{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:22Z","timestamp":1761401962469,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T00:00:00Z","timestamp":1540252800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["TW201706"],"award-info":[{"award-number":["TW201706"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s11277-018-6036-3","type":"journal-article","created":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T02:44:34Z","timestamp":1540262674000},"page":"595-615","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Using Improved Hilbert\u2013Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network"],"prefix":"10.1007","volume":"104","author":[{"given":"Hongsong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fu","family":"Zhongchuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,23]]},"reference":[{"key":"6036_CR1","unstructured":"Krishna Chaitanya, D., Ghosh, A., & Ever, E. (2011). Analysis of denial of service attacks on wireless sensor networks using simulation. In Kaspersky Lab IT security conference for the next generation, Erfurt, Germany, January 27\u201330."},{"key":"6036_CR2","unstructured":"He, Y.et al. (2009). Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. In IEEE international parallel and distributed processing symposium (IPDPS 09)."},{"key":"6036_CR3","first-page":"1362","volume":"2","author":"M Guirguis","year":"2005","unstructured":"Guirguis, M., Bestavros, A., Matta, I., & Zhang, Y. (2005). Reduction of Quality (RoQ) attacks on internet end- systems. IEEE INFOCOM,\n                           2, 1362\u20131372.","journal-title":"IEEE INFOCOM"},{"key":"6036_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Zhang, Y., & Wei, Y. (2008). The feasibility of launching Reduction of Quality (RoQ) attacks in 802.11 wireless networks. In International conference on parallel and distributed systems - ICPADS 2008 (pp. 517\u2013524).","DOI":"10.1109\/ICPADS.2008.59"},{"key":"6036_CR5","unstructured":"Barros, U., Bouet, M., Santos, T. A., & Nogueira, M. (2010). Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. In 2010 International conference on network and service management (pp. 1\u20135)."},{"issue":"2","key":"6036_CR6","first-page":"227","volume":"4","author":"W Ren","year":"2007","unstructured":"Ren, W., Yeung, D.-Y., & Jin, H. (2007). Pulsing RoQ DDoS attack and defense scheme in mobile ad hoc networks. International Journal of Network Security,\n                           4(2), 227\u2013234.","journal-title":"International Journal of Network Security"},{"key":"6036_CR7","doi-asserted-by":"crossref","unstructured":"Wen, K., Yang, J., Cheng, F., Li, C., Wang, Z., & Yin, H. (2014). Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly. In ICCCN, 2014 (pp. 1\u20136).","DOI":"10.1109\/ICCCN.2014.6911829"},{"issue":"10","key":"6036_CR8","doi-asserted-by":"crossref","first-page":"2307","DOI":"10.3724\/SP.J.1146.2013.00114","volume":"35","author":"R Hong","year":"2013","unstructured":"Hong, R., Hui-Mei, W., & Ming, X. (2013). A novel method for detecting Reduction of Quality (RoQ) attack based on fast independent component analysis. Journal of Electronics & Information Technology,\n                           35(10), 2307\u20132313.","journal-title":"Journal of Electronics & Information Technology"},{"issue":"1","key":"6036_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1175\/1520-0477(1998)079<0061:APGTWA>2.0.CO;2","volume":"79","author":"C Torrence","year":"1998","unstructured":"Torrence, C., & Compo, G. (1998). A practical guide to wavelet analysis. Bulletin of the American Meteorological Society,\n                           79(1), 61\u201378.","journal-title":"Bulletin of the American Meteorological Society"},{"key":"6036_CR10","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1098\/rspa.1998.0193","volume":"454","author":"NE Huang","year":"1998","unstructured":"Huang, N. E., Shen, Z., & Long, S. R. (1998). The empirical ode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society of London A,\n                           454, 903\u2013995.","journal-title":"Proceedings of the Royal Society of London A"},{"issue":"2","key":"6036_CR11","first-page":"126","volume":"8","author":"Z Kangfeng","year":"2011","unstructured":"Kangfeng, Z., Xiujuan, W., Yixian, Y., & Shize, G. (2011). Detecting DDoS attack With Hilbert\u2013Huang transformation. China Communications,\n                           8(2), 126\u2013133.","journal-title":"China Communications"},{"key":"6036_CR12","doi-asserted-by":"crossref","unstructured":"Han, J., & Zhang, J. Z. (2013). Network traffic anomaly detection using weighted self-similarity based on EMD. In 2013 Proceedings of IEEE Southeastcon, Southeastcon (pp. 1\u20135).","DOI":"10.1109\/SECON.2013.6567395"},{"key":"6036_CR13","unstructured":"Han, J. (2013). Network traffic anomaly detection using EMD and Hilbert-Huan transform. 2013 Western Carolina University (WCU) Thesis."},{"issue":"10","key":"6036_CR14","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.1109\/JSEN.2013.2266399","volume":"13","author":"A Le","year":"2013","unstructured":"Le, A., & Loo, J. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal,\n                           13(10), 3685\u20133692.","journal-title":"IEEE Sensors Journal"},{"issue":"6","key":"6036_CR15","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/JSEN.2015.2395442","volume":"15","author":"C-T Hsueh","year":"2015","unstructured":"Hsueh, C.-T., & Wen, Chih-Yu. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal,\n                           15(6), 3590\u20133602.","journal-title":"IEEE Sensors Journal"},{"issue":"3","key":"6036_CR16","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A. A. (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security,\n                           31(3), 357\u2013374.","journal-title":"Computers & Security"},{"issue":"20","key":"6036_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2013.04.002","volume":"37","author":"S Hamedheidari","year":"2013","unstructured":"Hamedheidari, S., & Rafeh, R. (2013). A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Computers & Security,\n                           37(20), 1\u201314.","journal-title":"Computers & Security"},{"issue":"1","key":"6036_CR18","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jnca.2005.09.006","volume":"30","author":"C Hongsong","year":"2007","unstructured":"Hongsong, C., Zhenzhou, J., & Mingzeng, H. (2007). Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. Journal of Network & Computer Applications,\n                           30(1), 145\u2013166.","journal-title":"Journal of Network & Computer Applications"},{"key":"6036_CR19","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1146\/annurev.fluid.31.1.417","volume":"31","author":"NE Huang","year":"1999","unstructured":"Huang, N. E., Shen, Z., & Long, S. R. (1999). A new view of nonlinear water waves: The Hilbert spectrum. Annual Review of Fluid Mechanics,\n                           31, 417\u2013457.","journal-title":"Annual Review of Fluid Mechanics"},{"key":"6036_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S1793536909000047","volume":"1","author":"Z Wu","year":"2009","unstructured":"Wu, Z., & Huang, N. E. (2009). Ensemble empirical mode decomposition: A noise-assisted data analysis method. Advances in Adaptive Data Analysis,\n                           1, 1\u201341.","journal-title":"Advances in Adaptive Data Analysis"},{"key":"6036_CR21","unstructured":"http:\/\/www.isi.edu\/nsnam\/ns\n                    \n                  . Accessed Jan 2017."},{"issue":"5","key":"6036_CR22","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1109\/TIM.2011.2174893","volume":"64","author":"W Zhang","year":"2012","unstructured":"Zhang, W., Wang, C., & Wang, H. (2012). Hilbert\u2013Huang transform-based electrostatic signal analysis of ring-shape electrodes with different widths. IEEE Instrumentation and Measurement Society,\n                           64(5), 1209\u20131217.","journal-title":"IEEE Instrumentation and Measurement Society"},{"issue":"5","key":"6036_CR23","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/TIM.2013.2292283","volume":"63","author":"L Wang","year":"2014","unstructured":"Wang, L., Yan, Y., Hu, Y., & Qian, X. (2014). Rotational speed measurement through electrostatic sensing and correlation signal processing. IEEE Transactions on Instrumentation and Measurement,\n                           63(5), 1190\u20131199.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"3","key":"6036_CR24","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MCC.2014.62","volume":"1","author":"H Chen","year":"2014","unstructured":"Chen, H., Bhargava, B., & Zhongchuan, F. (2014). Multilabels-based scalable access control for big data applications. IEEE Cloud Computing Magazine,\n                           1(3), 65\u201371.","journal-title":"IEEE Cloud Computing Magazine"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-6036-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6036-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6036-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T11:14:51Z","timestamp":1571829291000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-6036-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,23]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["6036"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-6036-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,10,23]]},"assertion":[{"value":"23 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}