{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T19:10:22Z","timestamp":1765480222507,"version":"3.48.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Scientific Research Project of the Hunan Education Department","award":["62572494"],"award-info":[{"award-number":["62572494"]}]},{"name":"Scientific Research Project of the Hunan Education Department","award":["U22B2005"],"award-info":[{"award-number":["U22B2005"]}]},{"name":"Horizontal Project-Development of an Intelligent Detection System for Electronic Ceramic Defects Based on Causal Deep Learning Technology","award":["38024118"],"award-info":[{"award-number":["38024118"]}]},{"name":"2024 Project of Loudi City Philosophy and Social Science Achievements Evaluation Committee","award":["202422B"],"award-info":[{"award-number":["202422B"]}]},{"name":"High Performance Computing Center of Central South University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/jiot.2025.3613994","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T17:34:22Z","timestamp":1758735262000},"page":"52820-52836","source":"Crossref","is-referenced-by-count":1,"title":["Causal Gray Wolf Optimization: A Novel Approach to Robust Network Anomaly Detection Amidst Data Redundancy"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5329-0713","authenticated-orcid":false,"given":"Zengri","family":"Zeng","sequence":"first","affiliation":[{"name":"School of Information, Science and Technology, Hunan University of Humanities, Loudi, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2740-8025","authenticated-orcid":false,"given":"Xiaoheng","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Electronic Information, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9200-9018","authenticated-orcid":false,"given":"Baokang","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information, Science and Technology, Hunan University of Humanities, Loudi, Hunan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106926"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103644"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110598"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3532885"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-020-00995-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC49089.2020.9215232"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3512531"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3561057"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991258"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101645"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/info14030191"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116822"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2009.67"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.05.048"},{"issue":"4","key":"ref16","first-page":"1","article-title":"An improved intrusion detection system using machine learning with singular value decomposition and principal component analysis","volume":"16","author":"Al Hasan","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107894"},{"key":"ref18","article-title":"Causal inference","author":"Pearl","year":"2010","journal-title":"Causality: Objectives and Assessment"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3193099"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3355433"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s22165986"},{"key":"ref22","article-title":"Stability evaluation via distributional perturbation analysis","author":"Blanchet","year":"2024","journal-title":"arXiv:2405.03198"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2734102"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220082"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12268"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1257\/jel.20191597"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.30988\/jmil.v7i2.1223"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3330490"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-020-00424-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cgh.2023.08.042"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.32996\/jcsts.2024.6.1.6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3359998"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02205-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00986-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3001017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11665-024-09223-x"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014929"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-10059-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-232228"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.13053\/cys-29-1-5528"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3224023"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11293846\/11177193.pdf?arnumber=11177193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T18:49:21Z","timestamp":1765478961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11177193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":43,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3613994","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2025,12,15]]}}}