{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:02:41Z","timestamp":1755219761981,"version":"3.43.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819645657"},{"type":"electronic","value":"9789819645664"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4566-4_19","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T23:49:14Z","timestamp":1743551354000},"page":"271-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel and\u00a0Efficient Multi-scale Spatio-Temporal Residual Network for\u00a0Multi-class Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Nan","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhaojian","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiabin","family":"Ye","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Tang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xun","family":"Che","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yadang","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Cao, B., Li, C., Song, Y., Qin, Y., Chen, C.: Network intrusion detection model based on cnn and gru. Appl. Sci. 4184 (2022). https:\/\/doi.org\/10.3390\/app12094184, http:\/\/dx.doi.org\/10.3390\/app12094184","DOI":"10.3390\/app12094184"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. J. Jpn. Soc. Fuzzy Theory Intell. Inform. 177 (2017)","DOI":"10.3156\/jsoft.29.5_177_2"},{"key":"19_CR3","doi-asserted-by":"publisher","unstructured":"Henderson, N., Min, W., Rowe, J., Lester, J.: Multimodal player affect modeling with auxiliary classifier generative adversarial networks. In: Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, vol. 16, no. 1, pp. 224\u2013230 (October 2022). https:\/\/doi.org\/10.1609\/aiide.v16i1.7434","DOI":"10.1609\/aiide.v16i1.7434"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Jothi, B., Pushpalatha, M.: Wils-trs \u2014 a novel optimized deep learning based intrusion detection framework for iot networks. Pers. Ubiquitous Comput. 27(3), 1285\u20131301 (2023). https:\/\/doi.org\/10.1007\/s00779-021-01578-5","DOI":"10.1007\/s00779-021-01578-5"},{"key":"19_CR5","doi-asserted-by":"publisher","unstructured":"Lan, J., Liu, X., Li, B., Zhao, J.: A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection. Appl. Intell. 11705\u201311726 (2023). https:\/\/doi.org\/10.1007\/s10489-022-04076-0, http:\/\/dx.doi.org\/10.1007\/s10489-022-04076-0","DOI":"10.1007\/s10489-022-04076-0"},{"key":"19_CR6","doi-asserted-by":"publisher","unstructured":"Liao, J.: An intrusion detection model based on improved acgan in big data environment. Secur. Commun. Netw. 2022, 1\u20139 (2022). https:\/\/doi.org\/10.1155\/2022\/6821174","DOI":"10.1155\/2022\/6821174"},{"key":"19_CR7","doi-asserted-by":"publisher","unstructured":"Liu, G., Zhang, J.: Cnid: research of network intrusion detection based on convolutional neural network. Discret. Dyn. Nat. Soc. 1\u201311 (2020). https:\/\/doi.org\/10.1155\/2020\/4705982, http:\/\/dx.doi.org\/10.1155\/2020\/4705982","DOI":"10.1155\/2020\/4705982"},{"key":"19_CR8","doi-asserted-by":"publisher","unstructured":"Liu, R., Ji, C., Niu, J., Guo, B.: Research on intrusion detection method based on 1d-icnn-bigru. J. Phys.: Conf. Ser. 2347(1), 012001 (2022). https:\/\/doi.org\/10.1088\/1742-6596\/2347\/1\/012001","DOI":"10.1088\/1742-6596\/2347\/1\/012001"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Lu, Y., Cheung, Y.M., Tang, Y.Y.: Hybrid Sampling with Bagging for Class Imbalance Learning, pp. 14\u201326 (January 2016)","DOI":"10.1007\/978-3-319-31753-3_2"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Luo, S., Zhao, Z., Hu, Q., Liu, Y.: A hierarchical cnn-transformer model for network intrusion detection. In: 2nd International Conference on Applied Mathematics, Modelling, and Intelligent Computing (CAMMIC 2022), p.\u00a0278 (May 2022). https:\/\/doi.org\/10.1117\/12.2639876","DOI":"10.1117\/12.2639876"},{"key":"19_CR11","doi-asserted-by":"publisher","unstructured":"Lyu, J., Young\u00a0Lee, H., Liu, H.: Color matching generation algorithm for animation characters based on convolutional neural network. Comput. Intell. Neurosci. 1\u201313 (2022). https:\/\/doi.org\/10.1155\/2022\/3146488, http:\/\/dx.doi.org\/10.1155\/2022\/3146488","DOI":"10.1155\/2022\/3146488"},{"key":"19_CR12","doi-asserted-by":"publisher","unstructured":"Mozo, A., Gonz\u00e1lez-Prieto, A., Pastor, A., Gomez-Canaval, S., Talavera, E.: Synthetic flow-based cryptomining attack generation through generative adversarial networks. Sci. Rep. (2022). https:\/\/doi.org\/10.1038\/s41598-022-06057-2, http:\/\/dx.doi.org\/10.1038\/s41598-022-06057-2","DOI":"10.1038\/s41598-022-06057-2"},{"key":"19_CR13","doi-asserted-by":"publisher","unstructured":"Peng, W., Kong, X., Peng, G., Li, X., Wang, Z.: Network intrusion detection based on deep learning. In: 2019 International Conference on Communications, Information System and Computer Engineering (July 2019). https:\/\/doi.org\/10.1109\/cisce.2019.00102, http:\/\/dx.doi.org\/10.1109\/cisce.2019.00102","DOI":"10.1109\/cisce.2019.00102"},{"key":"19_CR14","doi-asserted-by":"publisher","unstructured":"Saviour, M.P.A., Samiappan, D.: Ipfs based storage authentication and access control model with optimization enabled deep learning for intrusion detection. Adv. Eng. Softw. 176, 103369 (2023). https:\/\/doi.org\/10.1016\/j.advengsoft.2022.103369","DOI":"10.1016\/j.advengsoft.2022.103369"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Shamsolmoali, P., Zareapoor, M., Shen, L., Sadka, A., Yang, J.: Imbalanced data learning by minority class augmentation using capsule adversarial networks. Neurocomputing (2020)","DOI":"10.1016\/j.neucom.2020.01.119"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Shao, S., Wang, P., Yan, R.: Generative adversarial networks for data augmentation in machine fault diagnosis. Comput. Ind. 85\u201393 (2019). https:\/\/doi.org\/10.1016\/j.compind.2019.01.001, http:\/\/dx.doi.org\/10.1016\/j.compind.2019.01.001","DOI":"10.1016\/j.compind.2019.01.001"},{"key":"19_CR17","doi-asserted-by":"publisher","unstructured":"Shen, W., et al.: Boundary sampling to boost mutation testing for deep learning models. Inf. Softw. Technol. 106413 (2021). https:\/\/doi.org\/10.1016\/j.infsof.2020.106413, http:\/\/dx.doi.org\/10.1016\/j.infsof.2020.106413","DOI":"10.1016\/j.infsof.2020.106413"},{"key":"19_CR18","doi-asserted-by":"publisher","unstructured":"Shi, G., et al.: Knowledge-guided synthetic medical image adversarial augmentation for ultrasonography thyroid nodule classification. Comput. Methods Programs Biomed. 105611 (2020). https:\/\/doi.org\/10.1016\/j.cmpb.2020.105611, http:\/\/dx.doi.org\/10.1016\/j.cmpb.2020.105611","DOI":"10.1016\/j.cmpb.2020.105611"},{"key":"19_CR19","doi-asserted-by":"publisher","unstructured":"Su, T., Sun, H., Zhu, J., Wang, S., Li, Y.: Bat: deep learning methods on network intrusion detection using nsl-kdd dataset. IEEE Access 29575\u201329585 (2020). https:\/\/doi.org\/10.1109\/access.2020.2972627, http:\/\/dx.doi.org\/10.1109\/access.2020.2972627","DOI":"10.1109\/access.2020.2972627"},{"key":"19_CR20","doi-asserted-by":"publisher","unstructured":"Wang, X., Wang, Q.: An abnormal traffic detection method using gcn-bilstm-attention in the internet of vehicles environment. EURASIP J. Wirel. Commun. Netw. (2023). https:\/\/doi.org\/10.1186\/s13638-023-02274-z, http:\/\/dx.doi.org\/10.1186\/s13638-023-02274-z","DOI":"10.1186\/s13638-023-02274-z"},{"key":"19_CR21","doi-asserted-by":"publisher","unstructured":"Wei, J., Chen, Y., Lai, Y., Wang, Y., Zhang, Z.: Domain adversarial neural network-based intrusion detection system for in-vehicle network variant attacks. IEEE Commun. Lett. 26(11), 2547\u20132551 (2022). https:\/\/doi.org\/10.1109\/lcomm.2022.3195486, https:\/\/doi.org\/10.1109\/lcomm.2022.3195486","DOI":"10.1109\/lcomm.2022.3195486"},{"key":"19_CR22","doi-asserted-by":"publisher","unstructured":"Yin, X., Chen, L.: Network intrusion detection method based on multi-scale cnn in internet of things. Mob. Inf. Syst. 1\u20138 (2022). https:\/\/doi.org\/10.1155\/2022\/8124831, http:\/\/dx.doi.org\/10.1155\/2022\/8124831","DOI":"10.1155\/2022\/8124831"},{"key":"19_CR23","doi-asserted-by":"publisher","unstructured":"Yu, H., Kang, C., Xiao, Y., Yang, Y.: Network intrusion detection method based on hybrid improved residual network blocks and bidirectional gated recurrent units. IEEE Access 11, 68961\u201368971 (2023). https:\/\/doi.org\/10.1109\/access.2023.3271866","DOI":"10.1109\/access.2023.3271866"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4566-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T08:34:07Z","timestamp":1754555647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4566-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819645657","9789819645664"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4566-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/ml4cs2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}