{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:25:38Z","timestamp":1776781538152,"version":"3.51.2"},"reference-count":73,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100013092","name":"Science and Technology Planning Project of Fuzhou","doi-asserted-by":"publisher","award":["20240302075GX"],"award-info":[{"award-number":["20240302075GX"]}],"id":[{"id":"10.13039\/501100013092","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018568","name":"Special Fund Project for Science and Technology Innovation Strategy of Guangdong Province","doi-asserted-by":"publisher","award":["QT202013"],"award-info":[{"award-number":["QT202013"]}],"id":[{"id":"10.13039\/501100018568","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013061","name":"Jilin Scientific and Technological Development Program","doi-asserted-by":"publisher","award":["20190701019GH"],"award-info":[{"award-number":["20190701019GH"]}],"id":[{"id":"10.13039\/501100013061","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013061","name":"Jilin Scientific and Technological Development Program","doi-asserted-by":"publisher","award":["20210101183JC"],"award-info":[{"award-number":["20210101183JC"]}],"id":[{"id":"10.13039\/501100013061","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013061","name":"Jilin Scientific and Technological Development Program","doi-asserted-by":"publisher","award":["20210201072GX"],"award-info":[{"award-number":["20210201072GX"]}],"id":[{"id":"10.13039\/501100013061","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013061","name":"Jilin Scientific and Technological Development Program","doi-asserted-by":"publisher","award":["20220101101JC"],"award-info":[{"award-number":["20220101101JC"]}],"id":[{"id":"10.13039\/501100013061","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013061","name":"Jilin Scientific and Technological Development Program","doi-asserted-by":"publisher","award":["20190701002GH"],"award-info":[{"award-number":["20190701002GH"]}],"id":[{"id":"10.13039\/501100013061","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010012","name":"National Aerospace Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010012","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172186"],"award-info":[{"award-number":["62172186"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002133"],"award-info":[{"award-number":["62002133"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61806083"],"award-info":[{"award-number":["61806083"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872158"],"award-info":[{"award-number":["61872158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1016\/j.eswa.2024.124936","type":"journal-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T02:12:50Z","timestamp":1722391970000},"page":"124936","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Enhancing IoT (Internet of Things) feature selection: A two-stage approach via an improved whale optimization algorithm"],"prefix":"10.1016","volume":"256","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4299-9129","authenticated-orcid":false,"given":"Kunpeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yanheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5506-3741","authenticated-orcid":false,"given":"Fang","family":"Mei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7802-4908","authenticated-orcid":false,"given":"Geng","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1709-4517","authenticated-orcid":false,"given":"Jindong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2024.124936_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.advengsoft.2022.103402","article-title":"Intrusion detection approach for cloud and iot environments using deep learning and capuchin search algorithm","volume":"176","author":"Abd Elaziz","year":"2023","journal-title":"Advances in Engineering Software"},{"key":"10.1016\/j.eswa.2024.124936_b2","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1016\/j.future.2018.04.051","article-title":"Retracted: Internet of things (iot) and its impact on supply chain: A framework for building smart, secure and efficient systems","volume":"86","author":"Abdel-Basset","year":"2018","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b3","doi-asserted-by":"crossref","first-page":"1845","DOI":"10.1007\/s00366-021-01369-9","article-title":"A multi-objective optimization algorithm for feature selection problems","volume":"38","author":"Abdollahzadeh","year":"2022","journal-title":"Engineering with Computers"},{"key":"10.1016\/j.eswa.2024.124936_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106092","article-title":"Quantum based whale optimization algorithm for wrapper feature selection","volume":"89","author":"Agrawal","year":"2020","journal-title":"Applied Soft Computing"},{"issue":"14","key":"10.1016\/j.eswa.2024.124936_b5","doi-asserted-by":"crossref","first-page":"3206","DOI":"10.1016\/j.comnet.2012.06.012","article-title":"Evolutionary algorithms for orthogonal frequency division multiplexing-based dynamic spectrum access systems","volume":"56","author":"Ahmadi","year":"2012","journal-title":"Computer Networks"},{"key":"10.1016\/j.eswa.2024.124936_b6","doi-asserted-by":"crossref","first-page":"3619","DOI":"10.1109\/ACCESS.2017.2779844","article-title":"A survey on 5 g networks for the internet of things: Communication technologies and challenges","volume":"6","author":"Akpakwu","year":"2018","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.eswa.2024.124936_b7","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TII.2022.3165875","article-title":"Multi-resatt: Multilevel residual network with attention for human activity recognition using wearable sensors","volume":"19","author":"Al-qaness","year":"2023","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.eswa.2024.124936_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102957","article-title":"A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization","volume":"124","author":"Alzaqebah","year":"2023","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2024.124936_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108040","article-title":"A survey on iot platforms: Communication, security, and privacy perspectives","volume":"192","author":"Babun","year":"2021","journal-title":"Computer Networks"},{"key":"10.1016\/j.eswa.2024.124936_b10","series-title":"Proceedings of the 2018 workshop on attacks and solutions in hardware security","first-page":"41","article-title":"Behavioral fingerprinting of iot devices","author":"Bezawada","year":"2018"},{"issue":"1","key":"10.1016\/j.eswa.2024.124936_b11","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","article-title":"Ton-iot: The role of heterogeneity and the need for standardization of features and attack types in iot network intrusion data sets","volume":"9","author":"Booij","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2024.124936_b12","series-title":"2021 IEEE global communications conference","first-page":"1","article-title":"Iot-id: Robust iot device identification based on feature drift adaptation","author":"Chen","year":"2021"},{"key":"10.1016\/j.eswa.2024.124936_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.106375","article-title":"A new approach based on hybrid ant colony optimization-artificial bee colony algorithm for multi-objective electric vehicle routing problems","volume":"123","author":"Comert","year":"2023","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"10.1016\/j.eswa.2024.124936_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.measurement.2022.111445","article-title":"Human activity recognition in ioht applications using arithmetic optimization algorithm and deep learning","volume":"199","author":"Dahou","year":"2022","journal-title":"Measurement"},{"issue":"1","key":"10.1016\/j.eswa.2024.124936_b15","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1109\/JIOT.2023.3286378","article-title":"Mlcnnwav: Multilevel convolutional neural network with wavelet transformations for sensor-based human activity recognition","volume":"11","author":"Dahou","year":"2024","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2024.124936_b16","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.neucom.2015.08.112","article-title":"Efficient knn classification algorithm for big data","volume":"195","author":"Deng","year":"2016","journal-title":"Neurocomputing"},{"issue":"4","key":"10.1016\/j.eswa.2024.124936_b17","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCI.2006.329691","article-title":"Ant colony optimization","volume":"1","author":"Dorigo","year":"2006","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"10.1016\/j.eswa.2024.124936_b18","series-title":"2021 IEEE symposium on security and privacy","first-page":"519","article-title":"Which privacy and security attributes most impact consumers\u2019 risk perception and willingness to purchase iot devices?","author":"Emami-Naeini","year":"2021"},{"key":"10.1016\/j.eswa.2024.124936_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109450","article-title":"Evoiot: An evolutionary iot and non-iot classification model in open environments","volume":"219","author":"Fan","year":"2022","journal-title":"Computer Networks"},{"issue":"2","key":"10.1016\/j.eswa.2024.124936_b20","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1109\/TII.2014.2302583","article-title":"Iot-based smart rehabilitation system","volume":"10","author":"Fan","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b21","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/JIOT.2021.3088279","article-title":"Stochastic optimization-aided energy-efficient information collection in internet of underwater things networks","volume":"9","author":"Fang","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2024.124936_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113377","article-title":"Marine predators algorithm: A nature-inspired metaheuristic","volume":"152","author":"Faramarzi","year":"2020","journal-title":"Expert Systems with Applications"},{"issue":"17","key":"10.1016\/j.eswa.2024.124936_b23","doi-asserted-by":"crossref","first-page":"11027","DOI":"10.1007\/s00521-020-05560-9","article-title":"S-shaped versus v-shaped transfer functions for binary manta ray foraging optimization in feature selection problem","volume":"33","author":"Ghosh","year":"2021","journal-title":"Neural Computing and Applications"},{"issue":"6","key":"10.1016\/j.eswa.2024.124936_b24","doi-asserted-by":"crossref","first-page":"4540","DOI":"10.1109\/JIOT.2020.3026660","article-title":"A multikernel and metaheuristic feature selection approach for iot malware threat hunting in the edge layer","volume":"8","author":"Haddadpajouh","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2024.124936_b25","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1007\/s00607-020-00899-2","article-title":"Novel evolutionary-eac instance-learning-based algorithm for fast data stream mining in assisted living with extreme connectivity","volume":"103","author":"Hu","year":"2021","journal-title":"Computing"},{"key":"10.1016\/j.eswa.2024.124936_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.110122","article-title":"A federated feature selection algorithm based on particle swarm optimization under privacy protection","volume":"260","author":"Hu","year":"2023","journal-title":"Knowledge-Based Systems"},{"issue":"8","key":"10.1016\/j.eswa.2024.124936_b27","doi-asserted-by":"crossref","first-page":"4287","DOI":"10.1007\/s00521-017-3317-9","article-title":"Efficient feature selection and classification algorithm based on pso and rough sets","volume":"31","author":"Huda","year":"2019","journal-title":"Neural Computing and Applications"},{"key":"10.1016\/j.eswa.2024.124936_b28","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.compag.2018.04.027","article-title":"Iot based smart farming: Feature subset selection for optimized high-dimensional data using improved ga based approach for elm","volume":"161","author":"Kale","year":"2019","journal-title":"Computers and Electronics in Agriculture"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b29","doi-asserted-by":"crossref","first-page":"1746","DOI":"10.1109\/TCBB.2022.3215129","article-title":"A hybrid two-stage teaching-learning-based optimization algorithm for feature selection in bioinformatics","volume":"20","author":"Kang","year":"2023","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"10.1016\/j.eswa.2024.124936_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.119130","article-title":"Semiaco: A semi-supervised feature selection based on ant colony optimization","volume":"214","author":"Karimi","year":"2023","journal-title":"Expert Systems with Applications"},{"issue":"14","key":"10.1016\/j.eswa.2024.124936_b31","doi-asserted-by":"crossref","first-page":"11016","DOI":"10.1109\/JIOT.2021.3051414","article-title":"Deep learning in the industrial internet of things: Potentials, challenges, and emerging applications","volume":"8","author":"Khalil","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"23","key":"10.1016\/j.eswa.2024.124936_b32","doi-asserted-by":"crossref","first-page":"23741","DOI":"10.1109\/JIOT.2022.3191951","article-title":"Iotdevid: A behavior-based device identification method for the iot","volume":"9","author":"Kostas","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2024.124936_b33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12046-020-1308-5","article-title":"Particle swarm optimization and feature selection for intrusion detection system","volume":"45","author":"Kunhare","year":"2020","journal-title":"S\u0101dhan\u0101"},{"issue":"7","key":"10.1016\/j.eswa.2024.124936_b34","doi-asserted-by":"crossref","first-page":"2463","DOI":"10.1109\/TPAMI.2020.2970410","article-title":"Real-time nonparametric anomaly detection in high-dimensional settings","volume":"43","author":"Kurt","year":"2021","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b35","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.1007\/s11277-021-08756-x","article-title":"Improving the accuracy of network intrusion detection system in medical iot systems through butterfly optimization algorithm","volume":"126","author":"Li","year":"2022","journal-title":"Wireless Personal Communications"},{"key":"10.1016\/j.eswa.2024.124936_b36","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.future.2020.05.020","article-title":"Augmented whale feature selection for iot attacks: Structure, analysis and applications","volume":"112","author":"Mafarja","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.eswa.2024.124936_b37","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.neucom.2017.04.053","article-title":"Hybrid whale optimization algorithm with simulated annealing for feature selection","volume":"260","author":"Mafarja","year":"2017","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2024.124936_b38","series-title":"Iot devices captures","author":"Marchal","year":"2017"},{"key":"10.1016\/j.eswa.2024.124936_b39","doi-asserted-by":"crossref","first-page":"5247","DOI":"10.1109\/ACCESS.2017.2689040","article-title":"Big iot data analytics: Architecture, opportunities, and open research challenges","volume":"5","author":"Marjani","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2024.124936_b40","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.future.2022.03.001","article-title":"Host-based ids: A review and open issues of an anomaly detection system in iot","volume":"133","author":"Martins","year":"2022","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.eswa.2024.124936_b41","series-title":"2017 IEEE 37th international conference on distributed computing systems","first-page":"2177","article-title":"Iot sentinel: Automated device-type identification for security enforcement in iot","author":"Miettinen","year":"2017"},{"key":"10.1016\/j.eswa.2024.124936_b42","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Advances in Engineering Software"},{"key":"10.1016\/j.eswa.2024.124936_b43","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","article-title":"Grey wolf optimizer","volume":"69","author":"Mirjalili","year":"2014","journal-title":"Advances in Engineering Software"},{"key":"10.1016\/j.eswa.2024.124936_b44","series-title":"Optimization, learning, and control for interdependent complex networks","first-page":"67","article-title":"Applications of nature-inspired algorithms for dimension reduction: enabling efficient data analytics","author":"Mohammadi","year":"2020"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b45","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.icte.2020.06.004","article-title":"Improving data quality of low-cost iot sensors in environmental monitoring networks using data fusion and machine learning approach","volume":"6","author":"Okafor","year":"2020","journal-title":"ICT Express"},{"key":"10.1016\/j.eswa.2024.124936_b46","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.110031","article-title":"A high-dimensional feature selection method based on modified gray wolf optimization","volume":"135","author":"Pan","year":"2023","journal-title":"Applied Soft Computing"},{"issue":"5","key":"10.1016\/j.eswa.2024.124936_b47","doi-asserted-by":"crossref","first-page":"3088","DOI":"10.1109\/JIOT.2020.3007662","article-title":"Realizing the heterogeneity: A self-organized federated learning framework for iot","volume":"8","author":"Pang","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"15","key":"10.1016\/j.eswa.2024.124936_b48","doi-asserted-by":"crossref","first-page":"10205","DOI":"10.1007\/s00500-021-05961-5","article-title":"A cloud load forecasting model with nonlinear changes using whale optimization algorithm hybrid strategy","volume":"25","author":"Peng","year":"2021","journal-title":"Soft Computing"},{"issue":"6","key":"10.1016\/j.eswa.2024.124936_b49","doi-asserted-by":"crossref","first-page":"4944","DOI":"10.1109\/JIOT.2020.3034156","article-title":"Hybrid deep learning for botnet attack detection in the internet-of-things networks","volume":"8","author":"Popoola","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b50","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/COMST.2018.2803740","article-title":"How can heterogeneous internet of things build our future: A survey","volume":"20","author":"Qiu","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.1016\/j.eswa.2024.124936_b51","series-title":"RT-IoT2022","author":"S.","year":"2024"},{"issue":"1","key":"10.1016\/j.eswa.2024.124936_b52","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1186\/s42400-023-00178-5","article-title":"Quantized autoencoder (qae) intrusion detection system for anomaly detection in resource-constrained iot devices using rt-iot2022 dataset","volume":"6","author":"Sharmila","year":"2023","journal-title":"Cybersecurity"},{"key":"10.1016\/j.eswa.2024.124936_b53","first-page":"1","article-title":"Two-stage improved grey wolf optimization algorithm for feature selection on high-dimensional classification","author":"Shen","year":"2021","journal-title":"Complex & Intelligent Systems"},{"issue":"2","key":"10.1016\/j.eswa.2024.124936_b54","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/02564602.2016.1276416","article-title":"Internet of things: A comprehensive review of enabling technologies, architecture, and challenges","volume":"35","author":"Silva","year":"2018","journal-title":"IETE Technical Review"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b55","doi-asserted-by":"crossref","first-page":"7130","DOI":"10.48084\/etasr.4149","article-title":"Evolutionary algorithm-based feature selection for an intrusion detection system","volume":"11","author":"Singh","year":"2021","journal-title":"Engineering, Technology & Applied Science Research"},{"key":"10.1016\/j.eswa.2024.124936_b56","series-title":"2020 11th international conference on computing, communication and networking technologies","first-page":"1","article-title":"Ai based intrusion detection system using self-adaptive energy efficient bat algorithm for software defined iot networks","author":"Suresh","year":"2020"},{"issue":"6","key":"10.1016\/j.eswa.2024.124936_b57","doi-asserted-by":"crossref","first-page":"4711","DOI":"10.1109\/JIOT.2020.2971736","article-title":"Toward the internet of things for physical internet: Perspectives and challenges","volume":"7","author":"Tran-Dang","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2024.124936_b58","first-page":"1","article-title":"Ai-empowered fog\/edge resource management for iot applications: A comprehensive review, research challenges and future perspectives","author":"Walia","year":"2023","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.1016\/j.eswa.2024.124936_b59","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111455","article-title":"Efficient traffic-based iot device identification using a feature selection approach with l\u00e9vy flight-based sine chaotic sub-swarm binary honey badger algorithm","volume":"155","author":"Wang","year":"2024","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.eswa.2024.124936_b60","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1016\/j.ins.2022.12.117","article-title":"Feature selection using diversity-based multi-objective binary differential evolution","volume":"626","author":"Wang","year":"2023","journal-title":"Information Sciences"},{"issue":"2","key":"10.1016\/j.eswa.2024.124936_b61","doi-asserted-by":"crossref","first-page":"1928","DOI":"10.1109\/JIOT.2018.2884485","article-title":"A feature-based learning system for internet of things applications","volume":"6","author":"Wu","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"10.1016\/j.eswa.2024.124936_b62","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1109\/TEVC.2015.2504420","article-title":"A survey on evolutionary computation approaches to feature selection","volume":"20","author":"Xue","year":"2016","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10.1016\/j.eswa.2024.124936_b63","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.109987","article-title":"A feature selection approach based on nsga-ii with relieff","volume":"134","author":"Xue","year":"2023","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.eswa.2024.124936_b64","series-title":"2009 world congress on nature & biologically inspired computing","first-page":"210","article-title":"Cuckoo search via l\u00e9vy flights","author":"Yang","year":"2009"},{"key":"10.1016\/j.eswa.2024.124936_b65","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105366","article-title":"Iot data analytics in dynamic environments: From an automated machine learning perspective","volume":"116","author":"Yang","year":"2022","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"3","key":"10.1016\/j.eswa.2024.124936_b66","doi-asserted-by":"crossref","first-page":"2443","DOI":"10.1109\/JIOT.2021.3096637","article-title":"An integrated framework for health state monitoring in a smart factory employing iot and big data techniques","volume":"9","author":"Yu","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2024.124936_b67","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2022.109355","article-title":"Feature selection for online streaming high-dimensional data: A state-of-the-art review","volume":"127","author":"Zaman","year":"2022","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.eswa.2024.124936_b68","first-page":"1","article-title":"An interpretability security framework for intelligent decision support systems based on saliency map","author":"Zhang","year":"2023","journal-title":"International Journal of Information Security"},{"issue":"8","key":"10.1016\/j.eswa.2024.124936_b69","doi-asserted-by":"crossref","DOI":"10.3390\/e25081128","article-title":"Ibgjo: Improved binary golden jackal optimization with chaotic tent map and cosine similarity for feature selection","volume":"25","author":"Zhang","year":"2023","journal-title":"Entropy"},{"issue":"4","key":"10.1016\/j.eswa.2024.124936_b70","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1109\/TST.2013.6574675","article-title":"An efficient multidimensional fusion algorithm for iot data based on partitioning","volume":"18","author":"Zhou","year":"2013","journal-title":"Tsinghua Science and Technology"},{"key":"10.1016\/j.eswa.2024.124936_b71","doi-asserted-by":"crossref","DOI":"10.1016\/j.swevo.2020.100770","article-title":"An evolutionary multi-objective optimization framework of discretization-based feature selection for classification","volume":"60","author":"Zhou","year":"2021","journal-title":"Swarm and Evolutionary Computation"},{"key":"10.1016\/j.eswa.2024.124936_b72","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.neucom.2017.01.026","article-title":"Machine learning on big data: Opportunities and challenges","volume":"237","author":"Zhou","year":"2017","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2024.124936_b73","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.110111","article-title":"A hybrid artificial immune optimization for high-dimensional feature selection","volume":"260","author":"Zhu","year":"2023","journal-title":"Knowledge-Based Systems"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417424018037?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417424018037?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T13:57:07Z","timestamp":1725285427000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417424018037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":73,"alternative-id":["S0957417424018037"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2024.124936","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing IoT (Internet of Things) feature selection: A two-stage approach via an improved whale optimization algorithm","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2024.124936","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"124936"}}