{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:57:14Z","timestamp":1771473434254,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/icc40277.2020.9148632","type":"proceedings-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T22:26:45Z","timestamp":1595888805000},"page":"1-6","source":"Crossref","is-referenced-by-count":35,"title":["Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing"],"prefix":"10.1109","author":[{"given":"Danni","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Linjie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2016","journal-title":"WiFi Network Security Statistics\/Graph"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254021"},{"key":"ref12","article-title":"Internet of things research study","author":"enterprise","year":"2015","journal-title":"Internet of things research study"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546162"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.64"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.07.011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65172-9_19"},{"key":"ref19","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700790"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2017.7994968"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2013.6581037"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997467"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700168"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","article-title":"Data augmentation by pairing samples for images classification","author":"inoue","year":"2018","journal-title":"arXiv preprint arXiv 1801 02929"},{"key":"ref22","first-page":"2642","article-title":"Conditional image synthesis with auxiliary classifier gans","author":"odena","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning-Volume 70"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-016-0094-0"},{"key":"ref24","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"radford","year":"2015","journal-title":"arXiv preprint arXiv 1511 06434"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2017.8190421"},{"key":"ref25","first-page":"30","article-title":"Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques","author":"koroniotis","year":"2017","journal-title":"International Conf on Mobile Networks and Management"}],"event":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","location":"Dublin, Ireland","start":{"date-parts":[[2020,6,7]]},"end":{"date-parts":[[2020,6,11]]}},"container-title":["ICC 2020 - 2020 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9141367\/9148588\/09148632.pdf?arnumber=9148632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:25:04Z","timestamp":1656375904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9148632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icc40277.2020.9148632","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}