{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:42:05Z","timestamp":1763811725618,"version":"3.40.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,20]]},"DOI":"10.1109\/menacomm62946.2025.10911034","type":"proceedings-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T17:31:39Z","timestamp":1741887099000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging A Deep Learning-Based Privacy Compliance Framework For IoT Applications"],"prefix":"10.1109","author":[{"given":"Amna","family":"Eleyan","sequence":"first","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,England"}]},{"given":"Hamza","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,England"}]},{"given":"Tarek","family":"Bejaoui","sequence":"additional","affiliation":[{"name":"University of Carthage,Computer Engineering Department,Tunisia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3344029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.52783\/cana.v31.521"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2820975.2820980"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2018.8422832"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/cns59707.2023.10288797"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563195"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3166631"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4222"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17146-8_29"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109760"},{"article-title":"Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule-based Deep Learning Model","year":"2023","author":"Chakraborty","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1201\/9781003032175-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MysuruCon59703.2023.10397002"},{"issue":"3","key":"ref14","first-page":"12","article-title":"Performance evaluation of deep learning techniques in the detection of IOT malware","volume-title":"Iraqi Journal of Information and Communication Technology","volume":"6","author":"Salim","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA58529.2023.10395098"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6186-0_5"},{"issue":"4","key":"ref17","first-page":"1945","article-title":"Deep learning and machine learning based anomaly detection in internet of things environments","volume":"37","author":"Gokdemir","year":"2022","journal-title":"Journal of the Faculty of Engineering and Architecture of Gazi University"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC58260.2023.10323872"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops59551.2024.10615630"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets61466.2024.10577682"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets55823.2022.9993984"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets61466.2024.10577751"},{"key":"ref23","article-title":"MSC-thesis-proposed-product\/deep_learning_framework_implementation.ipynb at main Hamzaahmed78629\/MSC-thesis-proposed-product","volume-title":"GitHub","author":"Ahmed","year":"2024"}],"event":{"name":"2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM)","start":{"date-parts":[[2025,2,20]]},"location":"Byblos, Lebanon","end":{"date-parts":[[2025,2,22]]}},"container-title":["2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10910941\/10910950\/10911034.pdf?arnumber=10911034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:37:34Z","timestamp":1743035854000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10911034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/menacomm62946.2025.10911034","relation":{},"subject":[],"published":{"date-parts":[[2025,2,20]]}}}