{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:53:02Z","timestamp":1774536782789,"version":"3.50.1"},"reference-count":83,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 61872038"],"award-info":[{"award-number":["Grant No. 61872038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10462-021-09976-0","type":"journal-article","created":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T03:02:46Z","timestamp":1615604566000},"page":"1029-1053","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":206,"title":["Artificial intelligence in cyber security: research advances, challenges, and opportunities"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9065-8724","authenticated-orcid":false,"given":"Zhimin","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6413-193X","authenticated-orcid":false,"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Feifei","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"Farha","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiabo","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,13]]},"reference":[{"key":"9976_CR1","unstructured":"Adekunle YA, Okolie SO, Adebayo AO, Ebiesuwa S, Ehiwe DD (2019) Holistic exploration of gaps vis-\u00e0-vis artificial intelligence in automated teller machine and internet banking. In: International journal of applied information systems (IJAIS), vol\u00a012"},{"issue":"1","key":"9976_CR2","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s41044-016-0006-0","volume":"1","author":"AE Abdallah","year":"2016","unstructured":"Abdallah AE (2016) Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis. Big Data Anal 1(1):6","journal-title":"Big Data Anal"},{"key":"9976_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2015","unstructured":"Ahmed M, Mahmood AN, Hu J (2015) A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60:19\u201331","journal-title":"J. Netw. Comput. Appl."},{"key":"9976_CR4","doi-asserted-by":"crossref","unstructured":"Aljamal I, Tekeo\u011flu A, Bekiroglu K, Sengupta S (2019) Hybrid intrusion detection system using machine learning techniques in cloud computing environments. In: 2019 IEEE 17th international conference on software engineering research, management and applications (SERA), pp 84\u201389","DOI":"10.1109\/SERA.2019.8886794"},{"key":"9976_CR5","doi-asserted-by":"crossref","unstructured":"Aljurayban NS, Emam A (2015) Framework for cloud intrusion detection system service. In: 2015 2nd world symposium on web applications and networking (WSWAN), pp 1\u20135","DOI":"10.1109\/WSWAN.2015.7210298"},{"key":"9976_CR6","doi-asserted-by":"crossref","unstructured":"Amberkar A, Awasarmol P, Deshmukh G, Dave P (2018) Speech recognition using recurrent neural networks. In: 2018 international conference on current trends towards converging technologies (ICCTCT), pp 1\u20134","DOI":"10.1109\/ICCTCT.2018.8551185"},{"key":"9976_CR7","doi-asserted-by":"crossref","unstructured":"Bakhshi B, Veisi H (2019) End to end fingerprint verification based on convolutional neural network. In: 2019 27th Iranian conference on electrical engineering (ICEE), pp 1994\u20131998","DOI":"10.1109\/IranianCEE.2019.8786720"},{"key":"9976_CR8","doi-asserted-by":"crossref","unstructured":"Bao H, He H, Liu Z, Liu Z (2019) Research on information security situation awareness system based on big data and artificial intelligence technology. In: 2019 international conference on robots intelligent system (ICRIS), pp 318\u2013322","DOI":"10.1109\/ICRIS.2019.00087"},{"key":"9976_CR9","doi-asserted-by":"crossref","unstructured":"Benias N, Markopoulos AP (2017) A review on the readiness level and cyber-security challenges in industry 4.0. In: 2017 south eastern European design automation, computer engineering, computer networks and social media conference (SEEDA-CECNSM), pp 1\u20135","DOI":"10.23919\/SEEDA-CECNSM.2017.8088234"},{"key":"9976_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-34111-8_3","volume-title":"Advances in artificial intelligence","author":"C Chang","year":"2016","unstructured":"Chang C, Eude T, Obando Carbajal LE (2016) Biometric authentication by keystroke dynamics for remote evaluation with one-class classification. In: Khoury R, Drummond C (eds) Advances in artificial intelligence. Springer, Cham, pp 21\u201332"},{"key":"9976_CR11","doi-asserted-by":"crossref","unstructured":"Deng M, Yang H, Cao J, Feng X (2019) View-invariant gait recognition based on deterministic learning and knowledge fusion. In: 2019 international joint conference on neural networks (IJCNN), pp 1\u20138","DOI":"10.1109\/IJCNN.2019.8852249"},{"issue":"4","key":"9976_CR12","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/TPAMI.2017.2700390","volume":"40","author":"C Ding","year":"2018","unstructured":"Ding C, Tao D (2018) Trunk-branch ensemble convolutional neural networks for video-based face recognition. IEEE Trans Pattern Anal Mach Intell 40(4):1002\u20131014","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9976_CR13","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1016\/j.cie.2018.01.006","volume":"125","author":"Z Dongmei","year":"2018","unstructured":"Dongmei Z, Jinxing L (2018) Study on network security situation awareness based on particle swarm optimization algorithm. Comput Ind Eng 125:764\u2013775. https:\/\/doi.org\/10.1016\/j.cie.2018.01.006","journal-title":"Comput Ind Eng"},{"key":"9976_CR14","doi-asserted-by":"crossref","unstructured":"Fairuz S, Habaebi MH, Elsheikh EMA (2018) Finger vein identification based on transfer learning of alexnet. In: 2018 7th international conference on computer and communication engineering (ICCCE), pp 465\u2013469","DOI":"10.1109\/ICCCE.2018.8539256"},{"key":"9976_CR15","doi-asserted-by":"publisher","first-page":"7700","DOI":"10.1109\/ACCESS.2018.2803446","volume":"6","author":"L Fern\u00e1ndez Maim\u00f3","year":"2018","unstructured":"Fern\u00e1ndez Maim\u00f3 L, Perales G\u00f3mez AL, Garc\u00eda Clemente FJ, Gil P\u00e9rez M, Mart\u00ednez P\u00e9rez G (2018) A self-adaptive deep learning-based system for anomaly detection in 5g networks. IEEE Access 6:7700\u20137712","journal-title":"IEEE Access"},{"key":"9976_CR16","doi-asserted-by":"crossref","unstructured":"Gangwar A, Joshi A (2016) Deepirisnet: deep iris representation with applications in iris recognition and cross-sensor iris recognition. In: 2016 IEEE international conference on image processing (ICIP), pp 2301\u20132305","DOI":"10.1109\/ICIP.2016.7532769"},{"key":"9976_CR17","unstructured":"Gu T, Dolan-Gavitt B, Garg S (2017) BadNets: identifying vulnerabilities in the machine learning model supply chain. ArXiv e-prints arXiv:1708.06733"},{"issue":"1","key":"9976_CR18","first-page":"48","volume":"4","author":"Y Guan","year":"2018","unstructured":"Guan Y, Ge X (2018) Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans Signal Inf Process Netw 4(1):48\u201359","journal-title":"IEEE Trans Signal Inf Process Netw"},{"key":"9976_CR19","doi-asserted-by":"crossref","unstructured":"Han Z, Wang J (2019) Speech emotion recognition based on deep learning and kernel nonlinear PSVM. In: 2019 Chinese control and decision conference (CCDC), pp. 1426\u20131430","DOI":"10.1109\/CCDC.2019.8832414"},{"key":"9976_CR20","doi-asserted-by":"crossref","unstructured":"Hariyanto, Sudiro SA, Lukman S (2015) Minutiae matching algorithm using artificial neural network for fingerprint recognition. In: 2015 3rd international conference on artificial intelligence, modelling and simulation (AIMS), pp 37\u201341","DOI":"10.1109\/AIMS.2015.16"},{"key":"9976_CR21","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-45507-5_6","volume-title":"Availability, reliability, and security in information systems","author":"A Holzinger","year":"2016","unstructured":"Holzinger A, Plass M, Holzinger K, Cri\u015fan GC, Pintea CM, Palade V (2016) Towards interactive machine learning (IML): applying ant colony algorithms to solve the traveling salesman problem with the human-in-the-loop approach. In: Buccafurri F, Holzinger A, Kieseberg P, Tjoa AM, Weippl E (eds) Availability, reliability, and security in information systems. Springer, Cham, pp 81\u201395"},{"key":"9976_CR22","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.3390\/s17061297","volume":"17","author":"H Hong","year":"2017","unstructured":"Hong H, Lee M, Park K (2017) Convolutional neural network-based finger-vein recognition using nir image sensors. Sensors (Switzerland) 17:1297. https:\/\/doi.org\/10.3390\/s17061297","journal-title":"Sensors (Switzerland)"},{"key":"9976_CR23","doi-asserted-by":"crossref","unstructured":"Hsieh C, Chan T (2016) Detection ddos attacks based on neural-network using apache spark. In: 2016 international conference on applied system innovation (ICASI), pp 1\u20134","DOI":"10.1109\/ICASI.2016.7539833"},{"key":"9976_CR24","unstructured":"Hu W, Tan Y (2017) Generating adversarial malware examples for black-box attacks based on gan. CoRR. http:\/\/arxiv.org\/abs\/1702.05983"},{"issue":"11","key":"9976_CR25","first-page":"16","volume":"5","author":"K Jenab","year":"2016","unstructured":"Jenab K, Moslehpour S (2016) Cyber security management: a review. Soc. Bus. Manag. Dyn. 5(11):16\u201339","journal-title":"Soc. Bus. Manag. Dyn."},{"key":"9976_CR26","doi-asserted-by":"crossref","unstructured":"Ji Y, Bowman B, Huang HH (2019) Securing malware cognitive systems against adversarial attacks. In: 2019 IEEE international conference on cognitive computing (ICCC), pp 1\u20139","DOI":"10.1109\/ICCC.2019.00014"},{"key":"9976_CR27","doi-asserted-by":"crossref","unstructured":"Jyothi V, Wang X, Addepalli SK, Karri R (2016) Brain: behavior based adaptive intrusion detection in networks: Using hardware performance counters to detect ddos attacks. In: 2016 29th international conference on VLSI design and 2016 15th international conference on embedded systems (VLSID), pp 587\u2013588","DOI":"10.1109\/VLSID.2016.115"},{"key":"9976_CR28","unstructured":"Sugandhi K, Raju G (2019) An efficient hog-centroid descriptor for human gait recognition. In: 2019 amity international conference on artificial intelligence (AICAI), pp 355\u2013360"},{"key":"9976_CR29","doi-asserted-by":"crossref","unstructured":"Kanimozhi, V, Jacob TP (2019) Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset cse-cic-ids2018 using cloud computing. In: 2019 international conference on communication and signal processing (ICCSP), pp 0033\u20130036","DOI":"10.1109\/ICCSP.2019.8698029"},{"key":"9976_CR30","doi-asserted-by":"crossref","unstructured":"Kolosnjaji B, Demontis A, Biggio B, Maiorca D, Giacinto G, Eckert C, Roli F (2018) Adversarial malware binaries: evading deep learning for malware detection in executables. In: 2018 26th European signal processing conference (EUSIPCO), pp 533\u2013537","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"9976_CR31","doi-asserted-by":"crossref","unstructured":"Kong L, Huang G, Wu K (2017) Identification of abnormal network traffic using support vector machine. In: 2017 18th international conference on parallel and distributed computing, applications and technologies (PDCAT), pp 288\u2013292","DOI":"10.1109\/PDCAT.2017.00054"},{"key":"9976_CR32","doi-asserted-by":"crossref","unstructured":"Kong L, Huang G, Wu K, Tang Q, Ye S (2018) Comparison of internet traffic identification on machine learning methods. In: 2018 international conference on big data and artificial intelligence (BDAI), pp 38\u201341","DOI":"10.1109\/BDAI.2018.8546682"},{"key":"9976_CR33","doi-asserted-by":"publisher","unstructured":"Kong L, Huang G, Zhou Y, Ye J (2018) Fast abnormal identification for large scale internet traffic. In: Proceedings of the 8th international conference on communication and network security, ICCNS 2018. Association for Computing Machinery, New York, pp 117\u2013120 (2018). https:\/\/doi.org\/10.1145\/3290480.3290498","DOI":"10.1145\/3290480.3290498"},{"key":"9976_CR34","doi-asserted-by":"crossref","unstructured":"Korkmaz Y (2016) Developing password security system by using artificial neural networks in user log in systems. In: 2016 electric electronics, computer science, biomedical engineerings\u2019 meeting (EBBT), pp 1\u20134","DOI":"10.1109\/EBBT.2016.7483682"},{"key":"9976_CR35","first-page":"181","volume":"96","author":"W Kowert","year":"2017","unstructured":"Kowert W (2017) The foreseeability of human-artificial intelligence interactions. Texas Law Rev 96:181\u2013204","journal-title":"Texas Law Rev"},{"key":"9976_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/THC-161263","volume":"25","author":"C Kruse","year":"2016","unstructured":"Kruse C, Frederick B, Jacobson T, Monticone D (2016) Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care 25:1\u201310. https:\/\/doi.org\/10.3233\/THC-161263","journal-title":"Technol Health Care"},{"key":"9976_CR37","doi-asserted-by":"crossref","unstructured":"Li C, Li XM (2017) Cyber performance situation awareness on fuzzy correlation analysis. In: 2017 3rd IEEE international conference on computer and communications (ICCC), pp 424\u2013428","DOI":"10.1109\/CompComm.2017.8322583"},{"key":"9976_CR38","doi-asserted-by":"crossref","unstructured":"Li X, Zhang X, Wang D (2018) Spatiotemporal cyberspace situation awareness mechanism for backbone networks. In: 2018 4th international conference on big data computing and communications (BIGCOM), pp 168\u2013173","DOI":"10.1109\/BIGCOM.2018.00034"},{"key":"9976_CR39","doi-asserted-by":"crossref","unstructured":"Liu W, Li W, Sun L, Zhang L, Chen P (2017) Finger vein recognition based on deep learning. In: 2017 12th IEEE conference on industrial electronics and applications (ICIEA), pp 205\u2013210","DOI":"10.1109\/ICIEA.2017.8282842"},{"issue":"3","key":"9976_CR40","doi-asserted-by":"publisher","first-page":"3068","DOI":"10.1109\/TVT.2020.2967026","volume":"69","author":"X Lu","year":"2020","unstructured":"Lu X, Xiao L, Xu T, Zhao Y, Tang Y, Zhuang W (2020) Reinforcement learning based PHY authentication for Vanets. IEEE Trans Veh Technol 69(3):3068\u20133079","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"9976_CR41","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","volume":"6","author":"Y Lu","year":"2019","unstructured":"Lu Y, Xu LD (2019) Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J 6(2):2103\u20132115","journal-title":"IEEE Internet Things J"},{"key":"9976_CR42","doi-asserted-by":"crossref","unstructured":"Mahmood T, Afzal U (2013) Security analytics: big data analytics for cybersecurity: a review of trends, techniques and tools. In: 2013 2nd national conference on information assurance (NCIA), pp 129\u2013134","DOI":"10.1109\/NCIA.2013.6725337"},{"key":"9976_CR43","doi-asserted-by":"publisher","first-page":"59657","DOI":"10.1109\/ACCESS.2018.2875045","volume":"6","author":"N Marir","year":"2018","unstructured":"Marir N, Wang H, Feng G, Li B, Jia M (2018) Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6:59657\u201359671","journal-title":"IEEE Access"},{"key":"9976_CR44","doi-asserted-by":"crossref","unstructured":"McIntire JP, McIntire LK, Havig PR (2009) A variety of automated turing tests for network security: Using ai-hard problems in perception and cognition to ensure secure collaborations. In: 2009 international symposium on collaborative technologies and systems, pp 155\u2013162","DOI":"10.1109\/CTS.2009.5067476"},{"key":"9976_CR45","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.dss.2014.01.004","volume":"59","author":"M Naderpour","year":"2014","unstructured":"Naderpour M, Lu J, Zhang G (2014) An intelligent situation awareness support system for safety-critical environments. Decis Support Syst 59:325\u2013340. https:\/\/doi.org\/10.1016\/j.dss.2014.01.004","journal-title":"Decis Support Syst"},{"key":"9976_CR46","doi-asserted-by":"crossref","unstructured":"Nithyakani P, Shanthini A, Ponsam G (2019) Human gait recognition using deep convolutional neural network. In: 2019 3rd international conference on computing and communications technologies (ICCCT), pp 208\u2013211","DOI":"10.1109\/ICCCT2.2019.8824836"},{"issue":"2","key":"9976_CR47","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/COMST.2015.2398816","volume":"17","author":"DS Nunes","year":"2015","unstructured":"Nunes DS, Zhang P, S\u00e1 Silva J (2015) A survey on human-in-the-loop applications towards an internet of all. IEEE Commun Surv Tutor 17(2):944\u2013965","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"9976_CR48","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TITB.2009.2019637","volume":"13","author":"S Ozsen","year":"2009","unstructured":"Ozsen S, Gunes S, Kara S, Latifoglu F (2009) Use of kernel functions in artificial immune systems for the nonlinear classification problems. IEEE Trans Inf Technol Biomed 13(4):621\u2013628","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"3","key":"9976_CR49","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/s11036-015-0644-x","volume":"21","author":"N Pandeeswari","year":"2016","unstructured":"Pandeeswari N, Kumar G (2016) Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob Netw Appl 21(3):494\u2013505","journal-title":"Mob Netw Appl"},{"key":"9976_CR50","doi-asserted-by":"publisher","first-page":"2697","DOI":"10.1109\/TASLP.2020.3023632","volume":"28","author":"S Parthasarathy","year":"2019","unstructured":"Parthasarathy S, Busso C (2019) Semi-supervised speech emotion recognition with ladder networks. IEEE\/ACM Trans Audio, Speech, Lang Process 28:2697\u20132709","journal-title":"IEEE\/ACM Trans Audio, Speech, Lang Process"},{"key":"9976_CR51","doi-asserted-by":"crossref","unstructured":"P\u0103v\u0103loi L, Ni\u0163\u0103 CD (2018) Iris recognition using sift descriptors with different distance measures. In: 2018 10th international conference on electronics, computers and artificial intelligence (ECAI), pp 1\u20134","DOI":"10.1109\/ECAI.2018.8678987"},{"issue":"2\u20133","key":"9976_CR52","first-page":"175","volume":"86","author":"M Qiu","year":"2017","unstructured":"Qiu M (2017) Keystroke biometric systems for user authentication. J Signal Process Syst 86(2\u20133):175\u2013190","journal-title":"J Signal Process Syst"},{"key":"9976_CR53","doi-asserted-by":"crossref","unstructured":"Saeed F, Hussain M, Aboalsamh HA (2018) Classification of live scanned fingerprints using histogram of gradient descriptor. In: 2018 21st Saudi computer society national computer conference (NCC), pp 1\u20135","DOI":"10.1109\/NCG.2018.8592949"},{"key":"9976_CR54","doi-asserted-by":"crossref","unstructured":"Salyut J, Kurnaz C (2018) Profile face recognition using local binary patterns with artificial neural network. In: 2018 international conference on artificial intelligence and data processing (IDAP), pp 1\u20134","DOI":"10.1109\/IDAP.2018.8620840"},{"key":"9976_CR55","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-319-72598-7_13","volume-title":"Information systems security","author":"GR Santhanam","year":"2017","unstructured":"Santhanam GR, Holland B, Kothari S, Ranade N (2017) Human-on-the-loop automation for detecting software side-channel vulnerabilities. In: Shyamasundar RK, Singh V, Vaidya J (eds) Information systems security. Springer, Cham, pp 209\u2013230"},{"key":"9976_CR56","doi-asserted-by":"crossref","unstructured":"Schlegel U, Arnout H, El-Assady M, Oelke D, Keim DA (2019) Towards a rigorous evaluation of xai methods on time series. In: 2019 IEEE\/CVF international conference on computer vision workshop (ICCVW), pp 4197\u20134201","DOI":"10.1109\/ICCVW.2019.00516"},{"key":"9976_CR57","first-page":"1","volume":"2016","author":"J Shelton","year":"2016","unstructured":"Shelton J, Jenkins J, Roy K (2016) Micro-dimensional feature extraction for multispectral iris recognition. SoutheastCon 2016:1\u20135","journal-title":"SoutheastCon"},{"key":"9976_CR58","doi-asserted-by":"publisher","first-page":"182","DOI":"10.4236\/jcc.2017.57016","volume":"5","author":"Y Shi","year":"2017","unstructured":"Shi Y, Li T, Renfa L, Peng X, Tang P (2017) An immunity-based iot environment security situation awareness model. J Comput Commun 5:182\u2013197. https:\/\/doi.org\/10.4236\/jcc.2017.57016","journal-title":"J Comput Commun"},{"key":"9976_CR59","doi-asserted-by":"crossref","unstructured":"Shoufan A (2017) Continuous authentication of uav flight command data using behaviometrics. In: 2017 IFIP\/IEEE international conference on very large scale integration (VLSI-SoC), pp 1\u20136","DOI":"10.1109\/VLSI-SoC.2017.8203494"},{"key":"9976_CR60","doi-asserted-by":"crossref","unstructured":"Singh K, Kumar J, Tripathi G, Chullai GA (2017) Sparse proximity based robust fingerprint recognition. In: 2017 international conference on computing, communication and automation (ICCCA), pp 1025\u20131028","DOI":"10.1109\/CCAA.2017.8229991"},{"key":"9976_CR61","doi-asserted-by":"crossref","unstructured":"Sliti M, Abdallah W, Boudriga N (2018) Jamming attack detection in optical uav networks. In: 2018 20th international conference on transparent optical networks (ICTON), pp 1\u20135","DOI":"10.1109\/ICTON.2018.8473921"},{"issue":"5","key":"9976_CR62","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evolut Comput 23(5):828\u2013841","journal-title":"IEEE Trans Evolut Comput"},{"issue":"2","key":"9976_CR63","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2019","unstructured":"Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KKR (2019) A systematic literature review of blockchain cyber security. Digit Commun Netw 6(2):147\u2013156","journal-title":"Digit Commun Netw"},{"key":"9976_CR64","doi-asserted-by":"crossref","unstructured":"Thongsook A, Nunthawarasilp T, Kraypet P, Lim J, Ruangpayoongsak N (2019) C4.5 decision tree against neural network on gait phase recognition for lower limp exoskeleton. In: 2019 1st international symposium on instrumentation, control, artificial intelligence, and robotics (ICA-SYMP), pp 69\u201372","DOI":"10.1109\/ICA-SYMP.2019.8646253"},{"key":"9976_CR65","doi-asserted-by":"publisher","unstructured":"Tyworth M, Giacobe NA, Mancuso VF, McNeese MD, Hall DL (2013) A human-in-the-loop approach to understanding situation awareness in cyber defence analysis. EAI End Trans Secur Saf. https:\/\/doi.org\/10.4108\/trans.sesa.01-06.2013.e6","DOI":"10.4108\/trans.sesa.01-06.2013.e6"},{"key":"9976_CR66","doi-asserted-by":"crossref","unstructured":"Uddin MZ, Khaksar W, Torresen J (2017) A robust gait recognition system using spatiotemporal features and deep learning. In: 2017 IEEE international conference on multisensor fusion and integration for intelligent systems (MFI), pp 156\u2013161","DOI":"10.1109\/MFI.2017.8170422"},{"key":"9976_CR67","doi-asserted-by":"crossref","unstructured":"Veeramachaneni K, Arnaldo I, Korrapati V, Bassias C, Li K (2016) Ai$$\\hat{2}$$: Training a big data machine to defend. In: 2016 IEEE 2nd international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS), pp 49\u201354","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"issue":"4","key":"9976_CR68","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/LOCS.2019.2927959","volume":"2","author":"M Verma","year":"2019","unstructured":"Verma M, Vipparthi SK, Singh G (2019) Hinet: hybrid inherited feature learning network for facial expression recognition. IEEE Lett Comput Soc 2(4):36\u201339","journal-title":"IEEE Lett Comput Soc"},{"issue":"9","key":"9976_CR69","doi-asserted-by":"publisher","first-page":"5946","DOI":"10.1007\/s11227-019-02896-5","volume":"75","author":"Z Wang","year":"2019","unstructured":"Wang Z, Fang B (2019) Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. J Supercomput 75(9):5946\u20135964","journal-title":"J Supercomput"},{"key":"9976_CR70","doi-asserted-by":"publisher","unstructured":"Wang ZJ, Turko R, Shaikh O, Park H, Das N, Hohman F, Kahng M, Chau DH (2020) CNN explainer: learning convolutional neural networks with interactive visualization. IEEE Trans Vis Comput Gr. https:\/\/doi.org\/10.1109\/TVCG.2020.3030418","DOI":"10.1109\/TVCG.2020.3030418"},{"key":"9976_CR71","doi-asserted-by":"crossref","unstructured":"Xiao R, Zhu H, Song C, Liu X, Dong J, Li H (2018) Attacking network isolation in software-defined networks: New attacks and countermeasures. In: 2018 27th international conference on computer communication and networks (ICCCN), pp 1\u20139","DOI":"10.1109\/ICCCN.2018.8487340"},{"key":"9976_CR72","doi-asserted-by":"publisher","unstructured":"Yang H, Jia Y, Han WH, Nie YP, Li SD, Zhao XJ (2019) Calculation of network security index based on convolution neural networks, pp 530\u2013540. https:\/\/doi.org\/10.1007\/978-3-030-24271-8_47","DOI":"10.1007\/978-3-030-24271-8_47"},{"issue":"7","key":"9976_CR73","doi-asserted-by":"publisher","first-page":"4244","DOI":"10.1109\/TII.2019.2900665","volume":"15","author":"W Yang","year":"2019","unstructured":"Yang W, Wang S, Hu J, Zheng G, Yang J, Valli C (2019) Securing deep learning based edge finger vein biometrics with binary decision diagram. IEEE Trans Ind Inform 15(7):4244\u20134253","journal-title":"IEEE Trans Ind Inform"},{"key":"9976_CR74","doi-asserted-by":"crossref","unstructured":"Yavanoglu O, Aydos M (2017) A review on cyber security datasets for machine learning algorithms. In: 2017 IEEE international conference on big data (big data), pp 2186\u20132193","DOI":"10.1109\/BigData.2017.8258167"},{"key":"9976_CR75","unstructured":"Young Park C, Blackmond Laskey K, Costa PCG, Matsumoto S (2016) A process for human-aided multi-entity bayesian networks learning in predictive situation awareness. In: 2016 19th international conference on information fusion (FUSION), pp 2116\u20132124"},{"key":"9976_CR76","doi-asserted-by":"crossref","unstructured":"Yuan X, Li C, Li X (2017) Deepdefense: identifying ddos attack via deep learning. In: 2017 IEEE international conference on smart computing (SMARTCOMP), pp 1\u20138","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"9976_CR77","doi-asserted-by":"crossref","unstructured":"Yunhu Jin, Shen Y, Zhang G, Hua Zhi (2016) The model of network security situation assessment based on random forest. In: 2016 7th IEEE international conference on software engineering and service science (ICSESS), pp 977\u2013980","DOI":"10.1109\/ICSESS.2016.7883229"},{"key":"9976_CR78","doi-asserted-by":"publisher","first-page":"65402","DOI":"10.1109\/ACCESS.2020.2984711","volume":"8","author":"J Zeng","year":"2020","unstructured":"Zeng J, Wang F, Deng J, Qin C, Zhai Y, Gan J, Piuri V (2020) Finger vein verification algorithm based on fully convolutional neural network and conditional random field. IEEE Access 8:65402\u201365419","journal-title":"IEEE Access"},{"key":"9976_CR79","unstructured":"Zeng Y, Qi Z, Chen W, Huang Y, Zheng X, Qiu H (2019) Test: an end-to-end network traffic examination and identification framework based on spatio-temporal features extraction. CoRR. http:\/\/arxiv.org\/abs\/1908.10271"},{"key":"9976_CR80","doi-asserted-by":"publisher","first-page":"85082","DOI":"10.1109\/ACCESS.2019.2924464","volume":"7","author":"W Zhang","year":"2019","unstructured":"Zhang W, Lu X, Gu Y, Liu Y, Meng X, Li J (2019) A robust iris segmentation scheme based on improved u-net. IEEE Access 7:85082\u201385089","journal-title":"IEEE Access"},{"key":"9976_CR81","doi-asserted-by":"publisher","first-page":"119904","DOI":"10.1109\/ACCESS.2019.2933165","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Chen X, Guo D, Song M, Teng Y, Wang X (2019) PCCN: Parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access 7:119904\u2013119916","journal-title":"IEEE Access"},{"key":"9976_CR82","doi-asserted-by":"publisher","first-page":"159821","DOI":"10.1109\/ACCESS.2019.2950698","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Li W, Zhang L, Ning X, Sun L, Lu Y (2019) Adaptive learning Gabor filter for finger-vein recognition. IEEE Access 7:159821\u2013159830","journal-title":"IEEE Access"},{"issue":"9","key":"9976_CR83","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.13374\/j.issn2095-9389.2019.11.19.001","volume":"42","author":"Z Zhang","year":"2020","unstructured":"Zhang Z, Shi F, Wan Y, Xu Y, Zhang F, Ning H (2020) Application progress of artificial intelligence in military confrontation. Chin J Eng 42(9):1106\u20131118. https:\/\/doi.org\/10.13374\/j.issn2095-9389.2019.11.19.001","journal-title":"Chin J Eng"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-021-09976-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-021-09976-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-021-09976-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T20:06:07Z","timestamp":1644609967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-021-09976-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,13]]},"references-count":83,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["9976"],"URL":"https:\/\/doi.org\/10.1007\/s10462-021-09976-0","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,13]]},"assertion":[{"value":"13 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}