{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:53:50Z","timestamp":1774929230483,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008227","name":"North-West University, Mahikeng, South Africa","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008227","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,4,1]]},"DOI":"10.1109\/jiot.2025.3648649","type":"journal-article","created":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T18:27:47Z","timestamp":1766687267000},"page":"14213-14228","source":"Crossref","is-referenced-by-count":2,"title":["Autonomous LLM Agent: A Memory-Augmented, Edge-Optimized SHAP Explanations With Zero-Day Attack Resilience in IoT\/Industrial IoT Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-0707","authenticated-orcid":false,"given":"Yakub Kayode","family":"Saheed","sequence":"first","affiliation":[{"name":"Department of Information Systems, North-West University, Mahikeng, South Africa"}]},{"given":"Joshua Ebere","family":"Chukwuere","sequence":"additional","affiliation":[{"name":"Department of Information Systems, North-West University, Mahikeng, South Africa"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3358871"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2838574"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3034385"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2023.3329249"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3228795"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3127515"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3587255"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3566980"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2953364"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3202914"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10037-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2948888"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3361801"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3011208"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102930"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101252"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2025.200519"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icapai58366.2023.10193917"},{"key":"ref19","first-page":"1","article-title":"IDS-agent: An LLM agent for explainable intrusion detection in IoT networks","volume-title":"Proc. NeurIPS","author":"Li"},{"key":"ref20","article-title":"Agent hospital: A simulacrum of hospital with evolvable medical agents","author":"Li","year":"2024","journal-title":"arXiv:2405.02957"},{"key":"ref21","first-page":"1","article-title":"A real-world WebAgent with planning, long context understanding, and program synthesis","volume-title":"Proc. 12th Int. Conf. Learn. Represent. (ICLR)","author":"G\u00fcr"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.52202\/075280-0377"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.3027543"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11203287"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3100755"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3190352"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3244544"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3369852"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3448505"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3376578"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tgcn.2024.3403102"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123808"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3384374"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3348117"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2025.3528256"},{"key":"ref36","first-page":"1","article-title":"ReAct: Synergizing reasoning and acting in language models","volume-title":"Proc. 11th Int. Conf. Learn. Represent. (ICLR)","author":"Yao"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/encycris59249.2023.00006"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-20523-1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tcbb.2023.3305429"},{"key":"ref40","first-page":"1","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding","volume-title":"Proc. 4th Int. Conf. Learn. Represent. (ICLR)","author":"Han"},{"key":"ref41","article-title":"Cognitive edge computing: A comprehensive survey on optimizing large models and AI agents for pervasive deployment","author":"Wang","year":"2025","journal-title":"arXiv:2501.03265"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3893"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.70044"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901312"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115939"},{"key":"ref46","article-title":"Safeguarding network intrusion detection models from zero-day attacks and concept drift","author":"Matejek","year":"2019","journal-title":"arXiv:2403.10550"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/app12020852"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11456203\/11316132.pdf?arnumber=11316132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:51:46Z","timestamp":1774554706000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11316132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,1]]},"references-count":47,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3648649","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,1]]}}}