{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T21:56:29Z","timestamp":1772315789830,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3528341","type":"journal-article","created":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T20:47:04Z","timestamp":1736542024000},"page":"13711-13730","source":"Crossref","is-referenced-by-count":19,"title":["Intrusion Detection for Wireless Sensor Network Using Particle Swarm Optimization Based Explainable Ensemble Machine Learning Approach"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4358-2939","authenticated-orcid":false,"given":"Shaikh","family":"Afnan Birahim","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Glasgow, Glasgow, U.K."}]},{"given":"Avijit","family":"Paul","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}]},{"given":"Fahmida","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, International Islamic University Chittagong, Chittagong, Bangladesh"}]},{"given":"Yamina","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, International Islamic University Chittagong, Chittagong, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0757-5523","authenticated-orcid":false,"given":"Tonmoy","family":"Roy","sequence":"additional","affiliation":[{"name":"Department of Data Analytics and Information Systems, Utah State University, Logan, UT, USA"}]},{"given":"Mohammad","family":"Asif Hasan","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8886-4943","authenticated-orcid":false,"given":"Fariha","family":"Haque","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0744-8206","authenticated-orcid":false,"given":"Muhammad E. H.","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Qatar University, Doha, Qatar"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00692-w"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BMEI.2013.6747027"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07776-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/technologies12040056"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2358-6_53"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3202807"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024219"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102930"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/en16052487"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120437"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD56103.2022.9980630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.12.064"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s19010203"},{"issue":"2","key":"ref14","first-page":"18","article-title":"Deep learning perspectives to detecting intrusions in wireless sensor networks","volume":"11","author":"Abhale","year":"2023","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"issue":"3","key":"ref15","first-page":"285","article-title":"An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs)","volume":"10","author":"Hemanand","year":"2022","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v11.i2.pp504-515"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S1469026820500182"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06473-y"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00870-w"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2023.2246703"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3303113"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-50554-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s22041407"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s23084073"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s24113339"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75078-7_44"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2012.6409128"},{"key":"ref28","article-title":"Label encoding for regression networks","author":"Shah","year":"2022","journal-title":"arXiv:2212.01927"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.37385\/jaets.v5i1.3080"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11192"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.076"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00833-z"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-20181-5_25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/BF01753239"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/01605682.2020.1865846"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6546-8_3"},{"issue":"9","key":"ref38","first-page":"483","article-title":"Intrusion detection in WSN using supervised machine learning techniques","volume":"12","author":"Jeevaraj","year":"2023","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.32985\/ijeces.14.2.7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8111-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4731953"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10836702.pdf?arnumber=10836702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T06:45:48Z","timestamp":1738910748000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10836702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3528341","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}