{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T18:03:11Z","timestamp":1778349791414,"version":"3.51.4"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Science and Technology on Communication Networks Laboratory","award":["6142104180413"],"award-info":[{"award-number":["6142104180413"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s12243-021-00854-y","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T05:05:25Z","timestamp":1625029525000},"page":"273-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["The robust deep learning\u2013based schemes for intrusion detection in Internet of Things environments"],"prefix":"10.1007","volume":"76","author":[{"given":"Xingbing","family":"Fu","sequence":"first","affiliation":[]},{"given":"Nan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Libin","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianwu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"854_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy MF, Awad AI, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7:1\u201320","journal-title":"J Cloud Comput"},{"key":"854_CR2","doi-asserted-by":"crossref","unstructured":"Weber M, Boban M (2016) Security challenges of the Internet of Things. In: 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp 638\u2013643","DOI":"10.1109\/MIPRO.2016.7522219"},{"key":"854_CR3","unstructured":"Putchala MK (2017) Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU)"},{"key":"854_CR4","doi-asserted-by":"crossref","unstructured":"Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure Internet of Things. In: 2016 IEEE 4th international conference on Future Internet of Things and Cloud (FiCloud), pp 84\u201390","DOI":"10.1109\/FiCloud.2016.20"},{"key":"854_CR5","doi-asserted-by":"crossref","unstructured":"Karatas G, Demir O., Sahingoz O.K. (2018) Deep learning in intrusion detection systems. In: 2018 international congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT), pp 113\u2013116","DOI":"10.1109\/IBIGDELFT.2018.8625278"},{"key":"854_CR6","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. CoRR, arXiv:1312.6199"},{"key":"854_CR7","doi-asserted-by":"crossref","unstructured":"Ibitoye O, Shafiq MO, Matrawy A (2019) Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: 2019 IEEE global communications conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"854_CR8","doi-asserted-by":"crossref","unstructured":"Khamis RA, Shafiq MO (2020) Investigating resistance of deep learning-based IDS against adversaries using min-max Optimization. In: ICC 2020 - 2020 IEEE international conference on communications (ICC), pp 1\u20137","DOI":"10.1109\/ICC40277.2020.9149117"},{"key":"854_CR9","doi-asserted-by":"crossref","unstructured":"Khamis RA, Matrawy A (2020) Evaluation of adversarial training on different types of neural networks in deep learning-based IDSs. In: 2020 international symposium on networks, computers and communications (ISNCC), pp 1\u20136","DOI":"10.1109\/ISNCC49221.2020.9297344"},{"key":"854_CR10","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Towards generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th international conference on information systems security and privacy (ICISSP), Portugal","DOI":"10.5220\/0006639801080116"},{"key":"854_CR11","doi-asserted-by":"crossref","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT Dataset. arXiv:1811.00701","DOI":"10.1016\/j.future.2019.05.041"},{"key":"854_CR12","doi-asserted-by":"publisher","first-page":"38367","DOI":"10.1109\/ACCESS.2018.2854599","volume":"6","author":"Z Wang","year":"2018","unstructured":"Wang Z (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38367\u201338384","journal-title":"IEEE Access"},{"key":"854_CR13","doi-asserted-by":"crossref","unstructured":"Warzynski A, Kolaczek G (2018) Intrusion detection systems vulnerability on adversarial examples. In: 2018 innovations in intelligent systems and applications (INISTA), pp 1\u20134","DOI":"10.1109\/INISTA.2018.8466271"},{"key":"854_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11416-018-0324-z","volume":"15","author":"RU Khan","year":"2018","unstructured":"Khan RU, Zhang X, Kumar R (2018) Analysis of ResNet and GoogleNet models for malware detection. J Comput Virol Hacking Tech 15:29\u201337","journal-title":"J Comput Virol Hacking Tech"},{"issue":"3","key":"854_CR15","first-page":"1362","volume":"10","author":"P Kottapalle","year":"2020","unstructured":"Kottapalle P (2020) A cnn-lstm model for intrusion detection system from high dimensional data. J Inf Comput Sci 10(3):1362\u20131370","journal-title":"J Inf Comput Sci"},{"key":"854_CR16","unstructured":"Athalye A, Engstrom L, Ilyas A, Kwok K (2018) Synthesizing robust adversarial examples. arXiv:1707.07397"},{"key":"854_CR17","doi-asserted-by":"crossref","unstructured":"Chen P, Zhang H, Sharma Y, Yi J, Hsieh C (2017) ZOO: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM workshop on artificial intelligence and security","DOI":"10.1145\/3128572.3140448"},{"key":"854_CR18","doi-asserted-by":"crossref","unstructured":"Brunner T, Diehl F, Truong-Le M, Knoll A (2019) Guessing smart: biased sampling for efficient black-box adversarial attacks. In: 2019 IEEE\/CVF international conference on computer vision (ICCV), pp 4957\u20134965","DOI":"10.1109\/ICCV.2019.00506"},{"key":"854_CR19","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. CoRR, arXiv:1312.6199"},{"key":"854_CR20","unstructured":"Goodfellow IJ, Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. CoRR, arXiv:1412.6572"},{"key":"854_CR21","unstructured":"Kurakin A, Goodfellow I, Bengio S (2017) Adversarial machine learning at scale. arXiv:1611.01236"},{"key":"854_CR22","doi-asserted-by":"crossref","unstructured":"Wang Q, Guo W, Zhang K, Ororbia A, Xing X, Liu X, Giles CL (2017) Adversary resistant deep neural networks with an application to malware detection. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data Mining","DOI":"10.1145\/3097983.3098158"},{"key":"854_CR23","unstructured":"Das N, Shanbhogue M, Chen S, Hohman F, Chen L, Kounavis M, Chau DH (2017) Keeping the bad guys out: protecting and vaccinating deep learning with JPEG compression. arXiv:1705.02900"},{"key":"854_CR24","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00854-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-021-00854-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00854-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T11:32:12Z","timestamp":1625139132000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-021-00854-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":24,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["854"],"URL":"https:\/\/doi.org\/10.1007\/s12243-021-00854-y","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"23 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}