{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:51:01Z","timestamp":1743033061087,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_31","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"343-354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Supervised Nonlinear Latent Feature Extraction and Regularized Random Weights Neural Network Modeling for Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Jian","family":"Tang","sequence":"first","affiliation":[]},{"given":"Liu","family":"Zhuo","sequence":"additional","affiliation":[]},{"given":"Meiying","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Chunlai","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Chaowen","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"10","key":"31_CR1","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"31_CR2","doi-asserted-by":"crossref","first-page":"961","DOI":"10.3233\/IFS-141378","volume":"28","author":"YH Zheng","year":"2015","unstructured":"Zheng, Y.H., Jeon, B.W., Xu, D.H., Wu, Q.M.J., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), 961\u2013973 (2015)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.011","volume":"66","author":"F Gianluigi","year":"2016","unstructured":"Gianluigi, F., Pietro, S.: Ensemble based collaborative and distributed intrusion detection systems: a survey. J. Netw. Comput. Appl. 66, 1\u201316 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.ymssp.2015.04.028","volume":"66","author":"J Tang","year":"2016","unstructured":"Tang, J., Yu, W., Chai, T., Liu, Z., Zhou, X.: Selective ensemble modeling load parameters of ball mill based on multi-scale frequency spectral features and sphere criterion. Mech. Syst. Signal Process. 66, 485\u2013504 (2016)","journal-title":"Mech. Syst. Signal Process."},{"issue":"1","key":"31_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.neucom.2011.05.028","volume":"78","author":"J Tang","year":"2012","unstructured":"Tang, J., Chai, T., Zhao, L., Yu, W., Yue, H.: Soft sensor for parameters of mill load based on multi-spectral segments PLS sub-models and on-line adaptive weighted fusion algorithm. Neurocomputing 78(1), 38\u201347 (2012)","journal-title":"Neurocomputing"},{"issue":"2","key":"31_CR6","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TNNLS.2014.2333664","volume":"26","author":"Y Motai","year":"2015","unstructured":"Motai, Y.: Kernel association for classification and prediction: a survey. IEEE Trans. Neural Netw. Learn. Syst. 26(2), 208\u2013223 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"9","key":"31_CR7","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J.X., Ma, J., Huang, L.H.: A new approach to intrusion detection usingartificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Wang, Z., Ho, D., Osman, S., Li, S.: Incremental learning for \u03bd-support vector regression. Neural Netw. Off. J. Int. Neural Netw. Soc. 67, 140\u2013150 (2015)","journal-title":"Neural Netw. Off. J. Int. Neural Netw. Soc."},{"issue":"7","key":"31_CR9","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403\u20131416 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.ins.2015.09.002","volume":"328","author":"FL Cao","year":"2016","unstructured":"Cao, F.L., Wang, D.H., Zhu, H.: An iterative learning algorithm for feedforward neural networks with random weights. Inf. Sci. 328, 546\u2013557 (2016)","journal-title":"Inf. Sci."},{"issue":"5","key":"31_CR11","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/2.144401","volume":"25","author":"YH Pao","year":"1992","unstructured":"Pao, Y.H., Takefuji, Y.: Functional-link net computing: theory, system architecture, and functionalities. Computer 25(5), 76\u201379 (1992)","journal-title":"Computer"},{"issue":"6","key":"31_CR12","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1109\/72.471375","volume":"6","author":"B Igelnik","year":"1995","unstructured":"Igelnik, B., Pao, Y.H.: Stochastic choice of basis functions in adaptive function approximation and the functional-link net. IEEE Trans. Neural Netw. 6(6), 1320\u20131329 (1995)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"2","key":"31_CR13","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/18.661502","volume":"44","author":"PL Bartlett","year":"1998","unstructured":"Bartlett, P.L.: The sample complexity of pattern classification with neural networks: the size of the weights is more important than the size of the network. IEEE Trans. Inf. Theory 44(2), 525\u2013536 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"31_CR14","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.1016\/j.eswa.2013.09.045","volume":"41","author":"FL Cao","year":"2014","unstructured":"Cao, F.L., Tan, Y.P., Cai, M.M.: Sparse algorithms of random weight networks and applications. Expert Syst. Appl. 41(5), 2457\u20132462 (2014)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T01:35:01Z","timestamp":1601170501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}