{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:17:29Z","timestamp":1776442649616,"version":"3.51.2"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00203-8","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T19:08:22Z","timestamp":1758740902000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight intrusion detection system for IoT with improved feature engineering and advanced dynamic quantization"],"prefix":"10.1007","volume":"5","author":[{"given":"Semachew Fasika","family":"Misrak","sequence":"first","affiliation":[]},{"given":"Henock Mulugeta","family":"Melaku","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"key":"203_CR1","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1016\/j.future.2019.04.017","volume":"100","author":"IU Din","year":"2019","unstructured":"Din IU, Guizani M, Rodrigues JJ, Hassan S, Korotaev VV. Machine learning in the internet of things: designed techniques for smart cities. Futur Gener Comput Syst. 2019;100:826\u201343.","journal-title":"Futur Gener Comput Syst"},{"issue":"19","key":"203_CR2","doi-asserted-by":"publisher","first-page":"3205","DOI":"10.3390\/electronics11193205","volume":"11","author":"S Gopali","year":"2022","unstructured":"Gopali S, Siami Namin A. Deep learning-based time-series analysis for detecting anomalies in internet of things. Electronics. 2022;11(19):3205.","journal-title":"Electronics"},{"issue":"3","key":"203_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3803","volume":"33","author":"Y Otoum","year":"2022","unstructured":"Otoum Y, Liu D, Nayak A. Dl-ids: a deep learning-based intrusion detection framework for securing iot. Trans Emerg Telecommun Technol. 2022;33(3): e3803.","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"1","key":"203_CR4","doi-asserted-by":"publisher","first-page":"144","DOI":"10.3390\/electronics9010144","volume":"9","author":"YN Soe","year":"2020","unstructured":"Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K. Towards a lightweight detection system for cyber attacks in the iot environment using corresponding features. Electronics. 2020;9(1):144.","journal-title":"Electronics"},{"issue":"0","key":"203_CR5","first-page":"1","volume":"1","author":"P Agbedanu","year":"2022","unstructured":"Agbedanu P, Musabe R, Rwigema J, Gatare I. A lightweight intrusion detection for internet of things using incremental ensemble learning. J Spec. 2022;1(0):1.","journal-title":"J Spec"},{"issue":"10","key":"203_CR6","doi-asserted-by":"publisher","first-page":"3607","DOI":"10.3390\/s22103607","volume":"22","author":"S Ullah","year":"2022","unstructured":"Ullah S, Ahmad J, Khan MA, Alkhammash EH, Hadjouni M, Ghadi YY, Saeed F, Pitropakis N. A new intrusion detection system for the internet of things via deep convolutional neural network and feature engineering. Sensors. 2022;22(10):3607.","journal-title":"Sensors"},{"key":"203_CR7","doi-asserted-by":"crossref","unstructured":"Samantaray M, Barik RC, Biswal AK. Ensemble-based lightweight machine learning optimization for iot network intrusion detection. In: 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC). IEEE, 2025. p. 1101\u20131106.","DOI":"10.1109\/ISACC65211.2025.10969343"},{"key":"203_CR8","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1569","volume":"9","author":"Z Wang","year":"2023","unstructured":"Wang Z, Chen H, Yang S, Luo X, Li D, Wang J. A lightweight intrusion detection method for iot based on deep learning and dynamic quantization. PeerJ Comput Sci. 2023;9: e1569.","journal-title":"PeerJ Comput Sci"},{"key":"203_CR9","unstructured":"Murugesan G, Maheswaravenkatesh P. A lightweight convolutional neural network based network intrusion detection and classification method for social internet of things. 2024."},{"key":"203_CR10","doi-asserted-by":"crossref","unstructured":"Sadiq AS, Faris H, Ala\u2019M A-Z, Mirjalili S, Ghafoor KZ. Fraud detection model based on multi-verse features extraction approach for smart city applications. In: Smart cities cybersecurity and privacy. Elsevier, 2019. p. 241\u2013251.","DOI":"10.1016\/B978-0-12-815032-0.00017-2"},{"issue":"5","key":"203_CR11","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.3390\/s20051375","volume":"20","author":"I Almomani","year":"2020","unstructured":"Almomani I, Alromi A. Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks. Sensors. 2020;20(5):1375.","journal-title":"Sensors"},{"issue":"21","key":"203_CR12","doi-asserted-by":"publisher","first-page":"11645","DOI":"10.3390\/su132111645","volume":"13","author":"M Elhoseny","year":"2021","unstructured":"Elhoseny M, Thilakarathne NN, Alghamdi MI, Mahendran RK, Gardezi AA, Weerasinghe H, Welhenge A. Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions. Sustainability. 2021;13(21):11645.","journal-title":"Sustainability"},{"key":"203_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100584","volume":"20","author":"MHP Rizi","year":"2022","unstructured":"Rizi MHP, Seno SAH. A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet Things. 2022;20: 100584.","journal-title":"Internet Things"},{"issue":"1","key":"203_CR14","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3390\/s22010140","volume":"22","author":"A Fatani","year":"2022","unstructured":"Fatani A, Dahou A, Al-Qaness MAA, Songfeng L, Elaziz MA. Advanced feature extraction and selection approach using deep learning and aquila optimizer for iot intrusion detection system. Sensors. 2022;22(1):140.","journal-title":"Sensors"},{"key":"203_CR15","doi-asserted-by":"crossref","unstructured":"Maheswaran N, Bose S, Logeswari G, Anitha T. Multistage intrusion detection system using machine learning algorithm. In: Mobile Computing and Sustainable Informatics. Springer. 2022. p. 139\u2013153.","DOI":"10.1007\/978-981-19-2069-1_10"},{"issue":"5","key":"203_CR16","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12917","volume":"39","author":"RV Mendonca","year":"2022","unstructured":"Mendonca RV, Silva JC, Rosa RL, Saadi M, Rodriguez DZ, Farouk A. A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst. 2022;39(5): e12917.","journal-title":"Expert Syst"},{"issue":"3","key":"203_CR17","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1007\/s13369-023-08016-z","volume":"49","author":"A Prasad","year":"2024","unstructured":"Prasad A, Chandra S. Botdefender: a collaborative defense framework against botnet attacks using network traffic analysis and machine learning. Arab J Sci Eng. 2024;49(3):3313\u201329.","journal-title":"Arab J Sci Eng"},{"key":"203_CR18","doi-asserted-by":"publisher","first-page":"5579851","DOI":"10.1155\/2021\/5579851","volume":"2021","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani H, Aldhyani THH. Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity. 2021;2021:5579851.","journal-title":"Complexity"},{"issue":"5","key":"203_CR19","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3390\/pr9050834","volume":"9","author":"MA Khan","year":"2021","unstructured":"Khan MA. Hcrnnids: hybrid convolutional recurrent neural network-based network intrusion detection system. Processes. 2021;9(5):834.","journal-title":"Processes"},{"key":"203_CR20","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MCE.2022.3181759","volume":"13","author":"C-H Wang","year":"2022","unstructured":"Wang C-H, Huang K-Y, Yao Y, Chen J-C, Shuai H-H, Cheng W-H. Lightweight deep learning: an overview. IEEE Consum Electr Mag. 2022;13:51\u201364.","journal-title":"IEEE Consum Electr Mag"},{"issue":"19","key":"203_CR21","doi-asserted-by":"publisher","first-page":"6432","DOI":"10.3390\/s21196432","volume":"21","author":"K Albulayhi","year":"2021","unstructured":"Albulayhi K, Smadi AA, Sheldon FT, Abercrombie RK. Iot intrusion detection taxonomy, reference architecture, and analyses. Sensors. 2021;21(19):6432.","journal-title":"Sensors"},{"key":"203_CR22","volume":"76","author":"M Gao","year":"2023","unstructured":"Gao M, Lifa W, Li Q, Chen W. Anomaly traffic detection in iot security using graph neural networks. J Inf Secur Appl. 2023;76: 103532.","journal-title":"J Inf Secur Appl"},{"issue":"23","key":"203_CR23","doi-asserted-by":"publisher","first-page":"12336","DOI":"10.3390\/app122312336","volume":"12","author":"AA Alsulami","year":"2022","unstructured":"Alsulami AA, Al-Haija QA, Tayeb A, Alqahtani A. An intrusion detection and classification system for iot traffic with improved data engineering. Appl Sci. 2022;12(23):12336.","journal-title":"Appl Sci"},{"key":"203_CR24","doi-asserted-by":"crossref","unstructured":"Rajendran G, Nivash RSR, Parthy PP, Balamurugan S. Modern security threats in the internet of things (iot): Attacks and countermeasures. In: 2019 International carnahan conference on security technology (ICCST). IEEE. 2019. p. 1\u20136.","DOI":"10.1109\/CCST.2019.8888399"},{"issue":"2","key":"203_CR25","doi-asserted-by":"publisher","first-page":"298","DOI":"10.3390\/electronics12020298","volume":"12","author":"G Bhandari","year":"2023","unstructured":"Bhandari G, Lyth A, Shalaginov A, Gr\u00f8nli T-M. Distributed deep neural-network-based middleware for cyber-attacks detection in smart iot ecosystem: a novel framework and performance evaluation approach. Electronics. 2023;12(2):298.","journal-title":"Electronics"},{"key":"203_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2023.05.001","volume":"179","author":"S Hosseininoorbin","year":"2023","unstructured":"Hosseininoorbin S, Layeghy S, Sarhan M, Jurdak R, Portmann M. Exploring edge tpu for network intrusion detection in iot. J Parall Distrib Comput. 2023;179: 104712.","journal-title":"J Parall Distrib Comput"},{"key":"203_CR27","doi-asserted-by":"crossref","unstructured":"Elessawy RH, Eldawlatly S, Abbas HM. A long short-term memory autoencoder approach for eeg motor imagery classification. In: 2020 international conference on computation, automation and knowledge management (ICCAKM). IEEE. 2020. p. 79\u201384.","DOI":"10.1109\/ICCAKM46823.2020.9051489"},{"key":"203_CR28","doi-asserted-by":"crossref","unstructured":"Ibibo JT. Emerging challenges and solutions in rpl protocol: research review. In: 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE. 2023. p. 283\u2013289.","DOI":"10.1109\/CAMAD59638.2023.10478429"},{"issue":"11","key":"203_CR29","doi-asserted-by":"publisher","first-page":"808","DOI":"10.12720\/jcm.15.11.808-817","volume":"15","author":"V Pham","year":"2020","unstructured":"Pham V, Seo E, Chung T-M. Lightweight convolutional neural network based intrusion detection system. J Commun. 2020;15(11):808\u201317.","journal-title":"J Commun"},{"key":"203_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117597","volume":"204","author":"QM Alzubi","year":"2022","unstructured":"Alzubi QM, Anbar M, Sanjalawe Y, Al-Betar MA, Abdullah R. Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization. Expert Syst Appl. 2022;204: 117597.","journal-title":"Expert Syst Appl"},{"key":"203_CR31","doi-asserted-by":"publisher","first-page":"8434","DOI":"10.1109\/ACCESS.2022.3144208","volume":"10","author":"B Lahasan","year":"2022","unstructured":"Lahasan B, Samma H. Optimized deep autoencoder model for internet of things intruder detection. IEEE Access. 2022;10:8434\u201348.","journal-title":"IEEE Access"},{"key":"203_CR32","doi-asserted-by":"publisher","DOI":"10.1590\/1678-4324-2024231114","volume":"67","author":"T Muthu","year":"2024","unstructured":"Muthu T, Kalimuthu VK, Srinivasan B, Velumani R. Enhancing intrusion detection using binary arithmetic optimization with sparse auto encoder for fog-assisted wireless sensor networks. Braz Arch Biol Technol. 2024;67: e24231114.","journal-title":"Braz Arch Biol Technol"},{"issue":"12","key":"203_CR33","doi-asserted-by":"publisher","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","volume":"9","author":"R Zhao","year":"2021","unstructured":"Zhao R, Gui G, Xue Z, Yin J, Ohtsuki T, Adebisi B, Gacanin H. A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet Things J. 2021;9(12):9960\u201372.","journal-title":"IEEE Internet Things J"},{"key":"203_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122045","volume":"238","author":"Z Wang","year":"2024","unstructured":"Wang Z, Li J, Yang S, Luo X, Li D, Mahmoodi S. A lightweight iot intrusion detection model based on improved bert-of-theseus. Expert Syst Appl. 2024;238: 122045.","journal-title":"Expert Syst Appl"},{"key":"203_CR35","doi-asserted-by":"publisher","first-page":"2935","DOI":"10.1109\/JIOT.2023.3294259","volume":"11","author":"M He","year":"2023","unstructured":"He M, Huang Y, Wang X, Wei P, Wang X. A lightweight and efficient iot intrusion detection method based on feature grouping. IEEE Internet Things J. 2023;11:2935\u201349.","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"203_CR36","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed R, Musafer H, Alessa A, Faezipour M, Abuzneid A. Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics. 2019;8(3):322.","journal-title":"Electronics"},{"issue":"4","key":"203_CR37","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1007\/s13198-017-0683-8","volume":"9","author":"A Kaur","year":"2018","unstructured":"Kaur A, Pal SK, Singh AP. Hybridization of k-means and firefly algorithm for intrusion detection system. Int J Syst Assur Eng Manag. 2018;9(4):901\u201310.","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"8","key":"203_CR38","doi-asserted-by":"publisher","first-page":"4141","DOI":"10.3390\/s23084141","volume":"23","author":"W Yao","year":"2023","unstructured":"Yao W, Longcan H, Hou Y, Li X. A lightweight intelligent network intrusion detection system using one-class autoencoder and ensemble learning for iot. Sensors. 2023;23(8):4141.","journal-title":"Sensors"},{"key":"203_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105805","volume":"119","author":"TK Boppana","year":"2023","unstructured":"Boppana TK, Bagade P. Gan-ae: an unsupervised intrusion detection system for mqtt networks. Eng Appl Artif Intell. 2023;119: 105805.","journal-title":"Eng Appl Artif Intell"},{"key":"203_CR40","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA, et al. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp. 2018;1:108\u201316.","journal-title":"ICISSp"},{"key":"203_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/6689134","volume":"2020","author":"A Derhab","year":"2020","unstructured":"Derhab A, Aldweesh A, Emam AZ, Khan FA. Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wirel Commun Mob Comput. 2020;2020:1\u201316.","journal-title":"Wirel Commun Mob Comput"},{"issue":"6","key":"203_CR42","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4049","volume":"33","author":"M Papaioannou","year":"2022","unstructured":"Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D. A survey on security threats and countermeasures in internet of medical things (iomt). Trans Emerg Telecommun Technol. 2022;33(6): e4049.","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"13","key":"203_CR43","doi-asserted-by":"publisher","first-page":"6442","DOI":"10.3390\/app12136442","volume":"12","author":"S Rani","year":"2022","unstructured":"Rani S, Singh A, Elkamchouchi DH, Noya ID. Lightweight hybrid deep learning architecture and model for security in iiot. Appl Sci. 2022;12(13):6442.","journal-title":"Appl Sci"},{"key":"203_CR44","first-page":"151","volume":"2010","author":"S Ozawa","year":"2010","unstructured":"Ozawa S, Pang S, Kasabov N. Online feature extraction for evolving intelligent systems. Evolv Intell Syst Methodol Appl. 2010;2010:151\u201371.","journal-title":"Evolv Intell Syst Methodol Appl"},{"issue":"2","key":"203_CR45","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1484","volume":"13","author":"B Bischl","year":"2023","unstructured":"Bischl B, Binder M, Lang M, Pielok T, Richter J, Coors S, Thomas J, Ullmann T, Becker M, Boulesteix A-L, et al. Hyperparameter optimization: foundations, algorithms, best practices, and open challenges. Wiley Interdiscip Rev Data Min Knowl Discov. 2023;13(2): e1484.","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"203_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103456","volume":"73","author":"P Srinivas","year":"2022","unstructured":"Srinivas P, Katarya R. hyoptxg: optuna hyper-parameter optimization framework for predicting cardiovascular disease using xgboost. Biomed Signal Proc Contr. 2022;73: 103456.","journal-title":"Biomed Signal Proc Contr"},{"key":"203_CR47","doi-asserted-by":"crossref","unstructured":"Hamed K, Ozgunalp U. A comparative analysis of pretrained models for brain tumaor classification and their optimization using optuna. In: 2024 Innovations in intelligent systems and applications conference (ASYU). IEEE. 2024. p. 1\u20137.","DOI":"10.1109\/ASYU62119.2024.10757117"},{"issue":"1","key":"203_CR48","doi-asserted-by":"publisher","first-page":"189","DOI":"10.3390\/electronics14010189","volume":"14","author":"J Mao","year":"2025","unstructured":"Mao J, Yang X, Bo H, Yizhen L, Yin G. Intrusion detection system based on multi-level feature extraction and inductive network. Electronics. 2025;14(1):189.","journal-title":"Electronics"},{"issue":"18","key":"203_CR49","first-page":"1","volume":"14","author":"B Ta\u015fc\u0131","year":"2024","unstructured":"Ta\u015fc\u0131 B. Deep-learning-based approach for iot attack and malware detection. Appl Sci (2076-3417). 2024;14(18):1.","journal-title":"Appl Sci (2076-3417)"},{"issue":"5","key":"203_CR50","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2016.145","volume":"49","author":"W Shi","year":"2016","unstructured":"Shi W, Dustdar S. The promise of edge computing. Computer. 2016;49(5):78\u201381.","journal-title":"Computer"},{"key":"203_CR51","doi-asserted-by":"publisher","first-page":"2323228","DOI":"10.1155\/2022\/2323228","volume":"2022","author":"S Zhang","year":"2022","unstructured":"Zhang S, Wang S, Bai G, Zhang M, Chen P, Zhao C, Li S, Zhou J. Design of threat response modeling language for attacker profile based on probability distribution. Wirel Commun Mob Comput. 2022;2022:2323228.","journal-title":"Wirel Commun Mob Comput"},{"key":"203_CR52","doi-asserted-by":"crossref","unstructured":"Al-Haija QA, Ishtaiwi A. Multiclass classification of firewall log files using shallow neural network for network security applications. In: Soft computing for security applications. Springer. 2022. p. 27\u201341.","DOI":"10.1007\/978-981-16-5301-8_3"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00203-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00203-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00203-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T20:03:53Z","timestamp":1758744233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00203-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"references-count":52,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["203"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00203-8","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,24]]},"assertion":[{"value":"12 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We acknowledge the ethical implications of deploying deep learning models in real-world IoT environments. While this work is intended solely for research and beneficial applications, we recognize the possibility of both intentional and unintentional misuse of the proposed model. Potential risks include privacy breaches due to data collection, unintended use in surveillance contexts, and vulnerabilities to adversarial attacks. To address these concerns, we recommend adopting privacy-preserving techniques, strict access control measures, and thorough robustness evaluations prior to deployment. Additionally, ensuring fairness and transparency through regular audits and explainability methods is crucial for responsible and trustworthy implementation in sensitive IoT applications.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no Conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"97"}}