{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:50:10Z","timestamp":1747284610064,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031664557"},{"type":"electronic","value":"9783031664564"}],"license":[{"start":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T00:00:00Z","timestamp":1727568000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T00:00:00Z","timestamp":1727568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-66456-4_2","type":"book-chapter","created":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T06:01:58Z","timestamp":1727503318000},"page":"23-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SC-WGAN: GAN-Based Oversampling Method for\u00a0Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Wuxia","family":"Bai","sequence":"first","affiliation":[]},{"given":"Kailong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shenghui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bingqian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,29]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Wang, K., Zhang, J., Bai, G., Ko, R., Dong, J.S.: It\u2019s not just the site, it\u2019s the contents: intra-domain fingerprinting social media websites through CDN bursts. In: 30th The Web Conference (WWW) (2021). https:\/\/doi.org\/10.1109\/ICECCS2018.2018.00011","DOI":"10.1109\/ICECCS2018.2018.00011"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-023-00682-2","volume":"22","author":"OH Abdulganiyu","year":"2023","unstructured":"Abdulganiyu, O.H., Ait Tchakoucht, T., Saheed, Y.K.: A systematic literature review for network intrusion detection system (IDS). Int. J. Inf. Secur. 22, 1\u201338 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00682-2","journal-title":"Int. J. Inf. Secur."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-023-00794-9","volume":"23","author":"H Asad","year":"2023","unstructured":"Asad, H., Adhikari, S., Gashi, I.: A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems. Int. J. Inf. Secur. 23, 1\u201316 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00794-9","journal-title":"Int. J. Inf. Secur."},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"119030","DOI":"10.1016\/j.eswa.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst. Appl. 213, 119030 (2023)","journal-title":"Expert Syst. Appl."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Guo, Y., Xiong, G., Li, Z., Shi, J., Cui, M., Gou, G.: TA-GAN: Gan based traffic augmentation for imbalanced network traffic classification. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9533942"},{"issue":"11","key":"2_CR6","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, P., Zhou, X., Li, S., Zhang, M.: FLOWGAN: unbalanced network encrypted traffic identification method based on GAN. In: 2019 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom), pp. 975\u2013983. IEEE (2019)","DOI":"10.1109\/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00141"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"105662","DOI":"10.1016\/j.asoc.2019.105662","volume":"83","author":"G Kov\u00e1cs","year":"2019","unstructured":"Kov\u00e1cs, G.: An empirical comparison and evaluation of minority oversampling techniques on a large number of imbalanced datasets. Appl. Soft Comput. 83, 105662 (2019)","journal-title":"Appl. Soft Comput."},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1007\/11538059_91","volume-title":"Advances in Intelligent Computing","author":"H Han","year":"2005","unstructured":"Han, H., Wang, W.-Y., Mao, B.-H.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005, Part I. LNCS, vol. 3644, pp. 878\u2013887. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11538059_91"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"He, H., Bai, Y., Garcia, E.A., Li, S.: ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 1322\u20131328. IEEE (2008)","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"2_CR12","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: International Conference on Machine Learning, pp. 214\u2013223. PMLR (2017)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Vu, L., Bui, C.T., Nguyen, Q.U.: A deep learning based method for handling imbalanced problem in network traffic classification. In: Proceedings of the 8th International Symposium on Information and Communication Technology, pp. 333\u2013339 (2017)","DOI":"10.1145\/3155133.3155175"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.eswa.2017.09.030","volume":"91","author":"G Douzas","year":"2018","unstructured":"Douzas, G., Bacao, F.: Effective data generation for imbalanced learning using conditional generative adversarial networks. Expert Syst. Appl. 91, 464\u2013471 (2018)","journal-title":"Expert Syst. Appl."},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s00779-019-01332-y","volume":"25","author":"J Lee","year":"2021","unstructured":"Lee, J., Park, K.: GAN-based imbalanced data intrusion detection system. Pers. Ubiquit. Comput. 25, 121\u2013128 (2021)","journal-title":"Pers. Ubiquit. Comput."},{"key":"2_CR16","first-page":"1","volume":"2021","author":"X Liu","year":"2021","unstructured":"Liu, X., Li, T., Zhang, R., Wu, D., Liu, Y., Yang, Z.: A GAN and feature selection-based oversampling technique for intrusion detection. Secur. Commun. Netw. 2021, 1\u201315 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.cose.2018.12.012","volume":"82","author":"M Ring","year":"2019","unstructured":"Ring, M., Schl\u00f6r, D., Landes, D., Hotho, A.: Flow-based network traffic generation using generative adversarial networks. Comput. Secur. 82, 156\u2013172 (2019)","journal-title":"Comput. Secur."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Hao, X., et al.: Producing more with less: a GAN-based network attack detection approach for imbalanced data. In: 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 384\u2013390. IEEE (2021)","DOI":"10.1109\/CSCWD49262.2021.9437863"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"11512","DOI":"10.3934\/mbe.2022536","volume":"19","author":"X Gong","year":"2022","unstructured":"Gong, X., Jia, L., Li, N.: Research on mobile traffic data augmentation methods based on SA-ACGAN-GN. Math. Biosci. Eng. 19, 11512\u201311532 (2022)","journal-title":"Math. Biosci. Eng."},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.ins.2023.01.147","volume":"629","author":"H Ding","year":"2023","unstructured":"Ding, H., et al.: RVGAN-TL: a generative adversarial networks and transfer learning-based hybrid approach for imbalanced data classification. Inf. Sci. 629, 184\u2013203 (2023)","journal-title":"Inf. Sci."},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1016\/j.future.2022.12.024","volume":"141","author":"L Yuan","year":"2023","unstructured":"Yuan, L., Yu, S., Yang, Z., Duan, M., Li, K.: A data balancing approach based on generative adversarial network. Futur. Gener. Comput. Syst. 141, 768\u2013776 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"13635","DOI":"10.1007\/s00521-021-05993-w","volume":"33","author":"G Dlamini","year":"2021","unstructured":"Dlamini, G., Fahim, M.: DGM: a data generative model to improve minority class presence in anomaly detection domain. Neural Comput. Appl. 33, 13635\u201313646 (2021)","journal-title":"Neural Comput. Appl."},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"103054","DOI":"10.1016\/j.cose.2022.103054","volume":"125","author":"V Kumar","year":"2023","unstructured":"Kumar, V., Sinha, D.: Synthetic attack data generation model applying generative adversarial network for intrusion detection. Comput. Secur. 125, 103054 (2023)","journal-title":"Comput. Secur."},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"103432","DOI":"10.1016\/j.cose.2023.103432","volume":"134","author":"A Srivastava","year":"2023","unstructured":"Srivastava, A., Sinha, D., Kumar, V.: WCGAN-GP based synthetic attack data generation with GAN based feature selection for IDS. Comput. Secur. 134, 103432 (2023)","journal-title":"Comput. Secur."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.\u00a01\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp.\u00a01\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"11","key":"2_CR27","first-page":"2579","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(11), 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Lecture Notes in Computer Science","Engineering of Complex Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-66456-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T21:49:10Z","timestamp":1743889750000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-66456-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,29]]},"ISBN":["9783031664557","9783031664564"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-66456-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,9,29]]},"assertion":[{"value":"29 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICECCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering of Complex Computer Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceccs2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cyprusconferences.org\/iceccs2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}