{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:53:13Z","timestamp":1774644793975,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173101"],"award-info":[{"award-number":["62173101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education","doi-asserted-by":"publisher","award":["2024ZD018"],"award-info":[{"award-number":["2024ZD018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3122025054"],"award-info":[{"award-number":["3122025054"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2026.3651524","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:00:29Z","timestamp":1768255229000},"page":"2368-2382","source":"Crossref","is-referenced-by-count":0,"title":["Auto-EAD: An Automated Ensemble Anomaly Detection Framework for the CEN-IoT"],"prefix":"10.1109","volume":"72","author":[{"given":"Lei","family":"Ding","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6022-5381","authenticated-orcid":false,"given":"Wenli","family":"Shang","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6437-021X","authenticated-orcid":false,"given":"Shuang","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Science, Technology and Innovation, Civil Aviation University of China, Tianjin, China"}]},{"given":"Haoran","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5701-3465","authenticated-orcid":false,"given":"Lianhai","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3445629"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3245659"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3409391"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2929453"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3220752"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3526160"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3050503"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101446"},{"issue":"1","key":"ref9","first-page":"66","article-title":"Lightweight IoT intrusion detection method based on feature selection","volume":"23","author":"Xiangyu","year":"2023","journal-title":"Netinfo Secur."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3277856"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/fi14030089"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3349543"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2710312"},{"issue":"2","key":"ref14","first-page":"32","article-title":"Security protection scheme of power IoT based on SDP","volume":"22","author":"Kehe","year":"2022","journal-title":"Netinfo Secur."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104130"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3447532"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112614"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109942"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3366424.3383530"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-022-00309-0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.111146"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027736"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111928"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3233\/NICSP220033"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3337876"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i3.27963"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03439-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3190432"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.040"},{"key":"ref30","article-title":"X hacking: The threat of misguided AutoML","author":"Sharma","year":"2024","journal-title":"arXiv:2401.08513"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110724"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112633"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10726-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108474"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3051276"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3067763"},{"key":"ref37","first-page":"19705","article-title":"Pipeline combinators for gradual automl","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Baudart"},{"issue":"261","key":"ref38","first-page":"1","article-title":"Auto-Sklearn 2.0: Hands-free automl via meta-learning","volume":"23","author":"Feurer","year":"2022","journal-title":"J. Mach. Learn. Res."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3129793"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3689933.3690833"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2024.100718"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101853"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3090936"},{"key":"ref44","article-title":"Meta-learning for unsupervised outlier detection with optimal transport","author":"Singh","year":"2022","journal-title":"arXiv:2211.00372"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.10.036"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671571"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2025.3547764"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102861"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120596"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119030"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102289"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17109"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104210"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-82349-7_29"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01843-0"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/s21196432"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3509459"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11203315"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110433"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3279927"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116913"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102585"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2977872"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761115"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.08.011"},{"key":"ref67","article-title":"Topology adaptive graph convolutional networks","author":"Du","year":"2017","journal-title":"arXiv:1710.10370"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3213807"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109661"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094024"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11333294.pdf?arnumber=11333294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:49:53Z","timestamp":1774640993000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11333294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":70,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2026.3651524","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}