{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:24:13Z","timestamp":1771957453044,"version":"3.50.1"},"reference-count":245,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Embry-Riddle Aeronautical University\u2019s Faculty Innovative Research in Science and Technology (FIRST) Program"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1956193"],"award-info":[{"award-number":["1956193"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/jiot.2021.3099028","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T20:47:40Z","timestamp":1626900460000},"page":"298-320","source":"Crossref","is-referenced-by-count":154,"title":["Machine Learning for the Detection and Identification of Internet of Things Devices: A Survey"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4527-8623","authenticated-orcid":false,"given":"Yongxin","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6043-6971","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2208-962X","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1069-9236","authenticated-orcid":false,"given":"Shuteng","family":"Niu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42559-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2529723"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9781119226444"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2329462"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3892-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC50635.2020.9391561"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3090265"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/c2018-0-00208-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00114"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS50378.2020.9222986"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/9781119226079"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.05.002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875240"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4300-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3036232"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0007583306150622"},{"key":"ref20","first-page":"129","article-title":"Aviation navigation systems security: ADS-B, GPS, IFF","volume-title":"Proc. Int. Conf. Security Manage. (SAM)","author":"Pollack"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.10.002"},{"key":"ref22","first-page":"17","article-title":"Vulnerabilities of the automatic identification system in the era of maritime autonomous surface ships","volume-title":"Proc. 9th NMIOTC Annu. Conf. Fostering Projection Stability Through Maritime Security Achieving Enhanced Capab. Oper. Effectiveness","author":"Dimitrios"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS-Genova.2015.7271729"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8406-6_66"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924410"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2552146"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.038"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2020.9200889"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref31","volume-title":"An Open-Access Book About Decoding Mode-S and ADS-B Data","author":"Sun","year":"2017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS.2005.1639983"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2927379"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2694487"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"ref38","article-title":"Physical-layer identification of wireless sensor nodes","volume":"604","author":"Danev","year":"2012"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2105-8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139938"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988408"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0097-0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2901578"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851207"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2997475"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ITAP.2011.6006157"},{"key":"ref51","volume-title":"IoT behavioral monitoring via network traffic analysis","author":"Sivanathan","year":"2020"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"ref56","volume-title":"Detection of unauthorized IoT devices using machine learning techniques","author":"Meidan","year":"2017"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761559"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971213"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8520"},{"key":"ref60","volume-title":"IoT Device Profiles, Attack Traces and Traffic Traces","author":"Hassan","year":"2020"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2997898"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614892"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03156-5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57805-3_8"},{"key":"ref65","volume-title":"Software Radio Technologies: Selected Readings","author":"Zvonar","year":"2001"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464778"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2017.7946820"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196521"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2016.7752534"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838071"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2950670"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0076"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680487"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.49"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561902"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.11.002"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415804"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001819"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802783"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2443794"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896696"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5264526"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904657"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911452"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923325"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1201\/b10370"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326503"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.2991\/ifmeita-17.2018.51"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2016.7754560"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685569"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737597"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590321"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CIET.2018.8660937"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917870"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485917"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737455"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700144"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2994374.2994377"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2643614.2643620"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557792"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933242"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS50378.2020.9223013"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/EMC-B.2017.8260381"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400426"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433156"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1286"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2016.7925027"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2013.0865"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2855665"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIT.2017.8388905"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/CISP-BMEI.2016.7852896"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.05.002"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2018.8631693"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1142\/IMS"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2017.8393011"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2006.1761"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2162949"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939936"},{"key":"ref125","volume-title":"Deep complex networks for protocol-agnostic radio frequency device fingerprinting in the wild","author":"Agadakos","year":"2019"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911347"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800153"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3696-8"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.88.174102"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13824"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25748-4_6"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2019.104313"},{"key":"ref134","volume-title":"Genesys Lab MLDatasets","author":"Kaushik","year":"2020"},{"key":"ref135","volume-title":"A 24-Hour Signal Recording Dataset With Labels for Cybersecurity and IoT","author":"Liu","year":"2020"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.6229"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2948919"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013154"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2017.8076528"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935823"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2020.104643"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3018677"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59016-1_28"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.3390\/s18113913"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178320"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.06.011"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935684"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935862"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343192"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599847"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599826"},{"key":"ref152","first-page":"2546","article-title":"Algorithms for hyper-parameter optimization","volume-title":"Advances in Neural Information Processing Systems","author":"Bergstra","year":"2011"},{"key":"ref153","first-page":"525","article-title":"BOA: The Bayesian optimization algorithm","volume-title":"Proc. 1st Annu. Genet. Evol. Comput. Conf. (GECCO)","volume":"1","author":"Pelikan"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/2834892.2834896"},{"key":"ref155","volume-title":"Neural architecture search: A survey","author":"Elsken","year":"2018"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.038"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2019.00209"},{"key":"ref158","volume-title":"Literature on Neural Architecture Search","author":"Lindauer","year":"2020"},{"key":"ref159","volume-title":"Awesome-NAS: A Curated List of Neural Architecture Search (NAS) Resources","author":"Dong","year":"2020"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2006.247281"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2008724"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2001.976448"},{"key":"ref163","first-page":"2270","article-title":"Learning the number of neurons in deep networks","volume-title":"Advances in Neural Information Processing Systems","author":"Alvarez","year":"2016"},{"key":"ref164","first-page":"1379","article-title":"Dynamic network surgery for efficient DNNs","volume-title":"Advances in Neural Information Processing Systems","author":"Guo","year":"2016"},{"key":"ref165","first-page":"1135","article-title":"Learning both weights and connections for efficient neural network","volume-title":"Advances in Neural Information Processing Systems","author":"Han","year":"2015"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2003.813832"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2007.08.026"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(02)00597-0"},{"key":"ref169","first-page":"874","article-title":"AdaNet: Adaptive structural learning of artificial neural networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn. Vol. 70","author":"Cortes"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_2"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004508"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1162\/106365602320169811"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1145\/3321707.3321721"},{"key":"ref174","volume-title":"Designing neural network architectures using reinforcement learning","author":"Baker","year":"2016"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref176","volume-title":"MONAS: Multi-objective neural architecture search using reinforcement learning","author":"Hsu","year":"2018"},{"key":"ref177","volume-title":"DARTS: Differentiable architecture search","author":"Liu","year":"2018"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00138"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00186"},{"key":"ref180","volume-title":"NAS-bench-101: Towards reproducible neural architecture search","author":"Ying","year":"2019"},{"key":"ref181","volume-title":"NAS-bench-102: Extending the scope of reproducible neural architecture search","author":"Dong","year":"2020"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2018.2880457"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.256"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.173"},{"key":"ref185","volume-title":"Explainable Artificial Intelligence (XAI)","volume":"2","author":"Gunning","year":"2017"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3054609"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.01.012"},{"key":"ref189","first-page":"2990","article-title":"Continual learning with deep generative replay","volume-title":"Advances in Neural Information Processing Systems","author":"Shin","year":"2017"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1995.7.2.219"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"ref192","volume-title":"Lifelong learning with dynamically expandable networks","author":"Yoon","year":"2017"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078407"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078407"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078407"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2183771"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984030"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990797"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2019.00-49"},{"key":"ref201","first-page":"1696","article-title":"Detecting malicious ADS-B transmitters using a low-bandwidth sensor network","volume-title":"Proc. 18th Int. Conf. Inf. Fusion (Fusion)","author":"Monteiro"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.248"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2014.6846743"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905750"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090308"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9564-7"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2685564"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2015.7343893"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2438171"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2015.7311579"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"ref213","first-page":"727","article-title":"X-means: Extending k-means with efficient estimation of the number of clusters","volume-title":"Proc. Int. Conf. Mech. Learn. (ICML)","volume":"1","author":"Pelleg"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024425"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2433898"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383884"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212495"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422402"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958946"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-cn-3020.00044"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2650206"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2012.6253092"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403654"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2018.8610471"},{"key":"ref230","volume-title":"Deep predictive coding networks for video prediction and unsupervised learning","author":"Lotter","year":"2016"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.3390\/data5010018"},{"key":"ref232","volume-title":"ADS-B Signals Records for Non-Cryptographic Identification and Incremental Learning","author":"Liu","year":"2021"},{"key":"ref233","volume-title":"Drone Remote Controller RF Signal Dataset","author":"Ezuma","year":"2020"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.3390\/data5020055"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322561"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348261"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3042128"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2949308"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000180"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00108"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081354"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2020.3015537"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3329695"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/9659828\/9492269-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9659828\/09492269.pdf?arnumber=9492269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:00:13Z","timestamp":1705014013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9492269\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":245,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3099028","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}