{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:28:56Z","timestamp":1762507736187},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10776-019-00430-1","type":"journal-article","created":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T22:51:58Z","timestamp":1557960718000},"page":"143-151","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Wireless Network Attack Defense Algorithm Using Deep Neural Network in Internet of Things Environment"],"prefix":"10.1007","volume":"26","author":[{"given":"Xifeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoluan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"issue":"3","key":"430_CR1","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/TGRS.2014.2335751","volume":"53","author":"J Tang","year":"2014","unstructured":"J. Tang, C. Deng, G. B. Huang, et al., Compressed-domain ship detection on spaceborne optical image using deep neural network and extreme learning machine, IEEE Transactions on Geoscience & Remote Sensing, Vol. 53, No. 3, pp. 1174\u20131185, 2014.","journal-title":"IEEE Transactions on Geoscience & Remote Sensing"},{"key":"430_CR2","doi-asserted-by":"crossref","unstructured":"S. Sivasankaran, A. A., Nugraha, E., Vincent, et al., Robust ASR using neural network based speech enhancement and feature simulation. In IEEE Workshop on Automatic Speech Recognition & Understanding, 2015.","DOI":"10.1109\/ASRU.2015.7404834"},{"issue":"2","key":"430_CR3","first-page":"161","volume":"2014","author":"IO Words","year":"2014","unstructured":"I. O. Words, Oil well characterization and artificial gas lift optimization using neural networks combined with genetic algorithm, Discrete Dynamics in Nature and Society, Vol. 2014, No. 2, pp. 161\u2013177, 2014.","journal-title":"Discrete Dynamics in Nature and Society"},{"issue":"C","key":"430_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.ijar.2017.03.008","volume":"85","author":"H Li","year":"2017","unstructured":"H. Li, L. Zhang, X. Zhou, et al., Cost-sensitive sequential three-way decision modeling using a deep neural network, International Journal of Approximate Reasoning., Vol. 85, No. C, pp. 68\u201378, 2017.","journal-title":"International Journal of Approximate Reasoning."},{"key":"430_CR5","doi-asserted-by":"crossref","unstructured":"P. Li, M. Chen, F. Hu, et al., A spectrogram-based voiceprint recognition using deep neural network. In Control & Decision Conference, 2015.","DOI":"10.1109\/CCDC.2015.7162425"},{"issue":"2","key":"430_CR6","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TMC.2016.2549519","volume":"16","author":"S Fang","year":"2017","unstructured":"S. Fang, Y. Liu, W. Shen, et al., Virtual multipath attack and defense for location distinction in wireless networks, IEEE Transactions on Mobile Computing, Vol. 16, No. 2, pp. 566\u2013580, 2017.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"430_CR7","unstructured":"D. Garcia, A. E. Lugo, E. Hemberg, et al., In ACM Press the Genetic and Evolutionary Computation Conference Companion\u2014Berlin, Germany (2017.07.15\u20132017.07.19)] Proceedings of the Genetic and Evolutionary Computation Conference Companion on,\u2014GECCO\\\u201d17\u2014Investigating coevolutionary archive based genetic algorithms on cyber defense networks\/\/Genetic & Evolutionary Computation Conference Companion, pages 1455\u20131462, 2017."},{"key":"430_CR8","unstructured":"A. Authors, AD V-BNN: Improved adversarial deffense through robust Bayesian neural network, 2018."},{"issue":"8","key":"430_CR9","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1111\/j.1553-2712.2010.00779.x","volume":"17","author":"P Tanabe","year":"2014","unstructured":"P. Tanabe, C. Reddin, V. L. Thornton, et al., Emergency department sickle cell assessment of needs and strengths (ED-SCANS), a focus group and decision support tool development project, Academic Emergency Medicine Official Journal of the Society for Academic Emergency Medicine, Vol. 17, No. 8, pp. 848\u2013858, 2014.","journal-title":"Academic Emergency Medicine Official Journal of the Society for Academic Emergency Medicine"},{"issue":"2","key":"430_CR10","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s12555-014-0034-3","volume":"13","author":"SJ Chang","year":"2015","unstructured":"S. J. Chang, J. Y. Lee, B. P. Jin, et al., An online fault tolerant actor-critic neuro-control for a class of nonlinear systems using neural network HJB approach, International Journal of Control Automation & Systems, Vol. 13, No. 2, pp. 311\u2013318, 2015.","journal-title":"International Journal of Control Automation & Systems"},{"issue":"4","key":"430_CR11","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.neucom.2013.09.045","volume":"129","author":"Z Qi","year":"2014","unstructured":"Z. Qi, Y. Tian and S. Yong, A new classification model using privileged information and its application, Neurocomputing, Vol. 129, No. 4, pp. 146\u2013152, 2014.","journal-title":"Neurocomputing"},{"key":"430_CR12","doi-asserted-by":"crossref","unstructured":"A. Thanda, and S. M. Venkatesan, Audio visual speech recognition using deep recurrent neural networks. In IAPR Workshop on Multimodal Pattern Recognition of Social Signals in Human\u2013Computer Interaction. 2016.","DOI":"10.1007\/978-3-319-59259-6_9"},{"key":"430_CR13","doi-asserted-by":"crossref","unstructured":"J. Du, Z. R. Wang, J. F. Zhai, et al., Deep neural network based hidden Markov model for offline handwritten Chinese text recognition. In International Conference on Pattern Recognition, 2016.","DOI":"10.1109\/ICPR.2016.7900164"},{"key":"430_CR14","doi-asserted-by":"crossref","unstructured":"S. Woo, and C. Lee, Feature extraction for deep neural networks based on decision boundaries. In SPIE Defense\u2009+\u2009Security, 2017.","DOI":"10.1117\/12.2263172"},{"issue":"4","key":"430_CR15","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2018.2141032","volume":"51","author":"N Zhen","year":"2018","unstructured":"N. Zhen, Q. Li and L. Gang, Game-model-based network security risk control, Computer, Vol. 51, No. 4, pp. 28\u201338, 2018.","journal-title":"Computer"},{"key":"430_CR16","doi-asserted-by":"crossref","unstructured":"Le L, Hao J, Xie Y, et al., Deep kernel: learning kernel function from data using deep neural network. In IEEE\/ACM International Conference on Big Data Computing Applications & Technologies, 2017.","DOI":"10.1145\/3006299.3006312"},{"issue":"10","key":"430_CR17","first-page":"1533","volume":"22","author":"PO Glauner","year":"2015","unstructured":"P. O. Glauner, Deep convolutional neural networks for smile recognition, IEEE\/ACM Transactions on Audio Speech & Language Processing, Vol. 22, No. 10, pp. 1533\u20131545, 2015.","journal-title":"IEEE\/ACM Transactions on Audio Speech & Language Processing"},{"key":"430_CR18","doi-asserted-by":"crossref","unstructured":"X. Xu, and S. Todorovic, Beam search for learning a deep convolutional neural network of 3D shapes. In International Conference on Pattern Recognition, 2017.","DOI":"10.1109\/ICPR.2016.7900177"},{"issue":"1","key":"430_CR19","first-page":"12","volume":"38","author":"G Liu","year":"2014","unstructured":"G. Liu, H. Zhang and Q. Li, Network security optimal attack and defense decision-making method based on game model, Journal of Nanjing University of Science & Technology, Vol. 38, No. 1, pp. 12\u201321, 2014.","journal-title":"Journal of Nanjing University of Science & Technology"},{"issue":"3","key":"430_CR20","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1002\/mp.12110","volume":"44","author":"T Kooi","year":"2017","unstructured":"T. Kooi, B. Ginneken, N. Karssemeijer, et al., Discriminating solitary cysts from soft tissue lesions in mammography using a pretrained deep convolutional neural network, Medical Physics, Vol. 44, No. 3, pp. 1017\u20131027, 2017.","journal-title":"Medical Physics"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00430-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00430-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00430-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T23:14:56Z","timestamp":1589411696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00430-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["430"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00430-1","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"23 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}