Most of this Springer article, including the results and many of the figures, is plagiarized from "Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime" by Raniyah Wazirali and Rami Ahmad (2021).
The text has also been heavily obfuscated by some sort of paraphrasing software, resulting in an extreme number of tortured phrases (see the list at the bottom of this post) and many nonsensical passages.
Even the list of references is affected. For example,
"Otoum S, Kantarci B, Mouftah HT (2019) On the practicality of profound learning in sensor organization interruption location. IEEE Syst Admin Lett 1(2):68–71" actually refers to "On the Feasibility of Deep Learning in Sensor Network Intrusion Detection" by Otoum et al. (2019).
"Premkumar M, Sundararajan TVP (2020) DLDM: profound learning-based protection component for disavowal of administration assaults in VANET. Microchips Microsyst 79(September)" actually refers to "DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks" by Premkumar and Sundararajan (2020)
Compare (left: this article, right: Raniyah Wazirali and Rami Ahmad (2021)):
Finally, here is a list of some of the tortured phrases flagged by the Problematic Paper Screener or found while preparing this post:
Tortured Phrases (found) | Established Phrases (expected) |
---|---|
AI calculation | machine learning algorithm |
Client Datagram Convention | User Datagram Protocol (UDP) |
DDoS assault | Distributed denial-of-service (DDoS) attack |
DoS assault | denial-of-service (DoS) attack |
K-closest neighbors | K-nearest neighbors |
abnormality identification | anomaly detection |
administered learning | supervised learning |
backing vector machine | support vector machine (SVM) |
calculated relapse | logistic regression |
choice tree | decision tree |
clog control | congestion control |
counterfeit neural system | artificial neural network |
counterfeit neural | artificial neural (network) |
credulous Bayes | naive Bayes |
directing convention | routing protocol |
disavowal of administration | Denial of service |
edge esteem | threshold value |
fake neural | artificial neural (network) |
fluffy framework | fuzzy framework |
focal Asia | Central Asia |
grouping relapse~5 | classification and regression |
guileless Bayes | naive Bayes |
gullible Bayes | naive Bayes |
hereditary calculation | genetic algorithm |
hub assault | node attack |
hyper-boundaries AND hyper-parameters | hyper-parameters |
information mining | data mining |
innocent Bayes | naive Bayes |
interruption discovery | intrusion detection |
interruption location AND intrusion detection | intrusion detection |
k-implies bunching | k-means clustering |
limited Boltzmann machine | Restricted Boltzmann Machine (RBM) |
multi-facet perceptron | multi-layer perceptron (MLP) |
neural organization | neural network |
pernicious hub | malicious node |
profound learning AND deep learning | deep learning |
steering convention | routing protocol |
steering table AND network | routing table |
strategic relapse | logistic regression |
working framework AND operating system | operating system |
PC helped demonstrating | Computer-aided modeling |
measurable highlights | statistical features |
Intel Center i7 | Intel Core i7 (CPU) |
Jupyter Journal | Jupyter Notebook |
keen climate | smart environment |
How come these very obvious incorrect wordings were not a giant red flag to the editors, reviewers, copy editors, and typesetters?
Flagged by the Problematic Paper Screener.
Similarly to https://pubpeer.com/publications/CF3341A6FE082742FC5F6473CEC297, the garbled journal titles in this paper's references were abbreviated in Springer's house style somewhere in the editing and typesetting process, without anyone checking to confirm those titles actually exist. For instance, in reference 38 quoted above, "IEEE Networking Letters" got transformed into "IEEE Syst Admin Lett"; in reference 50 (actually 10.1109/TII.2019.2952917), "IEEE Transactions on Industrial Informatics" became "IEEE Exchanges Mech Inf".
Retracted 10 August 2024.
"The Editor-in-Chief and the publisher have retracted this article. An investigation by the publisher found a number of concerns, including but not limited to citations which do not support claims made in the text, non-standard phrasing, and image irregularities. Based on the investigation’s findings the Editor-in-Chief therefore no longer has confidence in the results and conclusions of this article.
The publisher has been unable to obtain a current email address for author Roob Pahuja. Author Deephak Choudhary has not responded to correspondence regarding this retraction."
Attach files by dragging & dropping, selecting them, or pasting from the clipboard. Uploading your files… We don’t support that file type. with a PNG, GIF, or JPG. Yowza, that’s a big file. with a file smaller than 1MB. This file is empty. with a file that’s not empty. Something went really wrong, and we can’t process that file.
Comment must be at least 15 characters.