{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:00:00Z","timestamp":1776121200665,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Polish Ministry of Science and Higher Education with the Subvention Funds of the Faculty of Computer Science, Electronics, and Telecommunications of AGH University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3651992","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:02:28Z","timestamp":1768255348000},"page":"7582-7599","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning for Wi-Fi Intrusion Detection: A Comparative Study of Accuracy, Explainability, and Adversarial Robustness"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9187-0492","authenticated-orcid":false,"given":"Anna","family":"Ledwo\u0144","sequence":"first","affiliation":[{"name":"Institute of Telecommunications, AGH University of Krakow, Krak&#x00F3;w, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8230-773X","authenticated-orcid":false,"given":"Marek","family":"Natkaniec","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, AGH University of Krakow, Krak&#x00F3;w, Poland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2018.8567781"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548315"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746576"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019973"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9345293"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICITRI56423.2022.9970221"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183597"},{"issue":"12","key":"ref10","doi-asserted-by":"crossref","first-page":"5507","DOI":"10.3390\/s23125507","article-title":"Wireless local area networks threat detection using 1D-CNN","volume":"23","author":"Natkaniec","year":"2023","journal-title":"Sensors"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03516-0"},{"issue":"11","key":"ref12","doi-asserted-by":"crossref","first-page":"2355","DOI":"10.3390\/electronics12112355","article-title":"Rule-based system with machine learning support for detecting anomalies in 5G WLANs","volume":"12","author":"Uszko","year":"2023","journal-title":"Electronics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00886-w"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit63408.2025.11037121"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref16","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Lundberg"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP64064.2024.10710835"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2008.ECP.51"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMITCon.2019.8862451"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2012.6511281"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CAC51589.2020.9326711"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITME.2015.29"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECT61758.2024.10739058"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IRASET48871.2020.9092094"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940217"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89010-0_13"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence52989.2022.9734174"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35314-7_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC58260.2023.10323642"},{"key":"ref31","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Goodfellow"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0306747"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11340615.pdf?arnumber=11340615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:55:55Z","timestamp":1768856155000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11340615\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3651992","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}