{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:20:35Z","timestamp":1766269235937,"version":"3.33.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,18]]},"DOI":"10.1109\/ic3i61595.2024.10829306","type":"proceedings-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:34:30Z","timestamp":1736969670000},"page":"1700-1706","source":"Crossref","is-referenced-by-count":1,"title":["Advanced Deep Learning Approaches for Real-Time Anomaly Detection in IoT Environments"],"prefix":"10.1109","author":[{"given":"Himanshu Rai","family":"Goyal","sequence":"first","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science &#x0026; Engineering,Dehradun"}]},{"given":"Saif O.","family":"Husain","sequence":"additional","affiliation":[{"name":"The Islamic university,College of technical engineering,Department of computers Techniques engineering,Najaf,Iraq"}]},{"given":"Krishna Kant","family":"Dixit","sequence":"additional","affiliation":[{"name":"GLA University,Department of Electrical Engineering,Mathura,India"}]},{"given":"Nandini Shirish","family":"Boob","sequence":"additional","affiliation":[{"name":"Saveetha Institute of Medical and Technical Sciences,Saveetha School of Engineering,Chennai,Tamilnadu"}]},{"given":"B. Ravali","family":"Reddy","sequence":"additional","affiliation":[{"name":"MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,Telangana"}]},{"given":"Jaysheel","family":"Kumar","sequence":"additional","affiliation":[{"name":"New Horizon College of Engineering,Bangalore"}]},{"given":"Smita","family":"Sharma","sequence":"additional","affiliation":[{"name":"Amity University,Amity School of Engineering &#x0026; Technology,Greater Noida,Uttar Pradesh,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ablaze.2015.7154980"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853192"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/iciptm52218.2021.9388365"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853071"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853047"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I56241.2022.10073224"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I56241.2022.10072699"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM51511.2021.9445392"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM51511.2021.9445307"},{"volume-title":"Copy-move Forgery Detection using SIFT and DWT detection Techniques, 2022 3rd International Conference on Intelligent Engineering and Management","author":"Singh","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I56241.2022.10072763"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9952-8_46"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/2516-1075\/ad17d5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.06.226"},{"issue":"3s","key":"ref15","first-page":"48","article-title":"Sustainable Implementation of Artificial Intelligence Based Decision Support System for Irrigation Projects in the Development of Rural Settlements","volume":"12","author":"William","year":"2023","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"issue":"5s","key":"ref16","first-page":"113","article-title":"Energy-Efficient Resource Allocation and Relay-Selection for Wireless Sensor Networks","volume":"12","author":"D. R","year":"2023","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"issue":"8s","key":"ref17","first-page":"81","article-title":"Data Reduction Techniques in Wireless Sensor Networks with Internet of Things","volume":"12","author":"Venkatesh","year":"2023","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ic3i59117.2023.10397626"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ic3i59117.2023.10397700"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/iccakm58659.2023.10449560"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/iccakm58659.2023.10449624"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/iccakm58659.2023.10449493"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iccakm58659.2023.10449534"},{"key":"ref24","article-title":"Edge Cloud Server Deployment with Machine Learning for 6G Internet of Things","volume":"12","author":"Nayak","year":"2024","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"key":"ref25","article-title":"Energy-Efficient Bio-Inspired Hybrid Deep Learning Model for Network Intrusion Detection Based on Intelligent Decision Making","volume":"12","author":"Hegde","year":"2024","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"issue":"4","key":"ref26","first-page":"1123","article-title":"CNNs for Anomaly Detection in IoT Systems","volume":"32","author":"Wang","year":"2021","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref27","first-page":"34567","article-title":"A CNN-Based Approach to IoT Anomaly Detection","volume":"10","author":"Chen","year":"2022","journal-title":"IEEE Access"},{"issue":"2","key":"ref28","first-page":"7885","article-title":"LSTM for Temporal Anomaly Detection in IoT Systems","volume":"25","author":"Zhang","year":"2021","journal-title":"Journal of Internet Technology"},{"issue":"6","key":"ref29","first-page":"873","article-title":"Real-Time IoT Anomaly Detection Using LSTMs","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"ref30","first-page":"1234","article-title":"Autoencoders for Unsupervised IoT Anomaly Detection","volume":"20","author":"Lin","year":"2020","journal-title":"IEEE Sensors Journal"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icaiihi57871.2023.10488962"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0739-4_60"},{"issue":"14s","key":"ref33","first-page":"388","article-title":"Unveiling Market Dynamics through Machine Learning: Strategic Insights and Analysis","volume":"12","year":"2024","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"issue":"1","key":"ref34","first-page":"302","article-title":"Improved convolutional neural network based sign language recognition","volume-title":"International Journal of Advanced Science and Technology","volume":"27","author":"Swarnkar"},{"issue":"1","key":"ref35","first-page":"234","article-title":"Model Compression Techniques for IoT Devices","volume":"33","author":"Gupta","year":"2022","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref36","first-page":"43567","article-title":"Challenges in Unsupervised Learning for IoT Anomaly Detection","volume":"8","author":"Ahmed","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"ref37","first-page":"768","article-title":"Online Learning for IoT Anomaly Detection","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"ref38","first-page":"456467","article-title":"Blockchain for Secure IoT Anomaly Detection","volume":"16","author":"Sun","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"ref39","first-page":"987","article-title":"Interpretable Deep Learning Models for IoT Anomaly Detection","volume":"32","author":"Li","year":"2021","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202345301041"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/upcon59197.2023.10434325"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/iciptm54933.2022.9754057"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2024.3410317"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ic3i59117.2023.10397788"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IC3SE62002.2024.10593213"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IC3SE62002.2024.10592949"}],"event":{"name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2024,9,18]]},"location":"Greater Noida, India","end":{"date-parts":[[2024,9,20]]}},"container-title":["2024 7th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10828566\/10827843\/10829306.pdf?arnumber=10829306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T06:02:48Z","timestamp":1737007368000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10829306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/ic3i61595.2024.10829306","relation":{},"subject":[],"published":{"date-parts":[[2024,9,18]]}}}