{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:32:36Z","timestamp":1763811156733,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031390586"},{"type":"electronic","value":"9783031390593"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-39059-3_1","type":"book-chapter","created":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T13:01:37Z","timestamp":1690722097000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Synthetic Network Traffic Data Generation and\u00a0Classification of\u00a0Advanced Persistent Threat Samples: A Case Study with\u00a0GANs and\u00a0XGBoost"],"prefix":"10.1007","author":[{"given":"T. J.","family":"Anande","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0367-6228","authenticated-orcid":false,"given":"M. S.","family":"Leeson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,31]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abdullayeva, F.J.: Advanced persistent threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm. Array 10, 100067-1\u2013100067-11 (2021)","DOI":"10.1016\/j.array.2021.100067"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.cose.2019.07.001","volume":"86","author":"A Ahmad","year":"2019","unstructured":"Ahmad, A., Webb, J., Desouza, K.C., Boorman, J.: Strategically-motivated advanced persistent threat: definition, process, tactics and a disinformation model of counterattack. Comput. Secur. 86, 402\u2013418 (2019)","journal-title":"Comput. Secur."},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s11831-019-09388-y","volume":"28","author":"SH Alqahtani","year":"2021","unstructured":"Alqahtani, S.H., Thorne, M.K., Kumar, G.: Applications of generative adversarial networks (GANs): an updated review. Arch. Comput. Methods Eng. 28(2), 525\u2013552 (2021)","journal-title":"Arch. Comput. Methods Eng."},{"issue":"2","key":"1_CR4","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21(2), 1851\u20131877 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"1_CR5","first-page":"333","volume":"12","author":"TJ Anande","year":"2022","unstructured":"Anande, T.J., Leeson, M.S.: Generative adversarial networks (GANs): a survey on network traffic generation. Int. J. Mach. Learn. Comput. 12(6), 333\u2013343 (2022)","journal-title":"Int. J. Mach. Learn. Comput."},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Anande, T.J., Al-Saadi, S., Leeson, M.S.: Generative adversarial networks for network traffic feature generation. Int. J. Comput. Appl. 1\u20139 (2023). https:\/\/doi.org\/10.1080\/1206212X.2023.2191072","DOI":"10.1080\/1206212X.2023.2191072"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1007\/s10462-020-09896-5","volume":"54","author":"C Bent\u00e9jac","year":"2021","unstructured":"Bent\u00e9jac, C., Cs\u00f6rg\u00f6, A., Mart\u00ednez-Mu\u00f1oz, G.: A comparative analysis of gradient boosting algorithms. Artif. Intell. Rev. 54(3), 1937\u20131967 (2021)","journal-title":"Artif. Intell. Rev."},{"key":"1_CR8","first-page":"5","volume-title":"Machine Learning Methods for Computer Security","author":"B Biggio","year":"2012","unstructured":"Biggio, B., \u0160rndi\u0107, N.: Machine learning for computer security. In: Joseph, A.D., Laskov, P., Roli, F., Tygar, J.D., Nelson, B. (eds.) Machine Learning Methods for Computer Security, vol. 3, pp. 5\u201310. Dagstuhl Manifestos, Dagstuhl (2012)"},{"key":"1_CR9","unstructured":"Chan, T.N., Yiu, M.L., U, L.H.: The power of bounds: answering approximate earth mover\u2019s distance with parametric bounds. IEEE Trans. Knowl. Data Eng. 33(2), 768\u2013781 (2021)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting systems. In: 2nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2016), pp. 785\u2013794. ACM, New York (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"1_CR11","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-35488-8_13","volume-title":"Feature Extraction","author":"YW Chen","year":"2006","unstructured":"Chen, Y.W., Lin, C.J.: Combining SVMs with various feature selection strategies. In: Guyon, I., Nikravesh, M., Gunn, S., Zadeh, L.A. (eds.) Feature Extraction. Studies in Fuzziness and Soft Computing, vol. 207, pp. 314\u2013324. Springer, Berlin (2006). https:\/\/doi.org\/10.1007\/978-3-540-35488-8_13"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-44885-4_5","volume-title":"Communications and Multimedia Security","author":"P Chen","year":"2014","unstructured":"Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats. In: De Decker, B., Z\u00faquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 63\u201372. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44885-4_5"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Dhaliwal, S., Nahid, A., Abbas, R.: Effective intrusion detection system using XGBoost. Information 9(7), 149-1\u2013149-24 (2018)","DOI":"10.3390\/info9070149"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Ding, B., Qian, H., Zhou, J.: Activation functions and their characteristics in deep neural networks. In: Chinese Control and Decision Conference (CCDC), pp. 1836\u20131841. IEEE, Piscataway (2018)","DOI":"10.1109\/CCDC.2018.8407425"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: 13th USENIX Security Symposium, pp. 303\u2013320. USENIX Association (2004)","DOI":"10.21236\/ADA465464"},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1002\/asmb.2399","volume":"35","author":"MF Dixon","year":"2019","unstructured":"Dixon, M.F., Polson, N.G., Sokolov, V.O.: Deep learning for spatio-temporal modeling: dynamic traffic flows and high frequency trading. Appl. Stoch. Model. Bus. Ind. 35(3), 788\u2013807 (2019)","journal-title":"Appl. Stoch. Model. Bus. Ind."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Ferdowsi, A., Saad, W.: Generative adversarial networks for distributed intrusion detection in the internet of things. In: IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE, Piscataway (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9014102"},{"key":"1_CR18","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-319-24584-3_7","volume-title":"Advanced Computer and Communication Engineering Technology","author":"I Ghafir","year":"2016","unstructured":"Ghafir, I., Prenosil, V.: Proposed approach for targeted attacks detection. In: Sulaiman, H.A., Othman, M.A., Othman, M.F.I., Rahim, Y.A., Pee, N.C. (eds.) Advanced Computer and Communication Engineering Technology. LNEE, vol. 362, pp. 73\u201380. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-24584-3_7"},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11416-018-0323-0","volume":"15","author":"D Gibert","year":"2019","unstructured":"Gibert, D., Mateu, C., Planes, J., Vicens, R.: Using convolutional neural networks for classification of malware represented as images. J. Comput. Virol. Hacking Tech. 15(1), 15\u201328 (2019)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1_CR20","unstructured":"Goodfellow, I.J., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Proceedings of Advances in Neural Information Processing Systems (NIPS 2014), vol. 27, pp. 2672\u20132680. Curran Associates Inc., Red Hook (2014)"},{"key":"1_CR21","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of Wasserstein GANs. In: 30th Conference on Advances in Neural Information Processing Systems (NIPS 2017), pp. 5767\u20135777. Curran Associates Inc., Red Hook (2017)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Gasti, P., Ateniese, G., Perez-Cruz, F.: PassGAN: a deep learning approach for password guessing. In: NeurIPS 2018 Workshop on Security in Machine Learning (2018)","DOI":"10.1007\/978-3-030-21568-2_11"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Hurtik, P., Tomasiello, S., Hula, J., Hynar, D.: Binary cross-entropy with dynamical clipping. Neural Comput. Appl. (1), 1\u201313 (2022). https:\/\/doi.org\/10.1007\/s00521-022-07091-x","DOI":"10.1007\/s00521-022-07091-x"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Ishitaki, T., Obukata, R., Oda, T., Barolli, L.: Application of deep recurrent neural networks for prediction of user behavior in tor networks. In: Barolli, L., Takizawa, M., Enokido, T., Hsu, H.H., Lin, C.Y. (eds.) 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), vol. 56, pp. 238\u2013243. IEEE, Piscataway (2017)","DOI":"10.1109\/WAINA.2017.63"},{"key":"1_CR25","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: Deep learning for spatio-temporal modeling: dynamic traffic flows and high frequency trading. In: 9th EAI International Conference on Bio-Inspired Information and Communications Technologies, vol. 3, pp. 21\u201326. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (2016)"},{"key":"1_CR26","unstructured":"Jung, W., Kim, S., Choi, S.: Deep learning for zero-day flash malware detection. In: 36th IEEE Symposium on Security and Privacy. IEEE (2015, poster)"},{"key":"1_CR27","unstructured":"Kingma, D.P., Ba, L.J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR). ICLR (2015, poster)"},{"key":"1_CR28","series-title":"Computational Methods in Applied Sciences","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-030-91293-2_21","volume-title":"Cyber Security","author":"M Kiperberg","year":"2022","unstructured":"Kiperberg, M., Resh, A., Zaidenberg, N.: Malware analysis. In: Lehto, M., Neittaanm\u00e4ki, P. (eds.) Cyber Security. CMAS, vol. 56, pp. 475\u2013484. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-91293-2_21"},{"key":"1_CR29","first-page":"80","volume":"3","author":"P Kobojek","year":"2016","unstructured":"Kobojek, P., Saeed, K.: Application of recurrent neural networks for user verification based on keystroke dynamics. J. Telecommun. Inf. Technol. 3, 80\u201390 (2016)","journal-title":"J. Telecommun. Inf. Technol."},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Kos, J., Fischer, I., Song, D.: Adversarial examples for generative model. In: IEEE Security and Privacy Workshops (SPW), pp. 36\u201342. IEEE, Piscataway (2018)","DOI":"10.1109\/SPW.2018.00014"},{"key":"1_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33383-0","volume-title":"Machine Learning for Evolution Strategies","author":"O Kramer","year":"2016","unstructured":"Kramer, O.: Machine Learning for Evolution Strategies. Springer, Cham (2016)"},{"key":"1_CR32","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. 467, 312\u2013322 (2018)","journal-title":"Inf. Sci."},{"key":"1_CR33","first-page":"3005","volume":"80","author":"AJ Li","year":"2018","unstructured":"Li, A.J., Madry, A., Peebles, J., Schmidt, L.: On the limitations of first-order approximation in GAN dynamics. Proc. Mach. Learn. Res. 80, 3005\u20133013 (2018)","journal-title":"Proc. Mach. Learn. Res."},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Li, W., Moore, A.: A machine learning approach for efficient traffic classification. In: 15th International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 310\u2013317. IEEE, Piscataway (2007)","DOI":"10.1109\/MASCOTS.2007.2"},{"key":"1_CR35","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/j.phpro.2012.03.206","volume":"25","author":"Y Li","year":"2012","unstructured":"Li, Y., Wu, H.: A clustering method based on k-means algorithm. Phys. Procedia 25, 1104\u20131109 (2012)","journal-title":"Phys. Procedia"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-031-05981-0_7","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Z Lin","year":"2022","unstructured":"Lin, Z., Shi, Y., Xue, Z.: IDSGAN: generative adversarial networks for attack generation against intrusion detection. In: Gama, J., Li, T., Yu, Y., Chen, E., Zheng, Y., Teng, F. (eds.) PAKDD 2022. LNAI, vol. 13282, pp. 79\u201391. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05981-0_7"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Liu, Z., Li, S., Zhang, Y., Yun, X., Cheng, Z.: Efficient malware originated traffic classification by using generative adversarial networks. In: IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137. IEEE, Piscataway (2020)","DOI":"10.1109\/ISCC50000.2020.9219561"},{"issue":"2","key":"1_CR38","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.tics.2021.11.008","volume":"26","author":"CM de Melo","year":"2022","unstructured":"de Melo, C.M., Torralba, A., Guibas, L., DiCarlo, J., Chellappa, R., Hodgins, J.: Next-generation deep learning based on simulators and synthetic data. Trends Cogn. Sci. 26(2), 174\u2013187 (2022)","journal-title":"Trends Cogn. Sci."},{"key":"1_CR39","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets. arXiv e-prints (2014)"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE, Piscataway (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"1_CR41","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-54525-2_39","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"HV Nath","year":"2014","unstructured":"Nath, H.V., Mehtre, B.M.: Static malware analysis using machine learning methods. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 440\u2013450. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54525-2_39"},{"key":"1_CR42","first-page":"1","volume":"3","author":"V Nikos","year":"2014","unstructured":"Nikos, V., Oscar, S., Luc, D.: Big data analytics for sophisticated attack detection. ISASCA J. 3, 1\u20138 (2014)","journal-title":"ISASCA J."},{"issue":"2","key":"1_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2022","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. 54(2), 1\u201338 (2022)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"1_CR44","first-page":"37","volume":"2","author":"DMW Powers","year":"2011","unstructured":"Powers, D.M.W.: Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation. Int. J. Mach. Learn. Technol. 2(1), 37\u201363 (2011)","journal-title":"Int. J. Mach. Learn. Technol."},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Sedgwick, P.: Pearson\u2019s correlation coefficient. Br. Med. J. 345, e4483-1\u2013e4483-2 (2012)","DOI":"10.1136\/bmj.e4483"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Seo, E., Song, H.M., Kim, H.K.: GIDS: GAN based intrusion detection system for in-vehicle network. In: 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1\u20136. IEEE, Piscataway (2018)","DOI":"10.1109\/PST.2018.8514157"},{"issue":"4","key":"1_CR47","doi-asserted-by":"publisher","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","volume":"28","author":"A Thakkar","year":"2021","unstructured":"Thakkar, A., Lohiyan, R.: A review on machine learning and deep learning perspectives of ids for IoT: recent updates, security issues, and challenges. Arch. Comput. Methods Eng. 28(4), 3211\u20133243 (2021)","journal-title":"Arch. Comput. Methods Eng."},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Torres, P., Catania, C., Garcia, S., Garino, C.G.: An analysis of recurrent neural networks for botnet detection behavior. In: Biennial Congress of Argentina (ARGENCON), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"1_CR49","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1016\/j.neucom.2017.11.018","volume":"275","author":"D Tran","year":"2018","unstructured":"Tran, D., Mac, H., Tong, V., Tran, H.A., Nguyen, L.G.: A LSTM based framework for handling multiclass imbalance in DGA botnet detection. Neurocomputing 275, 2401\u20132413 (2018)","journal-title":"Neurocomputing"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Usama, M., Asim, M., Latif, S., Qadir, J., Ala-Al-Fuqaha: Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 78\u201383. IEEE, Piscataway (2019)","DOI":"10.1109\/IWCMC.2019.8766353"},{"issue":"4","key":"1_CR51","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1109\/JAS.2017.7510583","volume":"4","author":"K Wang","year":"2017","unstructured":"Wang, K., Gou, C., Duan, Y., Lin, Y., Zheng, X., Wang, F.Y.: Generative adversarial networks: introduction and outlook. IEEE\/CAA J. Automatica Sinica 4(4), 588\u2013598 (2017)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"1_CR52","unstructured":"Wang, Z.: The applications of deep learning on traffic identification (2015). https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Wang-The-Applications-Of-Deep-Learning-On-Traffic-Identification-wp.pdf. Accessed 9 Nov 2022"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Yin, C., Zhu, Y., Liu, S., Fei, J., Zhang, H.: An enhancing framework for botnet detection using generative adversarial networks. In: International Conference on Artificial Intelligence and Big Data, pp. 228\u2013234. IEEE (2018)","DOI":"10.1109\/ICAIBD.2018.8396200"},{"key":"1_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1007\/978-3-319-70139-4_84","volume-title":"Neural Information Processing","author":"M Zhang","year":"2017","unstructured":"Zhang, M., Xu, B., Bai, S., Lu, S., Lin, Z.: A deep learning method to detect web attacks using a specially designed CNN. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.-S.M. (eds.) ICONIP 2017. LNCS, vol. 10638, pp. 828\u2013836. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70139-4_84"},{"key":"1_CR55","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.ins.2019.10.014","volume":"512","author":"M Zheng","year":"2020","unstructured":"Zheng, M., et al.: Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification. Inf. Sci. 512, 1009\u20131023 (2020)","journal-title":"Inf. Sci."}],"container-title":["Communications in Computer and Information Science","Deep Learning Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-39059-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T13:02:55Z","timestamp":1690722175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-39059-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031390586","9783031390593"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-39059-3_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DeLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Deep Learning Theory and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"delta2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/delta.scitevents.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}