{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:18:26Z","timestamp":1743124706947,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031442124"},{"type":"electronic","value":"9783031442131"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44213-1_46","type":"book-chapter","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T05:01:41Z","timestamp":1695272501000},"page":"554-565","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SR-IDS: A Novel Network Intrusion Detection System Based on\u00a0Self-taught Learning and\u00a0Representation Learning"],"prefix":"10.1007","author":[{"given":"Qinghao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Geying","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xiaowen","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahmad, R., Li, L.H., Sharma, A.K., Tanone, R.: Boundary-seeking GAN approach to improve classification of intrusion detection systems based on machine learning model. In: 2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM), pp. 1\u20135. IEEE (2023)","key":"46_CR1","DOI":"10.1109\/IMCOM56909.2023.10035580"},{"key":"46_CR2","doi-asserted-by":"publisher","first-page":"118745","DOI":"10.1016\/j.eswa.2022.118745","volume":"213","author":"OA Alghanam","year":"2023","unstructured":"Alghanam, O.A., Almobaideen, W., Saadeh, M., Adwan, O.: An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Syst. Appl. 213, 118745 (2023)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Anwer, H.M., Farouk, M., Abdel-Hamid, A.: A framework for efficient network anomaly intrusion detection with features selection. In: 2018 9th International Conference on Information and Communication Systems (ICICS), pp. 157\u2013162. IEEE (2018)","key":"46_CR3","DOI":"10.1109\/IACS.2018.8355459"},{"key":"46_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ins.2022.03.065","volume":"598","author":"A Basati","year":"2022","unstructured":"Basati, A., Faghih, M.M.: PDAE: efficient network intrusion detection in IoT using parallel deep auto-encoders. Inf. Sci. 598, 57\u201374 (2022)","journal-title":"Inf. Sci."},{"issue":"8","key":"46_CR5","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio, Y., Courville, A., Vincent, P.: Representation learning: a review and new perspectives. IEEE Trans. Pattern Anal. Mach. Intell. 35(8), 1798\u20131828 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"9","key":"46_CR6","doi-asserted-by":"publisher","first-page":"4184","DOI":"10.3390\/app12094184","volume":"12","author":"B Cao","year":"2022","unstructured":"Cao, B., Li, C., Song, Y., Qin, Y., Chen, C.: Network intrusion detection model based on CNN and GRU. Appl. Sci. 12(9), 4184 (2022)","journal-title":"Appl. Sci."},{"key":"46_CR7","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","volume":"131","author":"H Ding","year":"2022","unstructured":"Ding, H., Chen, L., Dong, L., Fu, Z., Cui, X.: Imbalanced data classification: a KNN and generative adversarial networks-based hybrid approach for intrusion detection. Futur. Gener. Comput. Syst. 131, 240\u2013254 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"46_CR8","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s11036-021-01838-x","volume":"27","author":"R Du","year":"2022","unstructured":"Du, R., Li, Y., Liang, X., Tian, J.: Support vector machine intrusion detection scheme based on cloud-fog collaboration. Mob. Netw. Appl. 27(1), 431\u2013440 (2022)","journal-title":"Mob. Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Faker, O., Dogdu, E.: Intrusion detection using big data and deep learning techniques. In: Proceedings of the 2019 ACM Southeast Conference, pp. 86\u201393 (2019)","key":"46_CR9","DOI":"10.1145\/3299815.3314439"},{"issue":"3","key":"46_CR10","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/fi12030044","volume":"12","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Ahmim, A., Derdour, M., Janicke, H.: RDTIDS: rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet 12(3), 44 (2020)","journal-title":"Future Internet"},{"key":"46_CR11","doi-asserted-by":"publisher","first-page":"102158","DOI":"10.1016\/j.cose.2020.102158","volume":"103","author":"J Gu","year":"2021","unstructured":"Gu, J., Lu, S.: An effective intrusion detection approach using SVM with na\u00efve bayes feature embedding. Comput. Secur. 103, 102158 (2021)","journal-title":"Comput. Secur."},{"issue":"5","key":"46_CR12","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.3390\/app12052351","volume":"12","author":"AS Iliyasu","year":"2022","unstructured":"Iliyasu, A.S., Abdurrahman, U.A., Zheng, L.: Few-shot network intrusion detection using discriminative representation learning with supervised autoencoder. Appl. Sci. 12(5), 2351 (2022)","journal-title":"Appl. Sci."},{"key":"46_CR13","doi-asserted-by":"publisher","first-page":"115524","DOI":"10.1016\/j.eswa.2021.115524","volume":"185","author":"Y Imrana","year":"2021","unstructured":"Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional LSTM deep learning approach for intrusion detection. Expert Syst. Appl. 185, 115524 (2021)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Imrana, Y., et al.: $$\\chi $$ 2-BidLSTM: a feature driven intrusion detection system based on $$\\chi $$ 2 statistical model and bidirectional LSTM. Sensors 22(5), 2018 (2022)","key":"46_CR14","DOI":"10.3390\/s22052018"},{"doi-asserted-by":"crossref","unstructured":"Le Jeune, L., Goedem\u00e9, T., Mentens, N.: Feature dimensionality in CNN acceleration for high-throughput network intrusion detection. In: 2022 32nd International Conference on Field-Programmable Logic and Applications (FPL), pp. 366\u2013374. IEEE (2022)","key":"46_CR15","DOI":"10.1109\/FPL57034.2022.00062"},{"issue":"20","key":"46_CR16","doi-asserted-by":"publisher","first-page":"4221","DOI":"10.3390\/app9204221","volume":"9","author":"J Lee","year":"2019","unstructured":"Lee, J., Park, K.: AE-CGAN model based high performance network intrusion detection system. Appl. Sci. 9(20), 4221 (2019)","journal-title":"Appl. Sci."},{"doi-asserted-by":"crossref","unstructured":"Long, C., Xiao, J., Wei, J., Zhao, J., Wan, W., Du, G.: Autoencoder ensembles for network intrusion detection. In: 2022 24th International Conference on Advanced Communication Technology (ICACT), pp. 323\u2013333. IEEE (2022)","key":"46_CR17","DOI":"10.23919\/ICACT53585.2022.9728934"},{"key":"46_CR18","doi-asserted-by":"publisher","first-page":"119030","DOI":"10.1016\/j.eswa.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst. Appl. 213, 119030 (2023)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1\u20136. IEEE (2015)","key":"46_CR19","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"5","key":"46_CR20","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1049\/iet-com.2019.0172","volume":"14","author":"P Nancy","year":"2020","unstructured":"Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S., Selvi, M., Arputharaj, K.: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun. 14(5), 888\u2013895 (2020)","journal-title":"IET Commun."},{"issue":"10","key":"46_CR21","first-page":"84","volume":"8","author":"P Nerlikar","year":"2020","unstructured":"Nerlikar, P., Pandey, S., Sharma, S., Bagade, S.: Analysis of intrusion detection using machine learning techniques. Int. J. Comput. Netw. Commun. Secur. 8(10), 84\u201393 (2020)","journal-title":"Int. J. Comput. Netw. Commun. Secur."},{"doi-asserted-by":"crossref","unstructured":"Raina, R., Battle, A., Lee, H., Packer, B., Ng, A.Y.: Self-taught learning: transfer learning from unlabeled data. In: Proceedings of the 24th International Conference on Machine Learning, pp. 759\u2013766 (2007)","key":"46_CR22","DOI":"10.1145\/1273496.1273592"},{"key":"46_CR23","doi-asserted-by":"publisher","first-page":"107720","DOI":"10.1016\/j.compeleceng.2022.107720","volume":"99","author":"SK Sahu","year":"2022","unstructured":"Sahu, S.K., Mohapatra, D.P., Rout, J.K., Sahoo, K.S., Pham, Q.V., Dao, N.N.: A LSTM-FCNN based multi-class intrusion detection using scalable framework. Comput. Electr. Eng. 99, 107720 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"46_CR24","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"46_CR25","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1007\/s00521-017-3128-z","volume":"31","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Rhee, K.H.: An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. 31, 955\u2013965 (2019)","journal-title":"Neural Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","key":"46_CR26","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"1","key":"46_CR27","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10462-021-10037-9","volume":"55","author":"A Thakkar","year":"2022","unstructured":"Thakkar, A., Lohiya, R.: A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif. Intell. Rev. 55(1), 453\u2013563 (2022)","journal-title":"Artif. Intell. Rev."},{"key":"46_CR28","doi-asserted-by":"publisher","first-page":"38688","DOI":"10.1109\/ACCESS.2019.2905754","volume":"7","author":"Q Tian","year":"2019","unstructured":"Tian, Q., Li, J., Liu, H.: A method for guaranteeing wireless communication based on a combination of deep and shallow learning. IEEE Access 7, 38688\u201338695 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Yong, L., Bo, Z.: An intrusion detection model based on multi-scale CNN. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 214\u2013218. IEEE (2019)","key":"46_CR29","DOI":"10.1109\/ITNEC.2019.8729261"},{"doi-asserted-by":"crossref","unstructured":"Zhou, Y., Han, M., Liu, L., He, J.S., Wang, Y.: Deep learning approach for cyberattack detection. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 262\u2013267. IEEE (2018)","key":"46_CR30","DOI":"10.1109\/INFCOMW.2018.8407032"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44213-1_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T06:23:52Z","timestamp":1695277432000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44213-1_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031442124","9783031442131"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44213-1_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easyacademia.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"947","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"426","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"type of other papers accepted  : 9 Abstract","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}