{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:52:47Z","timestamp":1772041967249,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.23919\/cnsm50824.2020.9269044","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T21:36:55Z","timestamp":1606772215000},"page":"1-7","source":"Crossref","is-referenced-by-count":38,"title":["An IoT Device Identification Method based on Semi-supervised Learning"],"prefix":"10.23919","author":[{"given":"Linna","family":"Fan","sequence":"first","affiliation":[]},{"given":"Shize","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yichao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chenxin","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1765(92)90022-Q"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148110"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761559"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2307\/2684482"},{"key":"ref36","article-title":"Measuring skewness: a forgotten statistic?","volume":"19","author":"doane","year":"2011","journal-title":"Journal of Educational Statistics"},{"key":"ref35","article-title":"Semi-supervised learning via compact latent space clustering","author":"kamnitsas","year":"2018"},{"key":"ref34","article-title":"An overview of multi-task learning in deep neural networks","author":"ruder","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969015"},{"key":"ref40","article-title":"Learning from labeled and unlabeled data with label propagation","author":"zhu","year":"2002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622243"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref15","article-title":"Detection of unauthorized iot devices using machine learning techniques","author":"meidan","year":"2017"},{"key":"ref16","first-page":"1","article-title":"Iot device fingerprinting for relieving pressure in the access control","author":"song","year":"2019","journal-title":"Proceedings of the ACM Turing Celebration Conference-China"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100613.00161"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658967"},{"key":"ref28","article-title":"Detecting iot devices in the internet (extended)","author":"guo","year":"2018","journal-title":"USC\/ISI Technical Report ISI-TR-726 July"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997469"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110451"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990797"},{"key":"ref5","article-title":"Iotsense: Behavioral fingerprinting of iot devices","author":"bezawada","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885429"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023"},{"key":"ref2","article-title":"Buildsensys: Reusing building sensing data for traffic prediction with cross-domain learning","author":"fan","year":"2020","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref1","volume":"30","author":"kuypers","year":"2016","journal-title":"An empirical analysis of cyber security incidents at a large organization"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.109"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568486"},{"key":"ref23","first-page":"211","article-title":"An improved clock-skew measurement technique for revealing hidden services","author":"zander","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref26","first-page":"327","article-title":"Acquisitional rule-based engine for discovering internet-of-things devices","author":"feng","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref25","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"}],"event":{"name":"2020 16th International Conference on Network and Service Management (CNSM)","location":"Izmir, Turkey","start":{"date-parts":[[2020,11,2]]},"end":{"date-parts":[[2020,11,6]]}},"container-title":["2020 16th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9269033\/9269034\/09269044.pdf?arnumber=9269044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T22:28:31Z","timestamp":1643149711000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269044\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":40,"URL":"https:\/\/doi.org\/10.23919\/cnsm50824.2020.9269044","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]}}}