{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:28:35Z","timestamp":1777487315673,"version":"3.51.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T00:00:00Z","timestamp":1640217600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T00:00:00Z","timestamp":1640217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772295"],"award-info":[{"award-number":["61772295"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572270"],"award-info":[{"award-number":["61572270"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61173056"],"award-info":[{"award-number":["61173056"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"PHD foundation of Chongqing Normal University","award":["19XLB003"],"award-info":[{"award-number":["19XLB003"]}]},{"name":"Chongqing Technology Innovation and Applicaion Dewelopment Special General Projext under Grant","award":["cste2020jscx-lyjsAX0002"],"award-info":[{"award-number":["cste2020jscx-lyjsAX0002"]}]},{"name":"Chongqing Municipxal Education Commission","award":["KJZD-M202000501"],"award-info":[{"award-number":["KJZD-M202000501"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11128-021-03311-w","type":"journal-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T08:13:21Z","timestamp":1640247201000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Quantum beetle swarm algorithm optimized extreme learning machine for intrusion detection"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4857-325X","authenticated-orcid":false,"given":"Yumin","family":"Dong","sequence":"first","affiliation":[]},{"given":"Wanbin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jinlei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Zhengquan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,23]]},"reference":[{"key":"3311_CR1","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company (1980)"},{"key":"3311_CR2","doi-asserted-by":"crossref","unstructured":"Bronte, R., Shahriar, H., Haddad, H.M.: A signature-based intrusion detection system for web applications based on genetic algorithm. In: Proceedings of the 9th International Conference on Security of Information and Networks, pp. 32\u201339 (2016)","DOI":"10.1145\/2947626.2951964"},{"issue":"2","key":"3311_CR3","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11235-010-9390-3","volume":"50","author":"E Nikolova","year":"2012","unstructured":"Nikolova, E., Jecheva, V.: Some similarity coefficients and application of data mining techniques to the anomaly-based ids. Telecommun. Syst. 50(2), 127\u2013135 (2012)","journal-title":"Telecommun. Syst."},{"issue":"1","key":"3311_CR4","first-page":"29","volume":"2","author":"M Pradhan","year":"2012","unstructured":"Pradhan, M., Pradhan, S.K., Sahu, S.K.: Anomaly detection using artificial neural network. Int. J. Eng. Sci. Emerg. Technol. 2(1), 29\u201336 (2012)","journal-title":"Int. J. Eng. Sci. Emerg. Technol."},{"issue":"6","key":"3311_CR5","first-page":"93","volume":"17","author":"C Liang","year":"2016","unstructured":"Liang, C., Li, C.H., Zhou, L.E.: A PCA-BP neural network-based intrusion detection method. J. Air Eng. Univ. (Nat. Sci. Edit.) 17(6), 93\u201398 (2016)","journal-title":"J. Air Eng. Univ. (Nat. Sci. Edit.)"},{"issue":"2","key":"3311_CR6","first-page":"190","volume":"42","author":"X Shen","year":"2016","unstructured":"Shen, X., Wang, L., Han, D.J.: Application of BP neural network optimized by artificial bee colony in intrusion detection. Comput. Eng. 42(2), 190\u2013194 (2016)","journal-title":"Comput. Eng."},{"key":"3311_CR7","unstructured":"Cai, X, Ning, X, Chen, X: Model of intrusion detection based on rough sets and BP neural network. Comput. Simul. 28(11), 107\u2013110 (2011)"},{"issue":"12","key":"3311_CR8","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1109\/TCYB.2014.2307349","volume":"44","author":"G Huang","year":"2014","unstructured":"Huang, G., Song, S., Gupta, J.N.D., Wu, C.: Semi-supervised and unsupervised extreme learning machines. IEEE Trans. Cybern. 44(12), 2405\u20132417 (2014)","journal-title":"IEEE Trans. Cybern."},{"issue":"07","key":"3311_CR9","first-page":"1640","volume":"42","author":"R Xu","year":"2019","unstructured":"Xu, R., Liang, X., Qi, J.S., Li, Z.Y., Zhang, S.S.: Advances and trends in extreme learning machine. Chin. J. Comput. 42(07), 1640\u20131670 (2019)","journal-title":"Chin. J. Comput."},{"issue":"7","key":"3311_CR10","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1109\/TSMC.2017.2691774","volume":"49","author":"K Yan","year":"2017","unstructured":"Yan, K., Ji, Z., Huijuan, L., Huang, J., Shen, W., Xue, Yu.: Fast and accurate classification of time series data using extended ELM: application in fault diagnosis of air handling units. IEEE Trans. Syst. Man Cybern. Syst. 49(7), 1349\u20131356 (2017)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"3311_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.foodcont.2017.02.045","volume":"78","author":"ZQ Geng","year":"2017","unstructured":"Geng, Z.Q., Zhao, S.S., Tao, G.C., Han, Y.M.: Early warning modeling and analysis based on analytic hierarchy process integrated extreme learning machine (AHP-ELM): application to food safety. Food Control 78, 33\u201342 (2017)","journal-title":"Food Control"},{"key":"3311_CR12","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.neucom.2012.11.057","volume":"128","author":"Z-L Sun","year":"2014","unstructured":"Sun, Z.-L., Wang, H., Lau, W.-S., Seet, G., Wang, D.: Application of BW-ELM model on traffic sign recognition. Neurocomputing 128, 153\u2013159 (2014)","journal-title":"Neurocomputing"},{"key":"3311_CR13","doi-asserted-by":"publisher","first-page":"102549","DOI":"10.1016\/j.rinp.2019.102549","volume":"15","author":"M Zidan","year":"2019","unstructured":"Zidan, M., Abdel-Aty, A.-H., Nguyen, D.M., Mohamed, A.S.A., Al-Sbou, Y., Eleuch, Y., Abdel-Aty, M.: A quantum algorithm based on entanglement measure for classifying Boolean multivariate function into novel hidden classes. Results Phys 15, 102549 (2019)","journal-title":"Results Phys"},{"key":"3311_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.18576\/amis\/120127","volume":"12","author":"M Zidan","year":"2018","unstructured":"Zidan, M., Abdel-Aty, A.-H., Younes, A., Zanaty, E., El-Khayat, I., Abdel-Aty, M.: A novel algorithm based on entanglement measurement for improving speed of quantum algorithms. Appl Math Inf Sci 12, 265\u2013269 (2018)","journal-title":"Appl Math Inf Sci"},{"key":"3311_CR15","doi-asserted-by":"publisher","unstructured":"Wang, H-W., Xue, Y-J., Ma, Y-L., Hua, N., Ma, H-Y.: Determination of quantum toric error correction code threshold using convolutional neural network decoders. Chin. Phys. B (2021). https:\/\/doi.org\/10.1088\/1674-1056\/ac11e3","DOI":"10.1088\/1674-1056\/ac11e3"},{"key":"3311_CR16","first-page":"39","volume":"32","author":"Z Liu","year":"2012","unstructured":"Liu, Z., Zhang, W., Wang, Z.: Optimal planning of charging station for electric vehicle based on quantum PSO algorithm. Zhongguo Dianji Gongcheng Xuebao (Proc. Chin. Soc. Electr. Eng.) 32, 39\u201345 (2012)","journal-title":"Zhongguo Dianji Gongcheng Xuebao (Proc. Chin. Soc. Electr. Eng.)"},{"key":"3311_CR17","first-page":"413","volume":"26","author":"ZK Feng","year":"2015","unstructured":"Feng, Z.K., Liao, S.L., Niu, W.J., Shen, J.J., Cheng, C.T., Li, Z.H.: Improved quantum-behaved particle swarm optimization and its application in optimal operation of hydropower stations. Adv. Water Sci. 26, 413\u2013422 (2015)","journal-title":"Adv. Water Sci."},{"issue":"6","key":"3311_CR18","first-page":"94","volume":"36","author":"FAN Fu-you","year":"2015","unstructured":"Fu-you, F.A.N., Guo-wu, Y.A.N.G., Qian-qi, L.E., Feng-mao, L.V., Chao, Z.H.A.O.: Optimized coverage algorithm of wireless video sensor network based on quantum genetic algorithm. J. Commun. 36(6), 94 (2015)","journal-title":"J. Commun."},{"key":"3311_CR19","doi-asserted-by":"crossref","unstructured":"Jiang, X., Li, S.: Bas: beetle antennae search algorithm for optimization problems. arXiv preprint arXiv:1710.10724 (2017)","DOI":"10.5430\/ijrc.v1n1p1"},{"issue":"1","key":"3311_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/355984.355989","volume":"8","author":"CC Paige","year":"1982","unstructured":"Paige, C.C., Saunders, C.C.: LSQR: an algorithm for sparse linear equations and sparse least squares. ACM Trans. Math. Softw. (TOMS) 8(1), 43\u201371 (1982)","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"issue":"2","key":"3311_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1137\/0702016","volume":"2","author":"G Golub","year":"1965","unstructured":"Golub, G., Kahan, W.: Calculating the singular values and pseudo-inverse of a matrix. J. Soc. Ind. Appl. Math. Ser. B Numer. Anal. 2(2), 205\u2013224 (1965)","journal-title":"J. Soc. Ind. Appl. Math. Ser. B Numer. Anal."},{"key":"3311_CR22","unstructured":"Sun, J., Feng, B., Xu, W.: Particle swarm optimization with particles having quantum behavior. In: Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No. 04TH8753), vol.\u00a01, pp. 325\u2013331. IEEE (2004)"},{"key":"3311_CR23","unstructured":"Yang, S., Wang, M., et\u00a0al.: A quantum particle swarm optimization. In: Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No. 04TH8753), vol.\u00a01, pp. 320\u2013324. IEEE (2004)"},{"key":"3311_CR24","doi-asserted-by":"crossref","unstructured":"Han, C., Lv, Y., Yang, D., Hao, Y.: An intrusion detection system based on neural network. In: 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), pp. 2018\u20132021. IEEE (2011)","DOI":"10.1109\/MEC.2011.6025886"},{"key":"3311_CR25","doi-asserted-by":"crossref","unstructured":"Devaraju, S., Ramakrishnan, S.: Performance comparison for intrusion detection system using neural network with KDD dataset. ICTACT J. Soft Comput. 4(3) 743\u2013752 (2014)","DOI":"10.21917\/ijsc.2014.0106"},{"key":"3311_CR26","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.asoc.2018.07.052","volume":"72","author":"M De Gregorio","year":"2018","unstructured":"De Gregorio, M., Giordano, M.: An experimental evaluation of weightless neural networks for multi-class classification. Appl. Soft Comput. 72, 338\u2013354 (2018)","journal-title":"Appl. Soft Comput."},{"issue":"3","key":"3311_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang, C.-C., Lin, C.-J.: Libsvm: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 1\u201327 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"issue":"3","key":"3311_CR28","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10618-009-0131-8","volume":"19","author":"J H\u00fchn","year":"2009","unstructured":"H\u00fchn, J., H\u00fcllermeier, E.: Furia: an algorithm for unordered fuzzy rule induction. Data Min. Knowl. Discov. 19(3), 293\u2013319 (2009)","journal-title":"Data Min. Knowl. Discov."},{"key":"3311_CR29","doi-asserted-by":"crossref","unstructured":"Ustebay, S., Turgut, Z., Aydin, M.A: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71\u201376. IEEE (2018)","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"key":"3311_CR30","doi-asserted-by":"publisher","first-page":"012018","DOI":"10.1088\/1742-6596\/1192\/1\/012018","volume":"1192","author":"A Yulianto","year":"2019","unstructured":"Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. J. Phys. Conf. Ser. 1192, 012018 (2019)","journal-title":"J. Phys. Conf. Ser."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03311-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03311-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03311-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T08:59:07Z","timestamp":1642582747000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03311-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,23]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["3311"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03311-w","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,23]]},"assertion":[{"value":"19 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"9"}}