{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T14:24:23Z","timestamp":1775831063454,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902203"],"award-info":[{"award-number":["61902203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Plan\u2014Major Scientific and Technological Innovation Projects of Shandong Province","award":["2019JZZY020101"],"award-info":[{"award-number":["2019JZZY020101"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/jiot.2020.3004469","type":"journal-article","created":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T21:40:53Z","timestamp":1593639653000},"page":"6273-6281","source":"Crossref","is-referenced-by-count":102,"title":["Industrial Security Solution for Virtual Reality"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2525-3074","authenticated-orcid":false,"given":"Zhihan","family":"Lv","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dongliang","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ranran","family":"Lou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Solving the security problem of intelligent transportation system with deep learning","author":"lv","year":"2020","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref38","first-page":"431","article-title":"Scalable kernel K-means clustering with Nystr&#x00F6;m approximation: Relative-error bounds","volume":"20","author":"wang","year":"2019","journal-title":"J Mach Learn Res"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/su12062286"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14733\/cadaps.2019.345-357"},{"key":"ref31","first-page":"214","article-title":"Deception detection with spectral features based on deep belief network","volume":"2","author":"xie","year":"2019","journal-title":"Acta Acustica"},{"key":"ref30","first-page":"1","article-title":"Bankruptcy prediction using stacked auto-encoders","volume":"12","author":"soui","year":"2019","journal-title":"Appl Artif Intell"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2018.2796074"},{"key":"ref36","first-page":"11","article-title":"Contribution of virtual reality for lines production&#x2019;s simulation in a lean manufacturing environment","volume":"9","author":"abidi","year":"2016","journal-title":"Simulation"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.02.007"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.094"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2818108"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3110218"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2910810"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2799848"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485206"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2817237"},{"key":"ref22","first-page":"25","article-title":"New intrusion detection system based on support vector domain description with information gain metric","volume":"20","author":"boujnouni","year":"2018","journal-title":"Int J Netw Security"},{"key":"ref21","first-page":"181","article-title":"Design hybrid method for intrusion detection using ensemble cluster classification and SOM network","volume":"2","author":"rathore","year":"2019","journal-title":"Int J Adv Comput Res"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2869107"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodchem.2017.09.019"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1007\/s12559-018-9598-1","article-title":"Multi-view CNN feature aggregation with ELM auto-encoder for 3D shape recognition","volume":"10","author":"yang","year":"2018","journal-title":"Cogn Comput"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-018-1301-6"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00039"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04472-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2018.12370"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21014\/acta_imeko.v7i1.528"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980800"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12008-015-0259-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/740\/1\/012119"},{"key":"ref14","first-page":"75","article-title":"Intrusion detection algorithm for industrial control system of coal mine enterprise","volume":"44","author":"wu","year":"2018","journal-title":"Ind Mine Autom"},{"key":"ref15","first-page":"642","article-title":"Network intrusion detection of industrial control system based on traffic characteristic fingerprint","volume":"52","author":"liu","year":"2019","journal-title":"Eng J Wuhan Univ"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.cose.2019.03.009","article-title":"Abnormal detection method of industrial control system based on behavior model","volume":"84","author":"lai","year":"2019","journal-title":"Comput Security"},{"key":"ref17","first-page":"1089","article-title":"Intrusion detection method for industrial control system with optimized support vector machine and K-means","volume":"39","author":"chen","year":"2019","journal-title":"J Comput Appl"},{"key":"ref18","first-page":"380","article-title":"Intrusion detection for industrial control systems based on an improved SVM method","volume":"58","author":"chen","year":"2018","journal-title":"J Tsinghua Univ"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/IJITWE.2019010104"},{"key":"ref4","first-page":"906","article-title":"System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats","volume":"12","author":"choi","year":"2018","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref3","first-page":"1","article-title":"LimCA: An optimal clustering algorithm for lifetime maximization of Internet of Things","volume":"4","author":"subir","year":"2018","journal-title":"Wireless Netw"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30033-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v6si3.2631"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09762-z"},{"key":"ref7","first-page":"50","article-title":"A reliable IoT-based embedded health care system for diabetic patients","volume":"12","author":"al-odat","year":"2019","journal-title":"Int J Adv Internet Technol"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/10255842.2017.1382901","article-title":"Biomechanical and human behavior assessment using virtual reality to challenge balance and posture for the elderly and patients with Parkinson&#x2019;s disease","volume":"20","author":"muhla","year":"2017","journal-title":"Comput Methods Biomech Biomed Eng"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2941142"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2914339"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2916689"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01452-6"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2942719"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957320"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2019.2944783"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.013"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9398162\/09130693.pdf?arnumber=9130693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:41Z","timestamp":1652194421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9130693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":51,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3004469","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,15]]}}}