{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:03:57Z","timestamp":1771959837949,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796737","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"2088-2097","source":"Crossref","is-referenced-by-count":7,"title":["Landing Reinforcement Learning onto Smart Scanning of The Internet of Things"],"prefix":"10.1109","author":[{"given":"Jian","family":"Qu","sequence":"first","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,MOE Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaobo","family":"Ma","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,MOE Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenmao","family":"Liu","sequence":"additional","affiliation":[{"name":"NSFOCUS Inc.,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongqing","family":"Sang","sequence":"additional","affiliation":[{"name":"NSFOCUS Inc.,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianfeng","family":"Li","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University,Department of Computing,Hong Kong,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lei","family":"Xue","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University,Department of Computing,Hong Kong,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University,Department of Computing,Hong Kong,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhenhua","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University,School of Software,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Feng","sequence":"additional","affiliation":[{"name":"Center of Dependable and Secure Computing (CDSC) of Wuhan Digital Engineering Institute (WDEI),Wuhan,China,430074"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,MOE Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3424214"},{"key":"ref31","article-title":"Identifying Vulnerabilities Using Internet-Wide Scanning Data","author":"o\u2019hare","year":"2019","journal-title":"Proc IEEE ICGS3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5041-1_38"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2131"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2516"},{"key":"ref12","author":"simpson","year":"1994","journal-title":"RFC1661 The Point-to-Point Protocol (PPP)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1332"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987461"},{"key":"ref15","author":"lyon","year":"2009","journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref17","article-title":"Acquisitional rule-based engine for discovering internet-of-things devices","author":"feng","year":"2018","journal-title":"Proc Usenix Security"},{"key":"ref18","article-title":"Reports","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145335"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133963"},{"key":"ref4","article-title":"Zoomeye - Cyberspace Search Engine","year":"2021"},{"key":"ref27","article-title":"ZMap: Fast Internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Proc Usenix Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IT-DREPS.2017.8277814"},{"key":"ref29","article-title":"SD-WAN Internet Census","author":"gordeychik","year":"2018","journal-title":"arXiv preprint arXiv 1808 09074"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155346"},{"key":"ref7","article-title":"Inferring and investigating IoT-generated scanning campaigns targeting a large network telescope","author":"torabi","year":"2020","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref2","article-title":"Censys","year":"2021"},{"key":"ref9","article-title":"Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting","author":"ma","year":"2021","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"ref1","article-title":"The search engine for the Internet of Things","author":"shodan","year":"2021"},{"key":"ref20","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987486"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/widm.53"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"ref23","article-title":"Fast internet-wide scanning: A new security perspective","author":"durumeric","year":"2017","journal-title":"Ph D Dissertation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993960"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1262"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796737.pdf?arnumber=9796737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:46:39Z","timestamp":1658177199000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796737","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}