{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:03:02Z","timestamp":1763190182519,"version":"3.45.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032104656","type":"print"},{"value":"9783032104663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10466-3_30","type":"book-chapter","created":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T06:58:58Z","timestamp":1763189938000},"page":"361-372","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LGSVE: Leader-Guided Soft Voting Ensemble Model for\u00a0Class-Imbalanced IoT Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5474-2994","authenticated-orcid":false,"given":"Shuai","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1007-5589","authenticated-orcid":false,"given":"Huiqiang","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1917-3978","authenticated-orcid":false,"given":"Hongwu","family":"Lv","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3215-7478","authenticated-orcid":false,"given":"Yifan","family":"Zou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7020-4568","authenticated-orcid":false,"given":"Runong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,16]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"103925","DOI":"10.1016\/j.jnca.2024.103925","volume":"229","author":"D Manivannan","year":"2024","unstructured":"Manivannan, D.: Recent endeavors in machine learning-powered intrusion detection systems for the internet of things. J. Netw. Comput. Appl. 229, 103925 (2024)","journal-title":"J. Netw. Comput. Appl."},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comcom.2020.12.007","volume":"168","author":"J Cui","year":"2021","unstructured":"Cui, J., Xia, H., Zhang, R., Ben-xu, H., Cheng, X.: Optimization scheme for intrusion detection scheme gbdt in edge computing center. Comput. Commun. 168, 136\u2013145 (2021)","journal-title":"Comput. Commun."},{"issue":"13","key":"30_CR3","doi-asserted-by":"publisher","first-page":"23080","DOI":"10.1109\/JIOT.2024.3387294","volume":"11","author":"U Zukaib","year":"2024","unstructured":"Zukaib, U., Cui, X., Zheng, C., Hassan, M., Shen, Z.: Meta-ids: Meta-learning-based smart intrusion detection system for internet of medical things (iomt) network. IEEE Internet Things J. 11(13), 23080\u201323095 (2024)","journal-title":"IEEE Internet Things J."},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Pramilarani, K., Vasanthi Kumari, P.: Cost based random forest classifier for intrusion detection system in internet of things. Appl. Soft Comput. 151, 111125 (2024)","DOI":"10.1016\/j.asoc.2023.111125"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Yang, L., Shami, A., Stevens, G., De Rusett, S.: Lccde: a decision-based ensemble framework for intrusion detection in the internet of vehicles. In: GLOBECOM 2022-2022 IEEE Global Communications Conference, pp. 3545\u20133550. IEEE (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10001280"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-ids: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst. Appl. 213, 119030 (2023)","DOI":"10.1016\/j.eswa.2022.119030"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, T.M., Vo, H.H.P., Yoo, M.: Enhancing intrusion detection in wireless sensor networks using a gswo-catboost approach. Sensors 24(11), 3339 (2024)","DOI":"10.3390\/s24113339"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Almotairi, A., Atawneh, S., Khashan, O.A., Khafajah, N.M.: Enhancing intrusion detection in iot networks using machine learning-based feature selection and ensemble models. Syst. Sci. Control Eng. 12(1), 2321381 (2024)","DOI":"10.1080\/21642583.2024.2321381"},{"issue":"39","key":"30_CR9","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.17485\/IJST\/v15i39.1520","volume":"15","author":"M Atif","year":"2022","unstructured":"Atif, M., Anwer, F., Talib, F.: An ensemble learning approach for effective prediction of diabetes mellitus using hard voting classifier. Indian J. Sci. Technol. 15(39), 1978\u20131986 (2022)","journal-title":"Indian J. Sci. Technol."},{"issue":"13","key":"30_CR10","doi-asserted-by":"publisher","first-page":"11888","DOI":"10.1109\/JIOT.2023.3244810","volume":"10","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Attack classification of imbalanced intrusion data for iot network using ensemble-learning-based deep neural network. IEEE Internet Things J. 10(13), 11888\u201311895 (2023)","journal-title":"IEEE Internet Things J."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Wu, Y., et al.: Intrusion detection for internet of things: an anchor graph clustering approach. IEEE Trans. Inf. Forensics Secur. (2025)","DOI":"10.1109\/TIFS.2025.3539100"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Sun, Z., Teixeira, A.M.H., Toor, S.: Gnn-ids: graph neural network based intrusion detection system. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, pp. 1\u201312 (2024)","DOI":"10.1145\/3664476.3664515"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Akuthota, U.C., Bhargava, L.: Transformer based intrusion detection for iot networks. IEEE Internet Things J. (2025)","DOI":"10.1109\/JIOT.2025.3525494"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Alfarshouti, A.M., Almutairi, S.M.: An intrusion detection system in iot environment using knn and svm classifiers. Webology 19(1), 3500\u20133517 (2022)","DOI":"10.14704\/WEB\/V19I1\/WEB19231"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Li, Z., Li, X.: Intrusion detection method based on genetic algorithm of optimizing lightgbm. In: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering, pp. 1366\u20131371 (2021)","DOI":"10.1145\/3501409.3501651"},{"issue":"7","key":"30_CR16","first-page":"12536","volume":"11","author":"Y Shoujian","year":"2023","unstructured":"Shoujian, Y., et al.: Deep q-network-based open-set intrusion detection solution for industrial internet of things. IEEE Internet Things J. 11(7), 12536\u201312550 (2023)","journal-title":"IEEE Internet Things J."},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Rashid, M.M., Kamruzzaman, J., Hassan, M.M., Imam, T., Gordon, S.: Cyberattacks detection in iot-based smart city applications using machine learning techniques. Int. J. Environ. Res. Public Health 17(24), 9347 (2020)","DOI":"10.3390\/ijerph17249347"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Hang, Z., Lu, Y., Wang, Y., Xie, Y.: Flow-mae: leveraging masked autoencoder for accurate, efficient and robust malicious traffic classification. In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 297\u2013314 (2023)","DOI":"10.1145\/3607199.3607206"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Huang, B.F., Boutros, P.C.: The parameter sensitivity of random forests. BMC Bioinf. 17(1), 331 (2016)","DOI":"10.1186\/s12859-016-1228-x"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Saheb, M.C.P., Yadav, M.S., Babu, S., Pujari, J.J., Maddala, J.B.: A review of ddos evaluation dataset: Cicddos2019 dataset. In: International Conference on Energy Systems, Drives and Automations, pp. 389\u2013397. Springer (2021)","DOI":"10.1007\/978-981-99-3691-5_34"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"JJose, J., Jose, D.V.: Deep learning algorithms for intrusion detection systems in internet of things using cic-ids 2017 dataset. Int. J. Electr. Comput. Eng. (IJECE) 13(1), 1134\u20131141 (2023)","DOI":"10.11591\/ijece.v13i1.pp1134-1141"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Sharma, A., Babbar, H., Sharma, A.: Ton-iot: detection of attacks on internet of things in vehicular networks. In: 2022 6th International Conference on Electronics, Communication and Aerospace Technology, pp. 539\u2013545. IEEE (2022)","DOI":"10.1109\/ICECA55336.2022.10009070"},{"key":"30_CR23","doi-asserted-by":"publisher","first-page":"122045","DOI":"10.1016\/j.eswa.2023.122045","volume":"238","author":"Z Wang","year":"2024","unstructured":"Wang, Z., Li, J., Yang, S., Luo, X., Li, D., Mahmoodi, S.: A lightweight iot intrusion detection model based on improved bert-of-theseus. Expert Syst. Appl. 238, 122045 (2024)","journal-title":"Expert Syst. Appl."},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Dontu, S., Vallabhaneni, R., Addula, S.R., Pareek, P.K., Abbas, H.M.: Mcwoa based hybrid deep learning for detecting the attacks in cybersecurity with iot network. In: 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), pp. 1\u20137. IEEE (2024)","DOI":"10.1109\/IACIS61494.2024.10721786"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10466-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T06:59:05Z","timestamp":1763189945000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10466-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,16]]},"ISBN":["9783032104656","9783032104663"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10466-3_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,16]]},"assertion":[{"value":"16 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nha Trang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.npc-conference.com\/#\/npc2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}