{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T20:01:32Z","timestamp":1772913692915,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Foundation of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072273"],"award-info":[{"award-number":["62072273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Foundation of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962009"],"award-info":[{"award-number":["61962009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["GCIS202112"],"award-info":[{"award-number":["GCIS202112"]}]},{"name":"Cloud Technology Endowed Professorship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,1]]},"DOI":"10.1109\/jiot.2024.3367689","type":"journal-article","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T18:59:33Z","timestamp":1708455573000},"page":"19564-19574","source":"Crossref","is-referenced-by-count":8,"title":["A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1524-2064","authenticated-orcid":false,"given":"Yilei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1397-1215","authenticated-orcid":false,"given":"Chunmei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8729-830X","authenticated-orcid":false,"given":"Yiting","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao, China"}]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7165-398X","authenticated-orcid":false,"given":"Jianting","family":"Ning","sequence":"additional","affiliation":[{"name":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6784-0221","authenticated-orcid":false,"given":"Keke","family":"Gai","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2800904"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3088539"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026493"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/int.22375"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.093"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3268668"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354203"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/int.22428"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/int.22270"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47751-5_9"},{"key":"ref16","first-page":"12","article-title":"Eclipse attacks on Bitcoin\u2019s peer-to-peer network","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Heilman"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355471"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_1"},{"key":"ref19","article-title":"Pay-To-Win: Incentive attacks on proof-of-work cryptocurrencies","author":"Judmayer","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_12"},{"key":"ref21","article-title":"Zeroblock: Timestamp-free prevention of block-withholding attack in Bitcoin","author":"Solat","year":"2016","journal-title":"arXiv:1605.02435"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-019-00746-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24188"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5959698"},{"key":"ref26","first-page":"874","article-title":"AdaNet: Adaptive structural learning of artificial neural networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Cortes"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref28","article-title":"Gradient boosting neural networks: GrowNet","author":"Badirli","year":"2020","journal-title":"arXiv:2002.07971"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3234895"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3275736"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3202696"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623588"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073414"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3050034"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3151083"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047365"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/int.22656"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960027"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3063710"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423365"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417290"},{"key":"ref43","first-page":"1401","article-title":"A brief introduction to boosting","volume-title":"Proc. 16th Int. Joint Conf. Artif. Intell.","author":"Schapire"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10536937\/10440450.pdf?arnumber=10440450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T04:49:57Z","timestamp":1716439797000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10440450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,1]]},"references-count":43,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3367689","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,1]]}}}