{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:48:35Z","timestamp":1775746115141,"version":"3.50.1"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"20","license":[{"start":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T00:00:00Z","timestamp":1697328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T00:00:00Z","timestamp":1697328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T00:00:00Z","timestamp":1697328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Shenzhen Colleges and Universities Stable Support Program","award":["GXWD20220817124251002"],"award-info":[{"award-number":["GXWD20220817124251002"]}]},{"DOI":"10.13039\/501100001809","name":"Joint Funds of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2036"],"award-info":[{"award-number":["U22A2036"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["HIT.OCEF.2021007"],"award-info":[{"award-number":["HIT.OCEF.2021007"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Research and Development Foundation","award":["JCYJ20190806143418198"],"award-info":[{"award-number":["JCYJ20190806143418198"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,10,15]]},"DOI":"10.1109\/jiot.2023.3279615","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T17:45:37Z","timestamp":1684950337000},"page":"17934-17948","source":"Crossref","is-referenced-by-count":20,"title":["A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8922-0496","authenticated-orcid":false,"given":"Yuming","family":"Feng","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4783-876X","authenticated-orcid":false,"given":"Weizhe","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"}]},{"given":"Shujun","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"}]},{"given":"Hao","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iSES54909.2022.00031"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops51409.2021.9431086"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3049942"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2790382"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref1","first-page":"494","article-title":"Internet of Things: Applications, adoptions and components&#x2014;A conceptual overview","author":"yunana","year":"2020","journal-title":"Proc Int Conf Hybrid Intell Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2973176"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993782"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102942"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106738"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3073714"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3102971"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2022.07.013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMA53594.2021.00011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS47819.2019.9118052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990862"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s20030816"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538636"},{"key":"ref3","first-page":"1093","article-title":"Understanding the Mirai botnet","author":"antonakakis","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref6","article-title":"Q3 2018 threat report: Distributed denial of service (DDoS)","year":"2019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s21092985"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10269651\/10133833.pdf?arnumber=10133833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T20:12:32Z","timestamp":1704917552000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,15]]},"references-count":25,"journal-issue":{"issue":"20"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3279615","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,15]]}}}