{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:09:25Z","timestamp":1773677365197,"version":"3.50.1"},"reference-count":66,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T00:00:00Z","timestamp":1735776000000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276053"],"award-info":[{"award-number":["62276053"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372085"],"award-info":[{"award-number":["62372085"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62376055"],"award-info":[{"award-number":["62376055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Advanced wireless communication is important in distribution systems for sharing information among Internet of Things (IoT) edges. Artificial intelligence (AI) analyzed the generated IoT data to make these decisions, ensuring efficient and effective operations. These technologies face significant security challenges, such as eavesdropping and adversarial attacks. Recent studies addressed this issue by using clustering analysis (CA) to uncover hidden patterns to provide AI models with clear interpretations. The high volume of overlapped samples in IoT data affects partitioning, interpretation, and reliability of CAs. Recent CA models have integrated machine learning techniques to address these issues, but struggle in the limited resources of IoT environments. These challenges are addressed by proposing a novel unsupervised lightweight distance clustering (DC) model based on data separation ().  raises the tension between samples using cannot\u2010link relations to separate the overlap, thus DC provides the interpretations. The optimal time and space complexity enables DC\u2010 to be implemented on on\u2010edge computing, reducing data transmission overhead, and improving the robustness of the AI\u2010IoT application. Extensive experiments were conducted across various datasets under different circumstances. The results show that the data separated by  improved the efficiency of the proposed solution, with DC outperforming the baseline\u00a0model.<\/jats:p>","DOI":"10.1049\/cmu2.12874","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T23:00:47Z","timestamp":1735858847000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight on\u2010edge clustering for wireless AI\u2010driven applications"],"prefix":"10.1049","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5278-9080","authenticated-orcid":false,"given":"Mustafa Raad","family":"Kadhim","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu Sichuan China"}]},{"given":"Guangxi","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu Sichuan China"}]},{"given":"Yinong","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu Sichuan China"}]},{"given":"Jianbo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu Sichuan China"}]},{"given":"Wu","family":"Kui","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu Sichuan China"}]}],"member":"265","published-online":{"date-parts":[[2025,1,2]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3170449"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100198"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12746"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3361494"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.04.004"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2987431"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037705"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0444"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2023.100181"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12523"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"e_1_2_11_13_1","doi-asserted-by":"crossref","unstructured":"Liu Y. Wang H. Zheng X. Tian L.:An efficient framework for unsupervised anomaly detection over edge\u2010assisted internet of things.ACM Trans. Sen. Netw. just accepted (2023).https:\/\/doi.org\/10.1145\/3587935","DOI":"10.1145\/3587935"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0629"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2023.9010056"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2023.9010074"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031639"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00677-7"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2023.103877"},{"key":"e_1_2_11_20_1","unstructured":"Hanyu W.U. Ke Yan P.X.B.H. Tian L.:Adversarial cross\u2010laser attack: Stable and effective attack to dnns in the real world. In:Proceedings of the 29th Australasian Conference on Information Security and Privacy.Springer Singapore(2024)"},{"key":"e_1_2_11_21_1","doi-asserted-by":"crossref","unstructured":"Ranjie D. Xiaofeng M. Qin K.A. Yuefeng C. Shaokai Y. Yuan H. et\u00a0al.:Adversarial laser beam: Effective physical\u2010world attack to dnns in a blink. In:Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition pp.16057\u201316066.IEEE Piscataway(2021)","DOI":"10.1109\/CVPR46437.2021.01580"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102600"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2023.9020035"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100665"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2023.9020001"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3286484"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10325-y"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.03.019"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3298629"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.139"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.07.003"},{"key":"e_1_2_11_32_1","doi-asserted-by":"crossref","unstructured":"Kadhim M.R. Tian W. Khan T.:Rapid clustering with semi\u2010supervised ensemble density centers. In:2019 16th International Computer Conference on Wavelet Active Media Technology and Information Processing pp.230\u2013235.IEEE Piscataway(2019)","DOI":"10.1109\/ICCWAMTIP47768.2019.9067665"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02550-9"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.10.118"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1242072"},{"key":"e_1_2_11_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462\u2010022\u201010248\u20108"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09682-y"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110932"},{"key":"e_1_2_11_39_1","doi-asserted-by":"crossref","unstructured":"Kadhim M. Lu G. Wang J. Kang Z. Tang R. Ye S.:Case study: The reliability of clustering solutions. Preprint Research Square1 (2024)","DOI":"10.21203\/rs.3.rs-4690535\/v1"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4815521"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3188160"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/21582440231215123"},{"key":"e_1_2_11_43_1","first-page":"1","article-title":"Climate change and cop26: Role of information technologies in disaster management and resilience","author":"Hossin M.A.","year":"2023","journal-title":"Environ. Develop. Sustain."},{"key":"e_1_2_11_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805394-2.00015-5"},{"key":"e_1_2_11_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-024-01206-z"},{"key":"e_1_2_11_46_1","first-page":"2825","article-title":"Scikit\u2010learn: Machine learning in Python","volume":"12","author":"Pedregosa F.","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_2_11_47_1","unstructured":"Xiao H.:Fashion\u2010mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)"},{"key":"e_1_2_11_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626235"},{"key":"e_1_2_11_49_1","first-page":"323","article-title":"Man vs","volume":"32","author":"Stallkamp J.","year":"2012","journal-title":"computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural Netw."},{"key":"e_1_2_11_50_1","doi-asserted-by":"crossref","unstructured":"Zhu Z. Liang D. Zhang S. Huang X. Li B. Hu S.:Traffic\u2010sign detection and classification in the wild. In:2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) pp.2110\u20132118.IEEE Piscataway(2016)","DOI":"10.1109\/CVPR.2016.232"},{"key":"e_1_2_11_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533381"},{"key":"e_1_2_11_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3315137"},{"key":"e_1_2_11_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"e_1_2_11_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102303"},{"key":"e_1_2_11_55_1","unstructured":"Chengyin H. Yilong W. Kalibinuer T. Wen L.:Adversarial laser spot: Robust and covert physical\u2010world attack to dnns. In:Proceedings of Asian Conference on Machine Learning pp.483\u2013498.PMLR New York(2023)"},{"key":"e_1_2_11_56_1","doi-asserted-by":"crossref","unstructured":"Kalibinuer Tiliwalidi C.H.J.G. Bei H.:Adversarial camera patch: An effective and robust physical\u2010world attack on object detectors. In:Proceedings of the 19th International Conference on Cyber Warfare and Security pp.374\u2013384.Academic Conferences International Reading UK(2024)","DOI":"10.34190\/iccws.19.1.2044"},{"key":"e_1_2_11_57_1","unstructured":"Valerio B. Cristina B. Elisabetta F. Debora N. Viviana P. Francisco R. et\u00a0al.:Semeval\u20102019 task 5: Multilingual detection of hate speech against immigrants and women in twitter. In:Proceedings of the 13th International Workshop on Semantic Evaluation.Association for Computational Linguistics Stroudsburg PA(2019)"},{"key":"e_1_2_11_58_1","unstructured":"Del Arco F.M.P. Strapparava C. Lopez L.A.U. Mart\u00edn\u2010Valdivia M.T.:Emoevent: A multilingual emotion corpus based on different events. In:Proceedings of the 12th Language Resources and Evaluation Conference pp.1492\u20131498.Association for Computational Linguistics Stroudsburg PA(2020)"},{"key":"e_1_2_11_59_1","doi-asserted-by":"crossref","unstructured":"Nakov P. Ritter A. Rosenthal S. Sebastiani F. Stoyanov V.:Semeval\u20102016 task 4: Sentiment analysis in twitter. In:Proceedings of the international Workshop on Semantic Evaluation.Association for Computational Linguistics Stroudsburg PA(2016)","DOI":"10.18653\/v1\/S16-1001"},{"key":"e_1_2_11_60_1","doi-asserted-by":"crossref","unstructured":"Quoc N.D. Thanh V. Anh T.N.:BERTweet: A pre\u2010trained language model for English tweets. In:Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations pp.9\u201314.Association for Computational Linguistics Stroudsburg PA(2020)","DOI":"10.18653\/v1\/2020.emnlp-demos.2"},{"key":"e_1_2_11_61_1","first-page":"22","article-title":"Comprehensive review of k\u2010means clustering algorithms","volume":"12","author":"Oti E.U.","year":"2021","journal-title":"Criterion"},{"key":"e_1_2_11_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3147951"},{"key":"e_1_2_11_63_1","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2022.01.016"},{"key":"e_1_2_11_64_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2286"},{"issue":"1","key":"e_1_2_11_65_1","first-page":"54","article-title":"Impclust: An algorithm to cluster chemical datasets for drug discovery","volume":"17","author":"Bhagat H.V.","year":"2024","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"e_1_2_11_66_1","doi-asserted-by":"publisher","DOI":"10.3390\/app14114946"},{"key":"e_1_2_11_67_1","doi-asserted-by":"crossref","unstructured":"Akhter A. Ferens K.:Modified k\u2010means clustering algorithms for feature selection. In:2023 Congress in Computer Science Computer Engineering & Applied Computing (CSCE) pp.461\u2013469.IEEE Piscataway(2023)","DOI":"10.1109\/CSCE60160.2023.00083"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.12874","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/cmu2.12874","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.12874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:35:02Z","timestamp":1773671702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/cmu2.12874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/cmu2.12874"],"URL":"https:\/\/doi.org\/10.1049\/cmu2.12874","archive":["Portico"],"relation":{},"ISSN":["1751-8628","1751-8636"],"issn-type":[{"value":"1751-8628","type":"print"},{"value":"1751-8636","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-10-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e12874"}}