{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T12:16:18Z","timestamp":1774268178463,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162018"],"award-info":[{"award-number":["62162018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24A20248"],"award-info":[{"award-number":["U24A20248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"publisher","award":["2024GXNSFDA010067"],"award-info":[{"award-number":["2024GXNSFDA010067"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012165","name":"Guangxi Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["AB25069157"],"award-info":[{"award-number":["AB25069157"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/jiot.2025.3616339","type":"journal-article","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T17:40:10Z","timestamp":1759340410000},"page":"53441-53457","source":"Crossref","is-referenced-by-count":1,"title":["MRMamba: Multi-Resolution State-Space Modeling for Robust Multisensor Traffic Attack Detection in Wireless Sensor Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2138-5740","authenticated-orcid":false,"given":"Siyuan","family":"Liu","sequence":"first","affiliation":[{"name":"Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3020-2896","authenticated-orcid":false,"given":"Qian","family":"He","sequence":"additional","affiliation":[{"name":"Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China"}]},{"given":"Yiting","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangxi University Engineering Research Center of Cloud Network Convergence and Data Security, Guilin University of Electronic Technology, Guilin, China"}]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Central South University, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3433011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3556980"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3459921"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103991"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3706583"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3053543"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122045"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.024"},{"key":"ref9","article-title":"Mamba: Linear-time sequence modeling with selective state spaces","author":"Gu","year":"2023","journal-title":"arXiv:2312.00752"},{"key":"ref10","article-title":"Visual mamba: A survey and new outlooks","author":"Xu","year":"2024","journal-title":"arXiv:2404.18861"},{"key":"ref11","first-page":"27440","article-title":"MambaLLIE: Implicit Retinex-aware low light enhancement with global-then-local state space","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"37","author":"Weng"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.02619"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.12.019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24271-8_56"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00196"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-72775-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112473"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85383-9_9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref22","article-title":"Longformer: The long-document transformer","author":"Beltagy","year":"2020","journal-title":"arXiv:2004.05150"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00353"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3530811"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313747"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100568"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130667"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-74214-w"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2024.2321381"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-01001-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103079"},{"key":"ref33","article-title":"Mamba meets financial markets: A graph-mamba approach for stock price prediction","author":"Mehrabian","year":"2024","journal-title":"arXiv:2410.03707"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2025.116881"},{"key":"ref35","article-title":"ISMRNN: An implicitly segmented RNN method with mamba for long-term time series forecasting","author":"Zhao","year":"2024","journal-title":"arXiv:2407.10768"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2025.3541353"},{"key":"ref37","first-page":"71162","article-title":"MambaAD: Exploring state space models for multi-class unsupervised anomaly detection","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"37","author":"He"},{"key":"ref38","article-title":"Mamba in vision: A comprehensive survey of techniques and applications","author":"Maklachur Rahman","year":"2024","journal-title":"arXiv:2410.03105"},{"key":"ref39","article-title":"A survey on vision mamba: Models, applications and challenges","author":"Xu","year":"2024","journal-title":"arXiv:2404.18861"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jiixd.2024.09.001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3522863"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101351","article-title":"CiCIoMT2024: Attack vectors in healthcare devices\u2014A multi-protocol dataset for assessing IoMT device security","volume":"28","author":"Dadkhah","year":"Dec. 2024","journal-title":"Internet Things"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101209"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3102110"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3303271"},{"key":"ref49","first-page":"19407","article-title":"Prototype-oriented unsupervised anomaly detection for multivariate time series","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2751"},{"key":"ref51","article-title":"Adaptive NAD: Online and self-adaptive unsupervised network anomaly detector","author":"Yuan","year":"2024","journal-title":"arXiv:2410.22967"},{"key":"ref52","article-title":"MambaPEFT: Exploring parameter-efficient fine-tuning for mamba","author":"Yoshimura","year":"2024","journal-title":"arXiv:2411.03855"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/208"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159580"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3270293"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3319532"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11293846\/11186505.pdf?arnumber=11186505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T18:49:03Z","timestamp":1765478943000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11186505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":56,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3616339","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,15]]}}}