Internet":[5],"things":[7],"(IoT)":[8],"technologies,":[9],"smart":[10,30,59,72,138],"home":[11,31,60],"systems":[12,32],"are":[13],"getting":[14],"more":[15,17],"and":[16,27,64,89,113,124,147,174],"popular":[18],"in":[19,57],"our":[20,172],"daily":[21],"life.":[22],"Besides":[23],"providing":[24],"convenient":[25],"functionality":[26],"tangible":[28],"benefits,":[29],"expose":[33],"users":[34],"to":[35,83,97],"security":[36],"risks.":[37],"In":[38],"this":[39],"paper,":[40],"we":[41,79],"proposed":[42],"SHGuard,":[43],"an":[44],"anomaly":[45],"detection":[46],"approach":[47],"based":[48],"on":[49,75],"power":[50,119],"usage":[51,145],"data":[52,68,146],"exposed":[53],"from":[54,70,166],"wireless":[55],"communications":[56],"system.":[61],"SHGuard":[62,122,176],"monitors":[63],"collects":[65],"electricity-usage":[67],"sent":[69],"sockets.":[73],"Based":[74],"collected":[77],"data,":[78],"developed":[80],"a":[81],"method":[82,173],"identify/infer":[84],"type":[86],"device":[88,99],"formally":[90],"defined":[91],"user":[93,150,162],"behavior":[94,128,151,163],"pattern":[95,105,129,164],"according":[96],"event":[100],"features,":[101],"e.g.,":[102],"frequent":[103],"sequence":[104,111],"set,":[106],"support":[108],"degree,":[109],"length":[112],"occurrence":[115],"time":[116],"changing":[120],"event.":[121],"extracts":[123],"builds":[125],"normal":[127],"during":[130],"initialization":[132],"stage.":[133],"It":[134],"continuously":[135],"infers":[136],"devices'":[139],"states":[140],"by":[141],"monitoring":[142],"electricity":[144],"updates":[148],"patterns.":[152],"Any":[153],"abnormal":[154],"behaviors":[155],"will":[156],"be":[157],"detected":[158],"once":[159],"current":[161],"deviates":[165],"original":[168],"pattern.":[169],"We":[170],"prototyped":[171],"evaluated":[175],"using":[177],"UCI":[178],"dataset.":[179],"The":[180],"experiment":[181],"results":[182],"illustrated":[183],"efficiency":[185],"SHGuard.":[187]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
