{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:25:00Z","timestamp":1742966700281,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811675010"},{"type":"electronic","value":"9789811675027"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-7502-7_15","type":"book-chapter","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T09:06:55Z","timestamp":1635498415000},"page":"122-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Detection Method Based on Small Sample Learning"],"prefix":"10.1007","author":[{"given":"Hao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingxin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinyang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Xiulai","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Fran\u00e7ois, D., Wertz, V., Verleysen, M.: Choosing the metric: a simple model approach. In: Jankowski, N., Duch, W., Gra\u0327bczewski, K. (eds.) Meta-Learning in Computational Intelligence, vol. 358, pp. 97\u2013115. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20980-2_3","DOI":"10.1007\/978-3-642-20980-2_3"},{"key":"15_CR2","first-page":"2526","volume":"26","author":"B Lake","year":"2015","unstructured":"Lake, B., Salakhutdinov, R.: One-shot learning by inverting a compositional causal process. Adv. Neural. Inf. Process. Syst. 26, 2526\u20132534 (2015)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"8","key":"15_CR3","first-page":"2241","volume":"37","author":"XY Li","year":"2020","unstructured":"Li, X.Y., Long, S.P., Zhu, J.: Survey of few-shot learning based on deep neural network. Appl. Res. Comput. 37(8), 2241\u20132247 (2020)","journal-title":"Appl. Res. Comput."},{"key":"15_CR4","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. James P. Anderson Co, Fort, pp. 523\u2013544 (1980)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An Intrusion-Detection Model, pp. 879\u2013888. IEEE Press (1987)","DOI":"10.1109\/SP.1986.10010"},{"key":"15_CR6","unstructured":"Li, Z., Zhou, F., Chen, F., et al.: Meta-SGD: learning to learn quickly for few-shot learning. arXiv preprint arXiv:1707.09835, pp. 322\u2013433 (2017)"},{"key":"15_CR7","unstructured":"Ravi, S., Larochelle, H.: Optimization as a model for few-shot learning. In: 5th International Conference on Learning Representations, pp. 222\u2013283. ICLR, Toulon (2017)"},{"key":"15_CR8","first-page":"107","volume":"154","author":"Y Li","year":"2019","unstructured":"Li, Y., Xu, Y., Liu, Z., et al.: Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154, 107\u2013150 (2019)","journal-title":"Measurement"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.cose.2019.101681","volume":"89","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Ling, Y., Fu, X., et al.: Model of the intrusion detection system based on the integration of spatial-temporal features. Comput. Secur. 89, 101\u2013281 (2020)","journal-title":"Comput. Secur."},{"key":"15_CR10","unstructured":"Finn, C., Abbeel, P., Levine, S.: Model-agnostic meta-learning for fast adaptation of deep networks. In: Proceedings of the 34th International Conference on Machine Learning, vol. 70, pp. 1126\u20131135. PMLR, Sydney (2017)"},{"key":"15_CR11","unstructured":"Koch, G., Zemel, R., Salakhutdinov, R.: Siamese neural networks for one-shot image recognition. In: 32nd International Conference on Machine Learning, vol. 2, pp. 201\u2013332. IMLS, Lile (2015)"},{"key":"15_CR12","unstructured":"Vinyals, O., Blundell, C., Lillicrap, T., Wierstra, D.: Matching networks for one shot learning. In: Proceedings of the 30th Conference on Neural Information Processing Systems, pp. 3630\u20133638. Neural Information Processing Systems Foundation, Barcelona (2016)"},{"key":"15_CR13","unstructured":"Snell, J., Swersky, K., Zemel, R.: Prototypical networks for few-shot learning. In: Proceedings of the 31st Conference on Neural Information Processing Systems, vol. 2017-December, pp. 4077\u20134087. Neural Information Processing Systems Foundation, Long Beach (2017)"},{"key":"15_CR14","unstructured":"Wang, Y.X., Hebert, M.: Learning from small sample sets by combining unsupervised meta-training with CNNs. Advances in Neural Information Processing Systems 29-Proceedings of the 2016 Conference, vol. 0, 244\u2013252. Neural Information Processing Systems Foundation, Barcelona (2016)"},{"key":"15_CR15","unstructured":"Boney, R., Ilin, A.: Semi-supervised few-shot learning with MAML. In: 6th International Conference on Learning Representations, ICLR 2018-Workshop Track Proceedings, 22\u201332, International Conference on Learning Representations, Vancouver (2018)"},{"key":"15_CR16","unstructured":"Ren, M.Y., Triantafillou, E., Ravi, S., et al.: Meta-learning for semi-supervised few-shot classification. arXiv preprint arXiv:1803.00676, pp. 333\u2013344 (2018)"},{"key":"15_CR17","unstructured":"Liu, Y., Lee, J., Park, M., et al.: Learning to propagate labels: transductive propagation network for few-shot learning. arXiv preprint arXiv:1805.10002, pp. 888\u20131089 (2018)"},{"key":"15_CR18","unstructured":"Hou, R.B., Chang, H., Ma, B.P., et al.: Cross attention network for few-shot classification. In: 33rd Annual Conference on Neural Information Processing Systems, vol. 32, pp. 4003\u20134014. Neural Information Processing Systems Foundation, Vancouver (2019)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-319-49409-8_34","volume-title":"Computer Vision \u2013 ECCV 2016 Workshops","author":"B Chu","year":"2016","unstructured":"Chu, B., Madhavan, V., Beijbom, O., Hoffman, J., Darrell, T.: Best practices for fine-tuning visual classifiers to new domains. In: Hua, G., J\u00e9gou, H. (eds.) ECCV 2016. LNCS, vol. 9915, pp. 435\u2013442. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49409-8_34"}],"container-title":["Communications in Computer and Information Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7502-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T09:10:47Z","timestamp":1635498647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7502-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811675010","9789811675027"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7502-7_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/dmbd2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"258","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}