{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T02:06:11Z","timestamp":1766109971050,"version":"3.48.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key R&D and Promotion Projects of Henan Province, China","award":["252102210171"],"award-info":[{"award-number":["252102210171"]}]},{"name":"Key R&D and Promotion Projects of Henan Province, China","award":["252102210184"],"award-info":[{"award-number":["252102210184"]}]},{"name":"Postgraduate Education Reform and Quality Improvement Project of Henan Province, China","award":["YJS2025AL98"],"award-info":[{"award-number":["YJS2025AL98"]}]},{"name":"Key Project of Henan Province Higher Education Teaching Reform Research and Practice, China","award":["2021SJGLX074"],"award-info":[{"award-number":["2021SJGLX074"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10489-025-06964-7","type":"journal-article","created":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T03:18:24Z","timestamp":1764386304000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Extreme learning machine optimized by multi-strategy improved weighted mean of vectors algorithm for intrusion detection classification"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2828-4223","authenticated-orcid":false,"given":"Jingsen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chennan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,29]]},"reference":[{"issue":"6","key":"6964_CR1","doi-asserted-by":"publisher","first-page":"4571","DOI":"10.1007\/s40747-021-00605-5","volume":"8","author":"MC Yuen","year":"2022","unstructured":"Yuen MC, Ng SC, Leung MF et al (2022) A metaheuristic-based framework for index tracking with practical constraints. Complex Intell Syst 8(6):4571\u20134586","journal-title":"Complex Intell Syst"},{"key":"6964_CR2","doi-asserted-by":"publisher","first-page":"2404","DOI":"10.28991\/ESJ-2024-08-06-016","volume":"8","author":"P Thanathamathee","year":"2024","unstructured":"Thanathamathee P, Sawangarreerak S, Chantamunee S et al (2024) SHAP-instance weighted and anchor explainable AI: enhancing XGBoost for financial fraud detection. Emerg Sci J 8:2404\u20132430","journal-title":"Emerg Sci J"},{"key":"6964_CR3","doi-asserted-by":"publisher","first-page":"688","DOI":"10.28991\/HEF-2024-05-04-011","volume":"5","author":"VZ Kuklin","year":"2024","unstructured":"Kuklin VZ, Chervyakov LM, Ruslantsev AN, Aslanov TG (2024) Technique for segmentation and selection of biomedical images. J Hum Earth Future 5:688\u2013703","journal-title":"J Hum Earth Future"},{"key":"6964_CR4","doi-asserted-by":"publisher","first-page":"38254","DOI":"10.1109\/ACCESS.2021.3063671","volume":"9","author":"J Liu","year":"2021","unstructured":"Liu J, Yang D, Lian M et al (2021) Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access 9:38254\u201338268","journal-title":"IEEE Access"},{"issue":"2","key":"6964_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-024-01881-x","volume":"18","author":"SVN Kumar","year":"2025","unstructured":"Kumar SVN (2025) An enhanced Whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system. Peer-to-Peer Netw Appl 18(2):1\u201328","journal-title":"Peer-to-Peer Netw Appl"},{"key":"6964_CR6","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.aej.2023.11.078","volume":"86","author":"NO Aljehane","year":"2024","unstructured":"Aljehane NO, Mengash HA, Eltahir MM et al (2024) Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security. Alexandria Eng J 86:415\u2013424","journal-title":"Alexandria Eng J"},{"issue":"20","key":"6964_CR7","doi-asserted-by":"publisher","first-page":"10651","DOI":"10.1007\/s00500-022-06798-2","volume":"26","author":"M Imran","year":"2022","unstructured":"Imran M, Khan S, Hlavacs H et al (2022) Intrusion detection in networks using cuckoo search optimization. Soft Comput 26(20):10651\u201310663","journal-title":"Soft Comput"},{"key":"6964_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.future.2023.09.035","volume":"151","author":"Z Ye","year":"2024","unstructured":"Ye Z, Luo J, Zhou W et al (2024) An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection. Future Gener Comput Syst 151:124\u2013136","journal-title":"Future Gener Comput Syst"},{"key":"6964_CR9","doi-asserted-by":"publisher","first-page":"117597","DOI":"10.1016\/j.eswa.2022.117597","volume":"204","author":"QM Alzubi","year":"2022","unstructured":"Alzubi QM, Anbar M, Sanjalawe Y et al (2022) Intrusion detection system based on hybridizing a modified binary grey Wolf optimization and particle swarm optimization. Expert Syst Appl 204:117597","journal-title":"Expert Syst Appl"},{"key":"6964_CR10","doi-asserted-by":"publisher","first-page":"113249","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl 148:113249","journal-title":"Expert Syst Appl"},{"key":"6964_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.aej.2024.12.057","volume":"116","author":"M Alotaibi","year":"2025","unstructured":"Alotaibi M, Mengash HA, Alqahtani H et al (2025) Hybrid GWQBBA model for optimized classification of attacks in intrusion detection system. Alexandria Eng J 116:9\u201319","journal-title":"Alexandria Eng J"},{"key":"6964_CR12","doi-asserted-by":"crossref","unstructured":"Huang GB, Zhu QY, Siew CK (2004) Extreme learning machine: a new learning scheme of feedforward neural networks[C]\/\/2004 IEEE international joint conference on neural networks (IEEE Cat. No. 04CH37541). Ieee, 2: 985\u2013990","DOI":"10.1109\/IJCNN.2004.1380068"},{"issue":"21","key":"6964_CR13","doi-asserted-by":"publisher","first-page":"15381","DOI":"10.1007\/s11042-019-7233-0","volume":"79","author":"DR Nayak","year":"2020","unstructured":"Nayak DR, Das D, Dash R et al (2020) Deep extreme learning machine with leaky rectified linear unit for multiclass classification of pathological brain images. Multimedia Tools Appl 79(21):15381\u201315396","journal-title":"Multimedia Tools Appl"},{"issue":"9","key":"6964_CR14","doi-asserted-by":"publisher","first-page":"312","DOI":"10.3390\/jmse7090312","volume":"7","author":"X Wei","year":"2019","unstructured":"Wei X, Liu H, She X et al (2019) Stability assessment of rubble mound breakwaters using extreme learning machine models. J Mar Sci Eng 7(9):312","journal-title":"J Mar Sci Eng"},{"key":"6964_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.biosystemseng.2019.04.022","volume":"184","author":"M Guo","year":"2019","unstructured":"Guo M, Ma Y, Yang X et al (2019) Detection of damaged wheat kernels using an impact acoustic signal processing technique based on Gaussian modelling and an improved extreme learning machine algorithm. Biosyst Eng 184:37\u201344","journal-title":"Biosyst Eng"},{"issue":"17","key":"6964_CR16","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.3390\/en12173241","volume":"12","author":"X Zhang","year":"2019","unstructured":"Zhang X, Ma H (2019) Data-driven model-free adaptive control based on error minimized regularized online sequential extreme learning machine. Energies 12(17):3241","journal-title":"Energies"},{"issue":"8","key":"6964_CR17","doi-asserted-by":"publisher","first-page":"e0160697","DOI":"10.1371\/journal.pone.0160697","volume":"11","author":"MNI Qureshi","year":"2016","unstructured":"Qureshi MNI, Min B, Jo HJ et al (2016) Multiclass classification for the differential diagnosis on the ADHD subtypes using recursive feature elimination and hierarchical extreme learning machine: structural MRI study. PLoS ONE 11(8):e0160697","journal-title":"PLoS ONE"},{"issue":"1","key":"6964_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.28991\/ESJ-2024-08-01-03","volume":"8","author":"BU Mahmud","year":"2024","unstructured":"Mahmud BU, Al Mamun A, Hossen MJ et al (2024) Light-weight deep learning model for accelerating the classification of mango-leaf disease[J]. Emerg Sci J 8(1):28\u201342","journal-title":"Emerg Sci J"},{"key":"6964_CR19","doi-asserted-by":"publisher","first-page":"102260","DOI":"10.1016\/j.cose.2021.102260","volume":"105","author":"GS Kushwah","year":"2021","unstructured":"Kushwah GS, Ranga V (2021) Optimized extreme learning machine for detecting DDoS attacks in cloud computing. Comput Secur 105:102260","journal-title":"Comput Secur"},{"issue":"1","key":"6964_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11128-021-03311-w","volume":"21","author":"Y Dong","year":"2022","unstructured":"Dong Y, Hu W, Zhang J et al (2022) Quantum beetle swarm algorithm optimized extreme learning machine for intrusion detection. Quantum Inf Process 21(1):9","journal-title":"Quantum Inf Process"},{"key":"6964_CR21","doi-asserted-by":"publisher","first-page":"108912","DOI":"10.1016\/j.patcog.2022.108912","volume":"132","author":"WL Al-Yaseen","year":"2022","unstructured":"Al-Yaseen WL, Idrees AK, Almasoudy FH (2022) Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system. Pattern Recogn 132:108912","journal-title":"Pattern Recogn"},{"key":"6964_CR22","doi-asserted-by":"publisher","first-page":"102957","DOI":"10.1016\/j.cose.2022.102957","volume":"124","author":"A Alzaqebah","year":"2023","unstructured":"Alzaqebah A, Aljarah I, Al-Kadi O (2023) A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization. Comput Secur 124:102957","journal-title":"Comput Secur"},{"issue":"1","key":"6964_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1186\/s40537-025-01080-2","volume":"12","author":"Z Wang","year":"2025","unstructured":"Wang Z, Zhang Y, Yu J et al (2025) Multi-strategy enhanced marine predator algorithm: performance investigation and application in intrusion detection. J Big Data 12(1):38","journal-title":"J Big Data"},{"issue":"1","key":"6964_CR24","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/s40537-024-00887-9","volume":"11","author":"EM Maseno","year":"2024","unstructured":"Maseno EM, Wang Z (2024) Hybrid wrapper feature selection method based on genetic algorithm and extreme learning machine for intrusion detection. J Big Data 11(1):24","journal-title":"J Big Data"},{"key":"6964_CR25","doi-asserted-by":"publisher","first-page":"116516","DOI":"10.1016\/j.eswa.2022.116516","volume":"195","author":"I Ahmadianfar","year":"2022","unstructured":"Ahmadianfar I, Heidari AA, Noshadian S et al (2022) INFO: an efficient optimization algorithm based on weighted mean of vectors[J]. Expert Syst Appl 195:116516","journal-title":"Expert Syst Appl"},{"key":"6964_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2025.122558","author":"C Zhang","year":"2025","unstructured":"Zhang C, Niu T, Wei Z et al (2025) Lifespan prediction model for proton exchange membrane fuel cell vehicle based on time series information feature extraction and optimization. Renew Energy. https:\/\/doi.org\/10.1016\/j.renene.2025.122558","journal-title":"Renew Energy"},{"key":"6964_CR27","doi-asserted-by":"publisher","first-page":"111003","DOI":"10.1016\/j.ymssp.2023.111003","volume":"208","author":"L Wan","year":"2024","unstructured":"Wan L, Chen Z, Zhang X et al (2024) A multi-sensor monitoring methodology for grinding wheel wear evaluation based on INFO-SVM[J]. Mech Syst Signal Process 208:111003","journal-title":"Mech Syst Signal Process"},{"key":"6964_CR28","doi-asserted-by":"publisher","first-page":"142816","DOI":"10.1016\/j.jclepro.2024.142816","volume":"467","author":"D Yousri","year":"2024","unstructured":"Yousri D, Sukanya V, Farag HE, Z et al (2024) Cost-effective one-time configuration for bridge-linked thermoelectric generator array using INFO optimizer[J]. J Clean Prod 467:142816","journal-title":"J Clean Prod"},{"key":"6964_CR29","doi-asserted-by":"publisher","first-page":"106136","DOI":"10.1016\/j.frl.2024.106136","volume":"69","author":"X He","year":"2024","unstructured":"He X, Li Y, Li H (2024) Revolutionizing bitcoin price forecasts: a comparative study of advanced hybrid deep learning architectures. Finance Res Lett 69:106136","journal-title":"Finance Res Lett"},{"issue":"28","key":"6964_CR30","doi-asserted-by":"publisher","first-page":"20749","DOI":"10.1007\/s00521-023-08813-5","volume":"35","author":"N Alamir","year":"2023","unstructured":"Alamir N, Kamel S, Hassan MH et al (2023) An improved weighted mean of vectors algorithm for microgrid energy management considering demand response. Neural Comput Appl 35(28):20749\u201320770","journal-title":"Neural Comput Appl"},{"key":"6964_CR31","doi-asserted-by":"publisher","first-page":"101656","DOI":"10.1016\/j.swevo.2024.101656","volume":"89","author":"EH Houssein","year":"2024","unstructured":"Houssein EH, Hosney ME, Emam MM et al (2024) Optimizing feedforward neural networks using a modified weighted mean of vectors: case study chemical datasets. Swarm Evol Comput 89:101656","journal-title":"Swarm Evol Comput"},{"issue":"3","key":"6964_CR32","doi-asserted-by":"publisher","first-page":"4309","DOI":"10.1007\/s11227-023-05628-y","volume":"80","author":"J Jiao","year":"2024","unstructured":"Jiao J, Chen Z, Zhou T (2024) Minimal Kapur cross-entropy-based image segmentation for distribution grid inspection using improved INFO optimization algorithm. J Supercomput 80(3):4309\u20134352","journal-title":"J Supercomput"},{"issue":"1","key":"6964_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10489-024-06062-0","volume":"55","author":"Z Wang","year":"2025","unstructured":"Wang Z, Chen Y, Cai Z et al (2025) Weighted mean of vectors algorithm with neighborhood information interaction and vertical and horizontal crossover mechanism for feature selection[J]. Appl Intell 55(1):1\u201344","journal-title":"Appl Intell"},{"key":"6964_CR34","doi-asserted-by":"publisher","first-page":"111387","DOI":"10.1016\/j.est.2024.111387","volume":"87","author":"H Abd El-Sattar","year":"2024","unstructured":"Abd El-Sattar H, Houssein EH, Hashim FA et al (2024) Optimal design of hybrid renewable energy sources with battery storage using an efficient weighted mean of vectors algorithm. J Energy Storage 87:111387","journal-title":"J Energy Storage"},{"issue":"4","key":"6964_CR35","doi-asserted-by":"publisher","first-page":"3351","DOI":"10.1007\/s10489-023-05261-5","volume":"54","author":"B Xu","year":"2024","unstructured":"Xu B, Heidari AA, Chen H (2024) Reinforced covariance weighted mean of vectors optimizer: insight, diversity, deep analysis and feature selection. Appl Intell 54(4):3351\u20133402","journal-title":"Appl Intell"},{"key":"6964_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e14578","author":"MK Singla","year":"2023","unstructured":"Singla MK, Gupta J, Nijhawan P et al (2023) Sustainable development of fuel cell using enhanced weighted mean of vectors algorithm. Heliyon. https:\/\/doi.org\/10.1016\/j.heliyon.2023.e14578","journal-title":"Heliyon"},{"key":"6964_CR37","doi-asserted-by":"publisher","first-page":"110085","DOI":"10.1016\/j.asoc.2023.110085","volume":"136","author":"V Sn\u00e1\u0161el","year":"2023","unstructured":"Sn\u00e1\u0161el V, Rizk-Allah RM, Izci D et al (2023) Weighted mean of vectors optimization algorithm and its application in designing the power system stabilizer. Appl Soft Comput 136:110085","journal-title":"Appl Soft Comput"},{"issue":"1","key":"6964_CR38","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert DH, Macready WG (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67\u201382","journal-title":"IEEE Trans Evol Comput"},{"issue":"20","key":"6964_CR39","doi-asserted-by":"publisher","first-page":"4699","DOI":"10.1016\/j.ins.2011.03.016","volume":"181","author":"H Wang","year":"2011","unstructured":"Wang H, Wu Z, Rahnamayan S et al (2011) Enhancing particle swarm optimization using generalized opposition-based learning. Inf Sci 181(20):4699\u20134714","journal-title":"Inf Sci"},{"issue":"11","key":"6964_CR40","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1007\/s00500-015-2001-1","volume":"20","author":"W Wei","year":"2016","unstructured":"Wei W, Zhou J, Chen F et al (2016) Constrained differential evolution using generalized opposition-based learning. Soft Comput 20(11):4413\u20134437","journal-title":"Soft Comput"},{"issue":"4","key":"6964_CR41","doi-asserted-by":"publisher","first-page":"2899","DOI":"10.1007\/s12065-024-00919-6","volume":"17","author":"OE Turgut","year":"2024","unstructured":"Turgut OE, Turgut MS (2024) Quasi-dynamic opposite learning enhanced Runge-Kutta optimizer for solving complex optimization problems. Evol Intel 17(4):2899\u20132962","journal-title":"Evol Intel"},{"key":"6964_CR42","doi-asserted-by":"publisher","first-page":"104966","DOI":"10.1016\/j.knosys.2019.104966","volume":"188","author":"Y Xu","year":"2020","unstructured":"Xu Y, Yang Z, Li X et al (2020) Dynamic opposite learning enhanced teaching\u2013learning-based optimization. Knowledge-Based Systems 188:104966","journal-title":"Knowledge-Based Systems"},{"key":"6964_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2017.09.010","volume":"39","author":"S Mahdavi","year":"2018","unstructured":"Mahdavi S, Rahnamayan S, Deb K (2018) Opposition based learning: a literature review. Swarm Evol Comput 39:1\u201323","journal-title":"Swarm Evol Comput"},{"key":"6964_CR44","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.cor.2015.03.013","volume":"63","author":"M Ergezer","year":"2015","unstructured":"Ergezer M, Simon D (2015) Probabilistic properties of fitness-based quasi-reflection in evolutionary algorithms. Comput Oper Res 63:114\u2013124","journal-title":"Comput Oper Res"},{"issue":"1","key":"6964_CR45","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TNSM.2023.3299358","volume":"21","author":"D Ramesh","year":"2023","unstructured":"Ramesh D, Rizvi N, Rao PCS et al (2023) Improved chemical reaction optimization with fitness-based quasi-reflection method for scheduling in hybrid cloud-fog environment[J]. IEEE Trans Netw Serv Manage 21(1):653\u2013669","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"6964_CR46","doi-asserted-by":"publisher","first-page":"122070","DOI":"10.1016\/j.eswa.2023.122070","volume":"238","author":"A Taheri","year":"2024","unstructured":"Taheri A, RahimiZadeh K, Beheshti A et al (2024) Partial reinforcement optimizer: an evolutionary optimization algorithm. Expert Syst Appl 238:122070","journal-title":"Expert Syst Appl"},{"key":"6964_CR47","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.neunet.2014.10.001","volume":"61","author":"G Huang","year":"2015","unstructured":"Huang G, Huang GB, Song S et al (2015) Trends in extreme learning machines: a review. Neural Netw 61:32\u201348","journal-title":"Neural Netw"},{"key":"6964_CR48","unstructured":"Kumar A, Price KV, Mohamed AW, Hadi AA, Suganthan PN (2022) Problem definitions and evaluation criteria for the cec2022 special session and competition on single objective bound constrained numerical optimization. Nanyang Technological University, Tech. Rep"},{"key":"6964_CR49","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.future.2020.03.055","volume":"111","author":"S Li","year":"2020","unstructured":"Li S, Chen H, Wang M et al (2020) Slime mould algorithm: a new method for stochastic optimization. Future Gener Comput Syst 111:300\u2013323","journal-title":"Future Gener Comput Syst"},{"key":"6964_CR50","doi-asserted-by":"publisher","first-page":"115079","DOI":"10.1016\/j.eswa.2021.115079","volume":"181","author":"I Ahmadianfar","year":"2021","unstructured":"Ahmadianfar I, Heidari AA, Gandomi AH et al (2021) Run beyond the metaphor: an efficient optimization algorithm based on Runge Kutta method. Expert Syst Appl 181:115079","journal-title":"Expert Syst Appl"},{"key":"6964_CR51","doi-asserted-by":"publisher","first-page":"115764","DOI":"10.1016\/j.cma.2022.115764","volume":"404","author":"L Deng","year":"2023","unstructured":"Deng L, Liu S (2023) A multi-strategy improved slime mould algorithm for global optimization and engineering design problems. Comput Methods Appl Mech Eng 404:115764","journal-title":"Comput Methods Appl Mech Eng"},{"key":"6964_CR52","doi-asserted-by":"crossref","unstructured":"Stanovov V, Akhmedova S, Semenkin E (2022) NL-SHADE-LBC algorithm with linear parameter adaptation bias change for CEC 2022 numerical Optimization[C]\/\/2022 IEEE Congress on evolutionary computation (CEC). IEEE, : 01\u201308","DOI":"10.1109\/CEC55065.2022.9870295"},{"issue":"11","key":"6964_CR53","doi-asserted-by":"publisher","first-page":"7665","DOI":"10.1007\/s00521-018-3592-0","volume":"31","author":"K Hussain","year":"2019","unstructured":"Hussain K, Salleh MNM, Cheng S et al (2019) On the exploration and exploitation in popular swarm-based metaheuristic algorithms. Neural Comput Appl 31(11):7665\u20137683","journal-title":"Neural Comput Appl"},{"key":"6964_CR54","doi-asserted-by":"publisher","first-page":"109272","DOI":"10.1016\/j.compbiomed.2024.109272","volume":"183","author":"M Abdel-Salam","year":"2024","unstructured":"Abdel-Salam M, Houssein EH, Emam MM et al (2024) An adaptive enhanced human memory algorithm for multi-level image segmentation for pathological lung cancer images. Comput Biol Med 183:109272","journal-title":"Comput Biol Med"},{"issue":"1","key":"6964_CR55","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.swevo.2011.02.002","volume":"1","author":"J Derrac","year":"2011","unstructured":"Derrac J, Garc\u00eda S, Molina D et al (2011) A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol Comput 1(1):3\u201318","journal-title":"Swarm Evol Comput"},{"issue":"200","key":"6964_CR56","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","volume":"32","author":"M Friedman","year":"1937","unstructured":"Friedman M (1937) The use of ranks to avoid the assumption of normality implicit in the analysis of variance[J]. J Am Stat Assoc 32(200):675\u2013701","journal-title":"J Am Stat Assoc"},{"key":"6964_CR57","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W et al (2009) A detailed analysis of the KDD CUP 99 data set[C]\/\/2009 IEEE symposium on computational intelligence for security and defense applications. Ieee, : 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"6964_CR58","doi-asserted-by":"crossref","unstructured":"Famili A, Shen W M, Weber R, et al (1997) Data preprocessing and intelligent data analysis. Intell Data Anal 1(1\u20134): 3\u201323","DOI":"10.1016\/S1088-467X(98)00007-9"},{"issue":"1","key":"6964_CR59","first-page":"13","volume":"4","author":"H Henderi","year":"2021","unstructured":"Henderi H, Wahyuningsih T, Rahwanto E (2021) Comparison of min-max normalization and Z-score normalization in the K-nearest neighbor (kNN) algorithm to test the accuracy of types of breast cancer. Int J Inf Inform Syst 4(1):13\u201320","journal-title":"Int J Inf Inform Syst"},{"issue":"12","key":"6964_CR60","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A Jain","year":"2005","unstructured":"Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recogn 38(12):2270\u20132285","journal-title":"Pattern Recogn"},{"key":"6964_CR61","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO et al (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"issue":"3","key":"6964_CR62","first-page":"1","volume":"55","author":"Y Liao","year":"2025","unstructured":"Liao Y, Li M, Sun Q et al (2025) Advanced stacking models for machine fault diagnosis with ensemble trees and SVM[J]. Appl Intell 55(3):1\u201312","journal-title":"Appl Intell"},{"issue":"10","key":"6964_CR63","doi-asserted-by":"publisher","first-page":"12774","DOI":"10.1007\/s10489-022-04161-4","volume":"53","author":"W Guo","year":"2023","unstructured":"Guo W, Wang Z, Yang H et al (2023) Multi-view dimensionality reduction learning with hierarchical sparse feature selection. Appl Intell 53(10):12774\u201312791","journal-title":"Appl Intell"},{"issue":"3","key":"6964_CR64","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1007\/s10589-023-00481-4","volume":"85","author":"L Wang","year":"2023","unstructured":"Wang L, Liu X, Zhang Y (2023) A communication-efficient and privacy-aware distributed algorithm for sparse PCA. Comput Optim Appl 85(3):1033\u20131072","journal-title":"Comput Optim Appl"},{"issue":"1","key":"6964_CR65","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.aci.2018.08.003","volume":"17","author":"A Tharwat","year":"2021","unstructured":"Tharwat A (2021) Classification assessment methods. Appl Comput Inform 17(1):168\u2013192","journal-title":"Appl Comput Inform"},{"issue":"7","key":"6964_CR66","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"AP Bradley","year":"1997","unstructured":"Bradley AP (1997) The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recogn 30(7):1145\u20131159","journal-title":"Pattern Recogn"},{"key":"6964_CR67","doi-asserted-by":"publisher","first-page":"121182","DOI":"10.1016\/j.eswa.2023.121182","volume":"235","author":"Q Xiang","year":"2024","unstructured":"Xiang Q, Wang X, Lai J et al (2024) Quadruplet depth-wise separable fusion convolution neural network for ballistic target recognition with limited samples. Expert Syst Appl 235:121182","journal-title":"Expert Syst Appl"},{"key":"6964_CR68","doi-asserted-by":"publisher","first-page":"127248","DOI":"10.1016\/j.eswa.2025.127248","volume":"277","author":"Q Xiang","year":"2025","unstructured":"Xiang Q, Wang X, Song Y et al (2025) Isonet: reforming 1dcnn for aero-engine system inter-shaft bearing fault diagnosis via input spatial over-parameterization. Expert Syst Appl 277:127248","journal-title":"Expert Syst Appl"},{"key":"6964_CR69","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)[C]\/\/2015 military communications and information systems conference (MilCIS). IEEE, : 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06964-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06964-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06964-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T02:02:42Z","timestamp":1766109762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06964-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":69,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["6964"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06964-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"7 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1124"}}