{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:00:45Z","timestamp":1760598045520,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:00:00Z","timestamp":1621641600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:00:00Z","timestamp":1621641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877045"],"award-info":[{"award-number":["61877045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10489-020-02098-0","type":"journal-article","created":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T04:04:06Z","timestamp":1621656246000},"page":"1461-1476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An immune optimization based deterministic dendritic cell algorithm"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9705-4421","authenticated-orcid":false,"given":"Wen","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yiwen","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,22]]},"reference":[{"issue":"2","key":"2098_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.3233\/IDT-170315","volume":"12","author":"W Ahmad","year":"2018","unstructured":"Ahmad W, Narayanan A (2018) Time series data analysis using artificial immune system. Intell Decis Technol 12(2):119\u2013135","journal-title":"Intell Decis Technol"},{"key":"2098_CR2","doi-asserted-by":"crossref","unstructured":"Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. arXiv:08013549","DOI":"10.2139\/ssrn.2832054"},{"key":"2098_CR3","doi-asserted-by":"crossref","unstructured":"Ali KB, Chelly Z, Elouedi Z (2015) A new version of the dendritic cell immune algorithm based on the k-nearest neighbors. In: International conference on neural information processing. Springer, pp 688\u2013695","DOI":"10.1007\/978-3-319-26532-2_76"},{"issue":"2","key":"2098_CR4","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/TII.2017.2746761","volume":"14","author":"E Alizadeh","year":"2018","unstructured":"Alizadeh E, Meskin N, Khorasani K (2018) A dendritic cell immune system inspired scheme for sensor fault detection and isolation of wind turbines. IEEE Trans Industr Inform 14(2):545\u2013555","journal-title":"IEEE Trans Industr Inform"},{"key":"2098_CR5","volume-title":"Uci machine learning repository. UCI Machine Learning Repository University of California","author":"K Bache","year":"2013","unstructured":"Bache K, Lichman M (2013) Uci machine learning repository. UCI Machine Learning Repository University of California. School of Information and Computer Sciences, Irvine"},{"key":"2098_CR6","doi-asserted-by":"crossref","unstructured":"Chandola V, Mithal V, Kumar V (2008) Comparative evaluation of anomaly detection techniques for sequence data. In: Eighth IEEE international conference on data mining, pp 743\u2013748","DOI":"10.1109\/ICDM.2008.151"},{"issue":"3","key":"2098_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. Acm Comput Surv 41(3):1\u201358","journal-title":"Acm Comput Surv"},{"key":"2098_CR8","doi-asserted-by":"publisher","first-page":"100,432","DOI":"10.1016\/j.swevo.2018.08.009","volume":"50","author":"Z Chelly","year":"2019","unstructured":"Chelly Z (2019) A scalable and distributed dendritic cell algorithm for big data classification. Swarm Evol Comput 50:100,432","journal-title":"Swarm Evol Comput"},{"issue":"4","key":"2098_CR9","first-page":"1","volume":"1","author":"N Elisa","year":"2018","unstructured":"Elisa N, Yang L, Naik N (2018) Dendritic cell algorithm with optimised parameters using genetic algorithm. GECCO 1(4): 1\u20138","journal-title":"GECCO"},{"key":"2098_CR10","doi-asserted-by":"publisher","unstructured":"Elisa N, Yang L, Fu X, Naik N (2019) Dendritic cell algorithm enhancement using fuzzy inference system for network intrusion detection, pp 1\u20138. https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2019.8859006","DOI":"10.1109\/FUZZ-IEEE.2019.8859006"},{"key":"2098_CR11","unstructured":"Enderich L, Timm F, Rosenbaum L, Burgard W (2019) Learning multimodal fixed-point weights using gradient descent. arXiv:190707220"},{"key":"2098_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class svm with deep learning. Pattern Recogn 58:121\u2013134","journal-title":"Pattern Recogn"},{"key":"2098_CR13","doi-asserted-by":"crossref","unstructured":"Fujimaki TYRy, Machida K (2005) An approach to spacecraft anomaly detection problem using kernel feature space. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, pp 401\u2013410","DOI":"10.1145\/1081870.1081917"},{"issue":"7","key":"2098_CR14","doi-asserted-by":"publisher","first-page":"e3225","DOI":"10.1002\/cnm.3225","volume":"35","author":"E Goceri","year":"2019","unstructured":"Goceri E (2019) Diagnosis of alzheimer\u2019s disease with sobolev gradient-based optimization and 3d convolutional neural network. Int J Numer Methods Biomed Eng 35(7):e3225","journal-title":"Int J Numer Methods Biomed Eng"},{"issue":"4","key":"2098_CR15","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"FA Gonz\u00e1lez","year":"2003","unstructured":"Gonz\u00e1lez FA, Dasgupta D (2003) Anomaly detection using real-valued negative selection. Genet Program Evolvable Mach 4(4):383\u2013403","journal-title":"Genet Program Evolvable Mach"},{"key":"2098_CR16","doi-asserted-by":"crossref","unstructured":"Greensmith J (2015) Securing the internet of things with responsive artificial immune systems. In: Proceedings of the 2015 annual conference on genetic and evolutionary computation, pp 113\u2013120","DOI":"10.1145\/2739480.2754816"},{"key":"2098_CR17","doi-asserted-by":"crossref","unstructured":"Greensmith J (2019) Migration threshold tuning in the deterministic dendritic cell algorithm. In: International conference on theory and practice of natural computing. Springer, pp 122\u2013133","DOI":"10.1007\/978-3-030-34500-6_8"},{"key":"2098_CR18","doi-asserted-by":"crossref","unstructured":"Greensmith J, Aickelin U (2008) The deterministic dendritic cell algorithm. In: International conference on artificial immune systems. Springer, pp 291\u2013302","DOI":"10.1007\/978-3-540-85072-4_26"},{"key":"2098_CR19","doi-asserted-by":"crossref","unstructured":"Greensmith J, Gale MB (2017) The functional dendritic cell algorithm: a formal specification with Haskell. In: 2017 IEEE Congress on Evolutionary Computation (CEC). IEEE, pp 1787\u20131794","DOI":"10.1109\/CEC.2017.7969518"},{"key":"2098_CR20","doi-asserted-by":"crossref","unstructured":"Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: International conference on artificial immune systems. Springer, pp 153\u2013167","DOI":"10.1007\/11536444_12"},{"issue":"2","key":"2098_CR21","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s12065-008-0008-6","volume":"1","author":"J Greensmith","year":"2008","unstructured":"Greensmith J, Feyereisl J, Aickelin U (2008) The dca: some comparison. Evol Intel 1(2):85\u2013112","journal-title":"Evol Intel"},{"key":"2098_CR22","doi-asserted-by":"crossref","unstructured":"Igbe O, Ajayi O, Saadawi T (2017) Denial of service attack detection using dendritic cell algorithm. In: 2017 IEEE 8th annual ubiquitous computing, electronics and mobile communication conference (UEMCON). IEEE, pp 294\u2013299","DOI":"10.1109\/UEMCON.2017.8249054"},{"key":"2098_CR23","doi-asserted-by":"crossref","unstructured":"Igbe O, Darwish I, Saadawi T (2017) Deterministic dendritic cell algorithm application to smart grid cyber-attack detection. In: 2017 IEEE 4th international conference on cyber security and cloud computing (CSCloud). IEEE, pp 199\u2013204","DOI":"10.1109\/CSCloud.2017.12"},{"key":"2098_CR24","unstructured":"Lin Z, Shi Y, Xue Z (2018) IDSGAN: generative adversarial networks for attack generation against intrusion detection. arXiv:1809.02077"},{"key":"2098_CR25","doi-asserted-by":"crossref","unstructured":"Manzoor S, Shafiq MZ, Tabish SM, Farooq M (2009) A sense of \u2019danger\u2019 for windows processes. In: International conference on artificial immune systems. Springer, pp 220\u2013233","DOI":"10.1007\/978-3-642-03246-2_22"},{"issue":"1","key":"2098_CR26","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P Matzinger","year":"1994","unstructured":"Matzinger P (1994) Tolerance, danger, and the extended family. Annu Rev Immunol 12(1):991\u20131045","journal-title":"Annu Rev Immunol"},{"issue":"3","key":"2098_CR27","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/51.932724","volume":"20","author":"GB Moody","year":"2001","unstructured":"Moody GB, Mark RG (2001) The impact of the mitbih arrhythmia database. IEEE Eng Med Biol Mag 20(3):45\u201350","journal-title":"IEEE Eng Med Biol Mag"},{"key":"2098_CR28","doi-asserted-by":"crossref","unstructured":"Mukhtar N, Coghill GM, Pang W (2016) Fddca: a novel fuzzy deterministic dendritic cell algorithm. In: Proceedings of the 2016 on genetic and evolutionary computation conference companion, pp 1007\u20131010","DOI":"10.1145\/2908961.2931662"},{"key":"2098_CR29","doi-asserted-by":"crossref","unstructured":"Musselle CJ (2010) Insights into the antigen sampling component of the dendritic cell algorithm. In: International conference on artificial immune systems. Springer, pp 88\u2013101","DOI":"10.1007\/978-3-642-14547-6_8"},{"key":"2098_CR30","unstructured":"Shen A (1998) Nonlinear model of immunity. Shanghai Science and Technology Education Press"},{"key":"2098_CR31","doi-asserted-by":"publisher","first-page":"48,231","DOI":"10.1109\/ACCESS.2018.2863036","volume":"6","author":"N Sheraz","year":"2018","unstructured":"Sheraz N, Yasir S, Shehzad K, Khawar BM, Jihun H, Munwar IM, Kijun H (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48,231\u201348,246","journal-title":"IEEE Access"},{"issue":"4","key":"2098_CR32","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/TETCI.2017.2721449","volume":"1","author":"GC Silva","year":"2017","unstructured":"Silva GC, Caminhas WM, Errico LD (2017) Dendritic cell algorithm applied to ping scan investigation revisited: detection quality and performance analysis. IEEE Trans Emerg Topics Comput Intell 1(4):236\u2013247","journal-title":"IEEE Trans Emerg Topics Comput Intell"},{"key":"2098_CR33","doi-asserted-by":"crossref","unstructured":"Spence C, Parra L, Sajda P (2001) Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. In: Proceedings IEEE workshop on mathematical methods in biomedical image analysis (MMBIA 2001), vol 1, pp 3\u201310","DOI":"10.1109\/MMBIA.2001.991693"},{"key":"2098_CR34","doi-asserted-by":"crossref","unstructured":"Stibor T, Oates R, Kendall G, Garibaldi JM (2009) Geometrical insights into the dendritic cell algorithm. In: Proceedings of the 11th annual conference on genetic and evolutionary computation, pp 1275\u20131282","DOI":"10.1145\/1569901.1570072"},{"key":"2098_CR35","doi-asserted-by":"crossref","unstructured":"Wang W, Zhang C, Zhang Q (2013) An anomaly detection model based on cloud model and danger theory. In: International conference on trustworthy computing and services. Springer, pp 115\u2013122","DOI":"10.1007\/978-3-662-43908-1_15"},{"issue":"2","key":"2098_CR36","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s10489-014-0599-9","volume":"42","author":"X Xiao","year":"2015","unstructured":"Xiao X, Li T, Zhang R (2015) An immune optimization based real-valued negative selection algorithm. Appl Intell 42(2):289\u2013302","journal-title":"Appl Intell"},{"issue":"03002","key":"2098_CR37","first-page":"1","volume":"189","author":"Z Xun","year":"2018","unstructured":"Xun Z, Sicong C, Meng Z, Chengkun G, Sida Z, Peng X, Zhenghua X, Weishi Z, Nader A (2018) A state of the art survey of data mining-based fraud detection and credit scoring. MATEC Web of Conf 189(03002):1\u201315","journal-title":"MATEC Web of Conf"},{"issue":"2","key":"2098_CR38","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s12145-020-00442-z","volume":"13","author":"W Zhou","year":"2020","unstructured":"Zhou W, Dong H, Liang Y (2020) The deterministic dendritic cell algorithm with Haskell in earthquake magnitude prediction. Earth Sci Inform 13(2):447\u2013457","journal-title":"Earth Sci Inform"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-02098-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-020-02098-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-02098-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T01:10:55Z","timestamp":1642986655000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-020-02098-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,22]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2098"],"URL":"https:\/\/doi.org\/10.1007\/s10489-020-02098-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2021,5,22]]},"assertion":[{"value":"26 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}