{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T15:20:31Z","timestamp":1776266431244,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001807","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172251"],"award-info":[{"award-number":["62172251"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4222026"],"award-info":[{"award-number":["4222026"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/iwqos57198.2023.10188710","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T17:21:00Z","timestamp":1690478460000},"page":"01-04","source":"Crossref","is-referenced-by-count":6,"title":["GraphIoT: Accurate IoT Identification based on Heterogeneous Graph"],"prefix":"10.1109","author":[{"given":"Linna","family":"Fan","sequence":"first","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology,Wuhan,China"}]},{"given":"Lin","family":"He","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Xiaoqing","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Enhuan","family":"Dong","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Jinlei","family":"Lin","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Guanglei","family":"Song","sequence":"additional","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology,Wuhan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109450"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1804.03852"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110451"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885429"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622243"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761559"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148110"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref12","article-title":"Detection of unauthorized IoT devices using machine learning techniques","author":"Meidan","year":"2017","journal-title":"arXiv preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3321408.3326671"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269044"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990797"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3183118"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"}],"event":{"name":"2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)","location":"Orlando, FL, USA","start":{"date-parts":[[2023,6,19]]},"end":{"date-parts":[[2023,6,21]]}},"container-title":["2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10188660\/10188690\/10188710.pdf?arnumber=10188710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T22:24:48Z","timestamp":1710368688000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10188710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iwqos57198.2023.10188710","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}