{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:01:10Z","timestamp":1764842470441,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736212"],"award-info":[{"award-number":["U1736212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19A2068"],"award-info":[{"award-number":["U19A2068"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032002"],"award-info":[{"award-number":["62032002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10489-021-02323-4","type":"journal-article","created":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T21:07:50Z","timestamp":1620162470000},"page":"482-500","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Using known nonself samples to improve negative selection algorithm"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4061-5969","authenticated-orcid":false,"given":"Zhiyong","family":"Li","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"issue":"1-3","key":"2323_CR1","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0167-2789(86)90240-X","volume":"22","author":"JD Farmer","year":"1986","unstructured":"Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning[J]. Phys D Nonlinear Phenom 22(1-3):187\u2013204","journal-title":"Phys D Nonlinear Phenom"},{"key":"2323_CR2","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1038\/415468a","volume":"415","author":"E Klarreich","year":"2002","unstructured":"Klarreich E (2002) Inspired by immunity. Nature 415:648\u2013670","journal-title":"Nature"},{"key":"2323_CR3","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1126\/science.1095845","volume":"304","author":"J Balthrop","year":"2004","unstructured":"Balthrop J, Forrest S, Newman MEJ, et al. (2004) Technological networks and the spread of computer viruses. Science 304:527\u2013529","journal-title":"Science"},{"key":"2323_CR4","first-page":"159","volume":"34.1","author":"Z-Z Jin","year":"2013","unstructured":"Jin Z-Z, Liao M-H, Xiao G (2013) Survey of negative selection algorithms. J Chin Inst Commun 34.1:159\u2013170","journal-title":"J Chin Inst Commun"},{"key":"2323_CR5","unstructured":"Forrest S., Perelson A.S., Allen L, et al. (1994) Self-nonself discrimination in a computer[C]. In: Proceedings of the 1994 IEEE symposium on security and privacy, IEEE computer society"},{"issue":"4","key":"2323_CR6","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"FA Gonz\u00e1lez","year":"2003","unstructured":"Gonz\u00e1lez F.A, Dasgupta D (2003) Anomaly detection using real-valued negative selection [J]. Genetic Programming and Evolvable Machine 4(4):383\u2013403","journal-title":"Genetic Programming and Evolvable Machine"},{"key":"2323_CR7","doi-asserted-by":"crossref","unstructured":"Zhou J, Dasgupta D (2004) Real-valued negative selection algorithm with detectors[C]. In: Proceedings genetic and evolutionary computation conference (GECCO), pp 287\u2013298","DOI":"10.1007\/978-3-540-24854-5_30"},{"issue":"10","key":"2323_CR8","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1016\/j.ins.2008.12.015","volume":"179","author":"Z Ji","year":"2009","unstructured":"Ji Z, Dasgupta D (2009) V-detector: An efficient negative selection algorithm with probably adequate detector coverage[J]. Inf Sci 179(10):1390\u20131406","journal-title":"Inf Sci"},{"issue":"5","key":"2323_CR9","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1109\/JSEN.2017.2787997","volume":"18","author":"Z Sun","year":"2018","unstructured":"Sun Z, Xu Y, Liang G, et al. (2018) An intrusion detection model for wireless sensor networks with an improved V-detector algorithm[J]. IEEE Sensors J 18(5):1971\u20131984","journal-title":"IEEE Sensors J"},{"key":"2323_CR10","unstructured":"Xinping XU, Wang R, Jiang L, et al. (2018) Research on fault diagnosis of rotor based on improved V-detector algorithm[J]. DEStech Transactions on Engineering and Technology Research"},{"key":"2323_CR11","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.asoc.2017.09.005","volume":"61","author":"T Yang","year":"2017","unstructured":"Yang T, Chen W, Li T (2017) An antigen space density based real-value negative selection algorithm[J]. Appl Soft Comput 61:860\u2013874","journal-title":"Appl Soft Comput"},{"key":"2323_CR12","doi-asserted-by":"publisher","first-page":"44967","DOI":"10.1109\/ACCESS.2020.2976875","volume":"8","author":"C Yang","year":"2020","unstructured":"Yang C, Jia L, Chen BQ, et al. (2020) Negative selection algorithm based on antigen density clustering[J]. IEEE Access 8:44967\u201344975","journal-title":"IEEE Access"},{"issue":"4","key":"2323_CR13","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S Hofmeyr","year":"2000","unstructured":"Hofmeyr S, Forrest S. (2000) Architecture for an artificial immune system[J]. Evol Comput 8(4):443\u2013473","journal-title":"Evol Comput"},{"issue":"5","key":"2323_CR14","doi-asserted-by":"publisher","first-page":"12429","DOI":"10.1007\/s10586-017-1643-4","volume":"22","author":"G Bhuvaneswari","year":"2019","unstructured":"Bhuvaneswari G, Manikandan G (2019) An intelligent intrusion detection system for secure wireless communication using IPSO and negative selection classifier[J]. Clust Comput 22(5):12429\u201312441","journal-title":"Clust Comput"},{"key":"2323_CR15","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.ijcip.2018.08.002","volume":"23","author":"X Clotet","year":"2018","unstructured":"Clotet X, Moyano J, Le\u00f3n G (2018) A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of critical infrastructures[J]. Int J Crit Infrastruct Prot 23:11\u201320","journal-title":"Int J Crit Infrastruct Prot"},{"key":"2323_CR16","doi-asserted-by":"publisher","first-page":"3475","DOI":"10.1007\/s00521-019-04396-2","volume":"32","author":"NB Aissa","year":"2020","unstructured":"Aissa NB, Guerroumi M, Derhab A (2020) NSNAD: negative selection-based network anomaly detection approach with relevant feature subset[J]. Neural Comput Appl 32:3475\u20133501","journal-title":"Neural Comput Appl"},{"key":"2323_CR17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.engappai.2015.12.014","volume":"50","author":"D Li","year":"2016","unstructured":"Li D, Liu S, Zhang H (2016) A boundary-fixed negative selection algorithm with online adaptive learning under small samples for anomaly detection[J]. Eng Appl Artif Intell 50:93\u2013105","journal-title":"Eng Appl Artif Intell"},{"key":"2323_CR18","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.eswa.2016.03.042","volume":"60","author":"P Saurabh","year":"2016","unstructured":"Saurabh P, Verma B (2016) An efficient proactive artificial immune system based anomaly detection and prevention system[J]. Exp Syst Applic 60:311\u2013320","journal-title":"Exp Syst Applic"},{"key":"2323_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/2063089","volume":"2018","author":"T Lu","year":"2018","unstructured":"Lu T, Zhang L, Fu Y (2018) A novel Immune-Inspired shellcode detection algorithm based on hyperellipsoid detectors[J]. Secur Commun Netw 2018:1\u201310","journal-title":"Secur Commun Netw"},{"key":"2323_CR20","doi-asserted-by":"crossref","unstructured":"Outa R, et al. (2020) Prognosis and fail detection in a dynamic rotor using artificial immunological system. Engineering Computations","DOI":"10.1108\/EC-08-2019-0351"},{"issue":"3","key":"2323_CR21","doi-asserted-by":"publisher","first-page":"2960","DOI":"10.1109\/JSYST.2017.2753851","volume":"12","author":"A Abid","year":"2018","unstructured":"Abid A, Khan MT, De Silva CW, et al. (2018) Layered and real-valued negative selection algorithm for fault detection[J]. IEEE Syst J 12(3):2960\u20132969","journal-title":"IEEE Syst J"},{"key":"2323_CR22","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.patcog.2016.11.026","volume":"64","author":"LI Dong","year":"2017","unstructured":"Dong LI, Liu S, Zhang H (2017) A method of anomaly detection and fault diagnosis with online adaptive learning under small training samples[J]. Pattern Recogn 64:374\u2013385","journal-title":"Pattern Recogn"},{"key":"2323_CR23","doi-asserted-by":"publisher","first-page":"109444","DOI":"10.1016\/j.engstruct.2019.109444","volume":"197","author":"A Barontini","year":"2019","unstructured":"Barontini A, Perera R, Masciotta MG, et al. (2019) Deterministically generated negative selection algorithm for damage detection in civil engineering systems[J]. Eng Struct 197:109444","journal-title":"Eng Struct"},{"issue":"2","key":"2323_CR24","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z Ji","year":"2007","unstructured":"Ji Z, Dasgupta D (2007) Revisiting negative selection algorithms[J]. Evol Comput 15(2):223\u2013251","journal-title":"Evol Comput"},{"key":"2323_CR25","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.engappai.2013.12.001","volume":"28","author":"I Idris","year":"2014","unstructured":"Idris I, Selamat A, Omatu S (2014) Hybrid email spam detection model with negative selection algorithm and differential evolution. Appl Artif Intell 28:97\u2013110","journal-title":"Appl Artif Intell"},{"key":"2323_CR26","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.asoc.2015.03.031","volume":"32","author":"L Cui","year":"2015","unstructured":"Cui L, Pi D, Chen C. (2015) BIORV-NSA bidirectional inhibition optimization r-variable negative selection algorithm and its application[J]. Appl Soft Comput 32:544\u2013552","journal-title":"Appl Soft Comput"},{"key":"2323_CR27","doi-asserted-by":"publisher","first-page":"51886","DOI":"10.1109\/ACCESS.2019.2911660","volume":"7","author":"Z Fan","year":"2019","unstructured":"Fan Z, Wen C, Tao L, et al. (2019) An antigen space triangulation coverage based real-value negative selection algorithm[J]. IEEE Access 7:51886\u201351898","journal-title":"IEEE Access"},{"key":"2323_CR28","unstructured":"Hsu CW, Chang CC, Lin CJ (2016) A practical guide to support vector classification[J]"},{"key":"2323_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ymssp.2018.02.016","volume":"108","author":"R Liu","year":"2018","unstructured":"Liu R, Yang B, Zio E, et al. (2018) Artificial intelligence for fault diagnosis of rotating machinery: A review[J]. Mech Syst Signal Process 108:33\u201347","journal-title":"Mech Syst Signal Process"},{"issue":"4","key":"2323_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCI.2006.329705","volume":"1","author":"D Dasgupta","year":"2006","unstructured":"Dasgupta D. (2006) Advances in artificial immune systems[J]. IEEE Comput Intell Mag 1 (4):40\u201349","journal-title":"IEEE Comput Intell Mag"},{"key":"2323_CR31","unstructured":"Evans MJ, Rosenthal JS (2010) Probability and statistics: the science of uncertainty (Second Edition). W. H. Freeman and company. ISBN-10: 1429224622"},{"key":"2323_CR32","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.ins.2017.08.062","volume":"420","author":"C Wen","year":"2017","unstructured":"Wen C, Tao L (2017) Parameter analysis of negative selection algorithm[J]. Inf Sci 420:218\u2013234","journal-title":"Inf Sci"},{"key":"2323_CR33","doi-asserted-by":"crossref","unstructured":"Exponential function, Last accessed: 2020-08-01. [Online]. Available:https:\/\/en.wikipedia.org\/wiki\/Exponential_function","DOI":"10.33140\/ATCP.01.03.05"},{"key":"2323_CR34","unstructured":"Lim T-S (1999) Haberman\u2019s survival data set, UCI machine learning repository. Last accessed: 2021-01-10. [Online]. Available:https:\/\/archive.ics.uci.edu\/ml\/datasets\/Haberman%27s+Survival"},{"key":"2323_CR35","unstructured":"Christensen R (2015) Thoughts on prediction and cross-validation[J]. Department of Mathematics and Statistics University of New Mexico"},{"key":"2323_CR36","unstructured":"Chang C-C, Lin C-J (2019) LIBSVM\u2013a library for support vector machines. Version 3.24 released on September 11, 2019. Last accessed:2020-12-01. Available:https:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm\/"},{"key":"2323_CR37","first-page":"94","volume":"106423","author":"D Li","year":"2020","unstructured":"Li D, Liu S, Gao F, et al. (2020) Continual learning classification method with new labeled data based on the artificial immune system[J]. Appl Soft Comput 106423:94","journal-title":"Appl Soft Comput"},{"key":"2323_CR38","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.eswa.2019.04.011","volume":"129","author":"X Tao","year":"2019","unstructured":"Tao X, Li Q, Ren C, et al. (2019) Real-value negative selection over-sampling for imbalanced data set learning[J]. Expert Syst Appl 129:118\u2013134","journal-title":"Expert Syst Appl"},{"key":"2323_CR39","unstructured":"Fisher RA (1988) Iris data set, UCI machine learning repository. Last accessed: 2021-01-10. [Online]. Available:http:\/\/archive.ics.uci.edu\/ml\/datasets\/Iris"},{"key":"2323_CR40","unstructured":"Volker L (2013) Banknote authentication data set, UCI machine learning repository. Last accessed: 2021-01-10. [Online]. Available:https:\/\/archive.ics.uci.edu\/ml\/datasets\/banknote+authenticationhttps:\/\/archive.ics.uci.edu\/ml\/datasets\/banknote+authentication"},{"key":"2323_CR41","unstructured":"Bhatt R, Dhall A (2012) Skin segmentation data set, UCI machine learning repository. Last accessed: 2021-01-10. [Online]. Available:https:\/\/archive.ics.uci.edu\/ml\/datasets\/Skin+Segmentation"},{"key":"2323_CR42","unstructured":"Turney P (1990) Pima Indians diabetes data set, [Online]. Last Accessed: 2021-01-10. Available: http:\/\/networkrepository.com\/pima-indians-diabetes.php"},{"key":"2323_CR43","unstructured":"Siegler RS (1994) Balance scale data set, UCI machine learning repository, [Online]. Last Accessed: 2021-01-10. Available:http:\/\/archive.ics.uci.edu\/ml\/datasets\/Balance+Scale"},{"key":"2323_CR44","unstructured":"Wolberg WH, Street N, Mangasarian OL (1995) Breast cancer wisconsin (Diagnostic) data set, UCI machine learning repository. Last accessed: 2021-01-10. [Online]. Available:https:\/\/archive.ics.uci.edu\/ml\/datasets\/Breast+Cancer+Wisconsin+(Diagnostic)"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02323-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02323-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02323-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T06:35:22Z","timestamp":1642142122000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02323-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,4]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2323"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02323-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2021,5,4]]},"assertion":[{"value":"4 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}