{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:41:18Z","timestamp":1743147678372,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819754885"},{"type":"electronic","value":"9789819754892"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5489-2_25","type":"book-chapter","created":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T03:48:02Z","timestamp":1721965682000},"page":"283-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Network Intrusion Detection Method for\u00a0Unbalanced Data in\u00a0Open Scenarios"],"prefix":"10.1007","author":[{"given":"Zihui","family":"Gong","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"He","sequence":"additional","affiliation":[]},{"given":"Chuqing","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yanwu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,27]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"YH Xiao","year":"2019","unstructured":"Xiao, Y.H., Xing, C., Zhang, T.N., Zhao, Z.K.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1049\/iet-ifs.2018.5258","volume":"13","author":"Y Jia","year":"2019","unstructured":"Jia, Y., Wang, M., Wang, Y.: Network intrusion detection algorithm based on deep neural network. IET Inf. Secur. 13(1), 48\u201353 (2019)","journal-title":"IET Inf. Secur."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Heba, F.E., Darwish, A., Hassanien, A.E., Abrabam, A.: Principle components analysis and support vector machine based intrusion detection system. In: 2010 10th International Conference on Intelligent Systems Design and Applications, pp. 363\u2013367. IEEE (2010)","DOI":"10.1109\/ISDA.2010.5687239"},{"issue":"4","key":"25_CR4","first-page":"51","volume":"3","author":"HF Eid","year":"2013","unstructured":"Eid, H.F., Salama, M.A., Hassanien, A.E.: A feature selection approach for network intrusion classification: the bi-layer behavioral-based. Int. J. Comput. Vis. Image Process. (IJCVIP) 3(4), 51\u201359 (2013)","journal-title":"Int. J. Comput. Vis. Image Process. (IJCVIP)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Kodirov, E., Xiang, T., Gong, S.: Semantic autoencoder for zero-shot learning. In: Proceedings of the CVPR, pp. 4447\u20134456 (2017)","DOI":"10.1109\/CVPR.2017.473"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Lampert, C.H., Nickisch, H., Harmeling, S.: Learning to detect unseen object classes by between-class attribute transfer. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 951\u2013958. IEEE (2009)","DOI":"10.1109\/CVPRW.2009.5206594"},{"issue":"7","key":"25_CR7","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1109\/TPAMI.2017.2723882","volume":"40","author":"PX Peng","year":"2017","unstructured":"Peng, P.X., Tian, Y.H., Xiang, T., Wang, Y.W., Pontil, M., Huang, T.J.: Joint semantic and latent attribute modelling for cross-class transfer learning. IEEE Trans. Pattern Anal. Mach. Intell. 40(7), 1625\u20131638 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Jiang, H.J., Wang, R.P., Shan, S.G., Yang, Y., Chen, X.Y.: Learning discriminative latent attributes for zero-shot classification. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 4223\u20134232 (2017)","DOI":"10.1109\/ICCV.2017.453"},{"key":"25_CR9","unstructured":"Romera-Paredes, B., Torr, P.: An embarrassingly simple approach to zero-shot learning. In: International Conference on Machine Learning, pp. 2152\u20132161. PMLR (2015)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Xian, Y.Q., Akata, Z., Sharma, G., Nguyen, Q., Hein, M., Schiele, B.: Latent embeddings for zero-shot classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 69\u201377 (2016)","DOI":"10.1109\/CVPR.2016.15"},{"issue":"2","key":"25_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/52.582976","volume":"14","author":"DL Lee","year":"1997","unstructured":"Lee, D.L., Chuang, H., Seamons, K.: Document ranking and the vector-space model. IEEE Softw. 14(2), 67\u201375 (1997)","journal-title":"IEEE Softw."},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"25_CR13","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/TNNLS.2017.2716952","volume":"29","author":"CLP Chen","year":"2017","unstructured":"Chen, C.L.P., Liu, Z.L.: Broad learning system: an effective and efficient incremental learning system without the need for deep architecture. IEEE Trans. Neural Netw. Learn. Syst. 29(1), 10\u201324 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"4","key":"25_CR14","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/TNNLS.2018.2866622","volume":"30","author":"CLP Chen","year":"2018","unstructured":"Chen, C.L.P., Liu, Z.L., Feng, S.: Universal approximation capability of broad learning system and its structural variations. IEEE Trans. Neural Netw. Learn. Syst. 30(4), 1191\u20131204 (2018)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"121269","DOI":"10.1016\/j.energy.2021.121269","volume":"234","author":"ZW Chen","year":"2021","unstructured":"Chen, Z.W., Shi, N., Ji, Y.F., Nui, M., Wang, Y.R.: Lithium-ion batteries remaining useful life prediction based on BLS-RVM. Energy 234, 121269 (2021)","journal-title":"Energy"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Han, Z.Y., Fu, Z.Y., Chen, S., Yang, J.: Contrastive embedding for generalized zero-shot learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2371\u20132381 (2021)","DOI":"10.1109\/CVPR46437.2021.00240"},{"key":"25_CR17","doi-asserted-by":"publisher","unstructured":"Xie, G.S., et al.: Attentive region embedding network for zero-shot learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. Long Beach, pp. 9384\u20139393. IEEE (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00961","DOI":"10.1109\/CVPR.2019.00961"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Wu, Y., Cao, W., Liu, Y., Ming, Z., Li, J., Lu, B.: Semantic auto-encoder with L2-norm constraint for zero-shot learning. In: 2021 13th International Conference on Machine Learning and Computing, pp. 101\u2013105, 26 February 2021","DOI":"10.1145\/3457682.3457699"},{"key":"25_CR19","doi-asserted-by":"publisher","unstructured":"Cao, W., Zhou, C., Wu, Y., Ming, Z., Xu, Z., Zhang, J.: Research progress of zero-shot learning beyond computer vision. In: Qiu, M. (eds.) Algorithms and Architectures for Parallel Processing: 20th International Conference, ICA3PP 2020, New York City, NY, USA, 2\u20134 October 2020, Proceedings, Part II 20 2020, pp. 538\u2013551. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60239-0_36","DOI":"10.1007\/978-3-030-60239-0_36"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Zou, W., Xia, Y., Cao, W.: Dense broad learning system based on conjugate gradient. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20136. IEEE, 19 July 2020","DOI":"10.1109\/IJCNN48605.2020.9207124"},{"issue":"116","key":"25_CR21","doi-asserted-by":"publisher","first-page":"105353","DOI":"10.1016\/j.engappai.2022.105353","volume":"1","author":"W Zou","year":"2022","unstructured":"Zou, W., Xia, Y., Cao, W.: Broad learning system based on driving amount and optimization solution. Eng. Appl. Artif. Intell. 1(116), 105353 (2022)","journal-title":"Eng. Appl. Artif. Intell."}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5489-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T03:53:22Z","timestamp":1721966002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5489-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819754885","9789819754892"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5489-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Birmingham","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ai-edge.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}