{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:37:30Z","timestamp":1776785850688,"version":"3.51.2"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LZ22F020002"],"award-info":[{"award-number":["LZ22F020002"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Huzhou Science and Technology Planning Foundation","award":["2023GZ04"],"award-info":[{"award-number":["2023GZ04"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,4,1]]},"DOI":"10.1109\/jiot.2023.3333903","type":"journal-article","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T19:31:40Z","timestamp":1700508700000},"page":"12536-12550","source":"Crossref","is-referenced-by-count":57,"title":["Deep <i>Q<\/i>-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things"],"prefix":"10.1109","volume":"11","author":[{"given":"Shoujian","family":"Yu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rong","family":"Zhai","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3769-7193","authenticated-orcid":false,"given":"Yizhou","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6464-0208","authenticated-orcid":false,"given":"Guowen","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3607-0177","authenticated-orcid":false,"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7558-5379","authenticated-orcid":false,"given":"Shigen","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Huzhou University, Huzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3222911"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3307956"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3277541"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103608"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103140"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2023.104775"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105465"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2973992"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037500"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110035"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC53980.2022.9897058"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3083422"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00114"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120192"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3258916"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2023.02.008"},{"issue":"3","key":"ref19","first-page":"223","article-title":"Deep learning enabled privacy preserving techniques for intrusion detection systems in the Industrial Internet of Things","volume":"52","author":"Kavitha","year":"2022","journal-title":"Ad Hoc Sensor Wireless Netw."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802785"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107132"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04152-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2873125"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3001017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3107783"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866319"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3080081"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.131.2200477"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2023.9010050"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2878570"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.013"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet51028.2020.9335796"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3004312"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2017.7943467"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.000-3"},{"key":"ref38","first-page":"1","article-title":"RaPP: Novelty detection with reconstruction along projection pathway","volume-title":"Proc. Int. Conf. Learn. Rep.","author":"Kim"},{"key":"ref39","first-page":"1","article-title":"Auto-encoding variational Bayes","volume-title":"Proc. ICLR","author":"Welling"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3199471"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16848"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10479190\/10323294.pdf?arnumber=10323294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T20:36:08Z","timestamp":1711658168000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,1]]},"references-count":41,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3333903","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,1]]}}}