{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:21:20Z","timestamp":1773091280930,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T00:00:00Z","timestamp":1720828800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T00:00:00Z","timestamp":1720828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020YFB1805400, 2023YFB3106900"],"award-info":[{"award-number":["2020YFB1805400, 2023YFB3106900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372334"],"award-info":[{"award-number":["62372334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10489-024-05673-x","type":"journal-article","created":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T08:01:46Z","timestamp":1720857706000},"page":"9313-9329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A novel fusion feature imageization with improved extreme learning machine for network anomaly detection"],"prefix":"10.1007","volume":"54","author":[{"given":"Geying","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jinyu","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qinghao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaowen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,13]]},"reference":[{"key":"5673_CR1","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1109\/TII.2022.3164770","volume":"19","author":"ST Mehedi","year":"2022","unstructured":"Mehedi ST, Anwar A, Rahman Z, Ahmed K, Islam R (2022) Dependable intrusion detection system for iot: a deep transfer learning based approach. IEEE Trans Ind Inform 19:1006\u20131017","journal-title":"IEEE Trans Ind Inform"},{"key":"5673_CR2","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.ins.2023.01.067","volume":"626","author":"D Javaheri","year":"2023","unstructured":"Javaheri D, Gorgin S, Lee J-A, Masdari M (2023) Fuzzy logic-based ddos attacks and network traffic anomaly detection methods: classification, overview, and future perspectives. Inf Sci 626:315\u2013338","journal-title":"Inf Sci"},{"key":"5673_CR3","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1109\/TIFS.2022.3233777","volume":"18","author":"K Sood","year":"2023","unstructured":"Sood K, Nosouhi MR, Nguyen DDN, Jiang F, Chowdhury M, Doss R (2023) Intrusion detection scheme with dimensionality reduction in next generation networks. IEEE Trans Inf Forensics Secur 18:965\u2013979","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5673_CR4","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.inffus.2022.08.011","volume":"89","author":"C Ding","year":"2023","unstructured":"Ding C, Sun S, Zhao J (2023) Mst-gat: a multimodal spatial\u2013temporal graph attention network for time series anomaly detection. Inf Fusion 89:527\u2013536","journal-title":"Inf Fusion"},{"key":"5673_CR5","doi-asserted-by":"publisher","first-page":"105124","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh A, Derhab A, Emam AZ (2020) Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl-Based Syst 189:105124","journal-title":"Knowl-Based Syst"},{"key":"5673_CR6","doi-asserted-by":"publisher","first-page":"108912","DOI":"10.1016\/j.patcog.2022.108912","volume":"132","author":"WL Al-Yaseen","year":"2022","unstructured":"Al-Yaseen WL, Idrees AK, Almasoudy FH (2022) Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system. Pattern Recognit 132:108912","journal-title":"Pattern Recognit"},{"key":"5673_CR7","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.ins.2019.10.069","volume":"513","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in big data environment. Inf Sci 513:386\u2013396","journal-title":"Inf Sci"},{"key":"5673_CR8","doi-asserted-by":"crossref","unstructured":"Mirsky Y, Doitshman T, Elovici Y, Shabtai A (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv:1802.09089","DOI":"10.14722\/ndss.2018.23204"},{"key":"5673_CR9","doi-asserted-by":"publisher","first-page":"115524","DOI":"10.1016\/j.eswa.2021.115524","volume":"185","author":"Y Imrana","year":"2021","unstructured":"Imrana Y, Xiang Y, Ali L, Abdul-Rauf Z (2021) A bidirectional lstm deep learning approach for intrusion detection. Expert Syst Appl 185:115524","journal-title":"Expert Syst Appl"},{"key":"5673_CR10","doi-asserted-by":"crossref","unstructured":"Pang G, Hengel A, Shen C, Cao L (2021) Toward deep supervised anomaly detection: reinforcement learning from partially labeled anomaly data. In: Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining, pp 1298\u20131308","DOI":"10.1145\/3447548.3467417"},{"key":"5673_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2019.05.040","volume":"497","author":"K Selvakumar","year":"2019","unstructured":"Selvakumar K, Karuppiah M, SaiRamesh L, Islam SH, Hassan MM, Fortino G, Choo K-KR (2019) Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in wsns. Inf Sci 497:77\u201390","journal-title":"Inf Sci"},{"key":"5673_CR12","doi-asserted-by":"publisher","first-page":"107052","DOI":"10.1016\/j.engappai.2023.107052","volume":"126","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Zhou F, Karimi HR, Fujita H, Hu X, Wen C, Wang T (2023) Attention gate guided multiscale recursive fusion strategy for deep neural network-based fault diagnosis. Eng Appl Artif Intell 126:107052","journal-title":"Eng Appl Artif Intell"},{"key":"5673_CR13","doi-asserted-by":"publisher","first-page":"112963","DOI":"10.1016\/j.eswa.2019.112963","volume":"141","author":"M Lopez-Martin","year":"2020","unstructured":"Lopez-Martin M, Carro B, Sanchez-Esguevillas A (2020) Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst Appl 141:112963","journal-title":"Expert Syst Appl"},{"key":"5673_CR14","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.neucom.2020.07.138","volume":"452","author":"M Chora\u015b","year":"2021","unstructured":"Chora\u015b M, Pawlicki M (2021) Intrusion detection approach based on optimised artificial neural network. Neurocomputing 452:705\u2013715","journal-title":"Neurocomputing"},{"key":"5673_CR15","doi-asserted-by":"publisher","first-page":"102158","DOI":"10.1016\/j.cose.2020.102158","volume":"103","author":"J Gu","year":"2021","unstructured":"Gu J, Lu S (2021) An effective intrusion detection approach using svm with na\u00efve bayes feature embedding. Comput Secur 103:102158","journal-title":"Comput Secur"},{"key":"5673_CR16","doi-asserted-by":"publisher","first-page":"120420","DOI":"10.1016\/j.eswa.2023.120420","volume":"229","author":"H Ren","year":"2023","unstructured":"Ren H, Tang Y, Dong W, Ren S, Jiang L (2023) Duen: dynamic ensemble handling class imbalance in network intrusion detection. Expert Syst Appl 229:120420","journal-title":"Expert Syst Appl"},{"key":"5673_CR17","doi-asserted-by":"publisher","first-page":"107132","DOI":"10.1016\/j.knosys.2021.107132","volume":"226","author":"PR Kanna","year":"2021","unstructured":"Kanna PR, Santhi P (2021) Unified deep learning approach for efficient intrusion detection system using integrated spatial-temporal features. Knowl-Based Syst 226:107132","journal-title":"Knowl-Based Syst"},{"key":"5673_CR18","doi-asserted-by":"publisher","first-page":"3118","DOI":"10.1007\/s10489-021-02559-0","volume":"52","author":"Z Li","year":"2022","unstructured":"Li Z, Xiang Z, Gong W, Wang H (2022) Unified model for collective and point anomaly detection using stacked temporal convolution networks. Appl Intell 52:3118\u20133131","journal-title":"Appl Intell"},{"key":"5673_CR19","doi-asserted-by":"publisher","first-page":"118476","DOI":"10.1016\/j.eswa.2022.118476","volume":"210","author":"SV Pingale","year":"2022","unstructured":"Pingale SV, Sutar SR (2022) Remora whale optimization-based hybrid deep learning for network intrusion detection using cnn features. Expert Syst Appl 210:118476","journal-title":"Expert Syst Appl"},{"key":"5673_CR20","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ins.2022.03.065","volume":"598","author":"A Basati","year":"2022","unstructured":"Basati A, Faghih MM (2022) Pdae: efficient network intrusion detection in iot using parallel deep auto-encoders. Inf Sci 598:57\u201374","journal-title":"Inf Sci"},{"key":"5673_CR21","doi-asserted-by":"publisher","first-page":"106997","DOI":"10.1016\/j.asoc.2020.106997","volume":"100","author":"R SaiSindhuTheja","year":"2021","unstructured":"SaiSindhuTheja R, Shyam GK (2021) An efficient metaheuristic algorithm based feature selection and recurrent neural network for dos attack detection in cloud computing environment. Appl Soft Comput 100:106997","journal-title":"Appl Soft Comput"},{"key":"5673_CR22","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1016\/j.ins.2021.05.016","volume":"569","author":"G Andresini","year":"2021","unstructured":"Andresini G, Appice A, Malerba D (2021) Autoencoder-based deep metric learning for network intrusion detection. Inf Sci 569:706\u2013727","journal-title":"Inf Sci"},{"key":"5673_CR23","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1109\/TNSM.2022.3175710","volume":"19","author":"L Yang","year":"2022","unstructured":"Yang L, Song Y, Gao S, Hu A, Xiao B (2022) Griffin: real-time network intrusion detection system via ensemble of autoencoder in sdn. IEEE Trans Netw Serv Manag 19:2269\u20132281","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"5673_CR24","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.future.2021.04.017","volume":"123","author":"G Andresini","year":"2021","unstructured":"Andresini G, Appice A, De Rose L, Malerba D (2021) Gan augmentation to deal with imbalance in imaging-based intrusion detection. Future Gener Comput Syst 123:108\u2013127","journal-title":"Future Gener Comput Syst"},{"key":"5673_CR25","doi-asserted-by":"publisher","first-page":"22834","DOI":"10.1007\/s10489-023-04753-8","volume":"53","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Zhou F, Zhang C, Wen C, Hu X, Wang T (2023) A personalized federated learning-based fault diagnosis method for data suffering from network attacks. Appl Intell 53:22834\u201322849","journal-title":"Appl Intell"},{"key":"5673_CR26","doi-asserted-by":"publisher","first-page":"121982","DOI":"10.1016\/j.eswa.2023.121982","volume":"238","author":"F Zhou","year":"2024","unstructured":"Zhou F, Liu S, Fujita H, Hu X, Zhang Y, Wang B, Wang K (2024) Fault diagnosis based on federated learning driven by dynamic expansion for model layers of imbalanced client. Expert Syst Appl 238:121982","journal-title":"Expert Syst Appl"},{"key":"5673_CR27","doi-asserted-by":"publisher","first-page":"6348","DOI":"10.1109\/JIOT.2020.3011726","volume":"8","author":"Y Liu","year":"2021","unstructured":"Liu Y, Garg S, Nie J, Zhang Y, Xiong Z, Kang J, Hossain MS (2021) Deep anomaly detection for time-series data in industrial iot: a communication-efficient on-device federated learning approach. IEEE Internet Things J 8:6348\u20136358","journal-title":"IEEE Internet Things J"},{"key":"5673_CR28","doi-asserted-by":"crossref","unstructured":"Li B, Wu Y, Song J, Lu R, Li T, Zhao L (2021) Deepfed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans Ind Inform 17:5615\u20135624","DOI":"10.1109\/TII.2020.3023430"},{"key":"5673_CR29","doi-asserted-by":"publisher","first-page":"120596","DOI":"10.1016\/j.eswa.2023.120596","volume":"232","author":"G Mohiuddin","year":"2023","unstructured":"Mohiuddin G, Lin Z, Zheng J, Wu J, Li W, Fang Y, Wang S, Chen J, Zeng X (2023) Intrusion detection using hybridized\u00a0meta-heuristic techniques with weighted xgboost classifier. Expert Syst Appl 232:120596","journal-title":"Expert Syst Appl"},{"key":"5673_CR30","doi-asserted-by":"publisher","first-page":"107726","DOI":"10.1016\/j.asoc.2021.107726","volume":"112","author":"J He","year":"2021","unstructured":"He J, Chen W, Li T, Li B, Zhu YB, Huang MG (2021) Hd-nsa: a real-valued negative selection algorithm based on hierarchy division. Appl Soft Comput 112:107726","journal-title":"Appl Soft Comput"},{"key":"5673_CR31","doi-asserted-by":"publisher","first-page":"110173","DOI":"10.1016\/j.asoc.2023.110173","volume":"137","author":"H Mohammadian","year":"2023","unstructured":"Mohammadian H, Ghorbani AA, Lashkari AH (2023) A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems. Appl Soft Comput 137:110173","journal-title":"Appl Soft Comput"},{"key":"5673_CR32","doi-asserted-by":"publisher","first-page":"8453","DOI":"10.1007\/s10489-022-03911-8","volume":"53","author":"Y Wang","year":"2023","unstructured":"Wang Y, Yu Z, Zhu L (2023) Intrusion detection for high-speed railways based on unsupervised anomaly detection models. Appl Intell 53:8453\u20138466","journal-title":"Appl Intell"},{"key":"5673_CR33","doi-asserted-by":"publisher","first-page":"108331","DOI":"10.1016\/j.patcog.2021.108331","volume":"122","author":"J Bai","year":"2022","unstructured":"Bai J, Li Y, Li J, Yang X, Jiang Y, Xia S-T (2022) Multinomial random forest. Pattern Recognit 122:108331","journal-title":"Pattern Recognit"},{"key":"5673_CR34","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.ins.2021.03.060","volume":"568","author":"X Kan","year":"2021","unstructured":"Kan X, Fan Y, Fang Z, Cao L, Xiong NN, Yang D, Li X (2021) A novel iot network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Inf Sci 568:147\u2013162","journal-title":"Inf Sci"},{"key":"5673_CR35","doi-asserted-by":"publisher","first-page":"114170","DOI":"10.1016\/j.eswa.2020.114170","volume":"167","author":"I Sohn","year":"2021","unstructured":"Sohn I (2021) Deep belief network based intrusion detection techniques: a survey. Expert Syst Appl 167:114170","journal-title":"Expert Syst Appl"},{"key":"5673_CR36","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.ins.2022.10.060","volume":"617","author":"J Wang","year":"2022","unstructured":"Wang J, Jin H, Chen J, Tan J, Zhong K (2022) Anomaly detection in internet of medical things with blockchain from the perspective of deep neural network. Inf Sci 617:133\u2013149","journal-title":"Inf Sci"},{"key":"5673_CR37","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.neunet.2023.07.026","volume":"166","author":"D Guo","year":"2023","unstructured":"Guo D, Liu Z, Li R (2023) Regraphgan: a graph generative adversarial network model for dynamic network anomaly detection. Neural Netw 166:273\u2013285","journal-title":"Neural Netw"},{"key":"5673_CR38","doi-asserted-by":"publisher","first-page":"16654","DOI":"10.1109\/TITS.2021.3094659","volume":"23","author":"W Shu","year":"2021","unstructured":"Shu W, Cai K, Xiong NN (2021) A short-term traffic flow prediction model based on an improved gate recurrent unit neural network. IEEE Trans Intell Transp Syst 23:16654\u201316665","journal-title":"IEEE Trans Intell Transp Syst"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05673-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-05673-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05673-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T13:15:31Z","timestamp":1723727731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-05673-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,13]]},"references-count":38,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["5673"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-05673-x","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,13]]},"assertion":[{"value":"5 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}},{"value":"All datasets used in this paper are public datasets, which can be downloaded through public channels upon request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and Informed Consent for Data Used"}}]}}