{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:52:49Z","timestamp":1763664769511,"version":"3.40.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T00:00:00Z","timestamp":1644969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T00:00:00Z","timestamp":1644969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877045"],"award-info":[{"award-number":["61877045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11227-021-04295-1","type":"journal-article","created":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T12:16:33Z","timestamp":1645013793000},"page":"11680-11701","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Innate immune memory and its application to artificial immune systems"],"prefix":"10.1007","volume":"78","author":[{"given":"Dongmei","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8297-5009","authenticated-orcid":false,"given":"Yiwen","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hongbin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Chengyu","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Zhenhua","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Sai","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,16]]},"reference":[{"issue":"6","key":"4295_CR1","doi-asserted-by":"publisher","first-page":"4272","DOI":"10.1007\/s11227-018-2340-7","volume":"76","author":"L Sharmila","year":"2020","unstructured":"Sharmila L, Sakthi U (2020) An artificial immune system-based algorithm for abnormal pattern in medical domain. J Supercomput 76(6):4272\u20134286","journal-title":"J Supercomput"},{"key":"4295_CR2","doi-asserted-by":"publisher","first-page":"112906","DOI":"10.1016\/j.eswa.2019.112906","volume":"140","author":"GC Silva","year":"2020","unstructured":"Silva GC, Carvalho EE, Caminhas WM (2020) An artificial immune systems approach to case-based Reasoning applied to fault detection and diagnosis. Expert Syst Appl 140:112906","journal-title":"Expert Syst Appl"},{"key":"4295_CR3","doi-asserted-by":"publisher","first-page":"105920","DOI":"10.1016\/j.asoc.2019.105920","volume":"86","author":"T Semwal","year":"2020","unstructured":"Semwal T, Nair SB (2020) A decentralized artificial immune system for solution selection in cyber-physical systems. Appl Soft Comput 86:105920","journal-title":"Appl Soft Comput"},{"issue":"30","key":"4295_CR4","first-page":"1","volume":"16","author":"AY Hatata","year":"2017","unstructured":"Hatata AY, Osman MG, Aladl MM (2017) A review of the clonal selection algorithm as an optimization method. Leonardo J Sci 16(30):1\u201314","journal-title":"Leonardo J Sci"},{"issue":"2","key":"4295_CR5","first-page":"20","volume":"6","author":"C Ramdane","year":"2017","unstructured":"Ramdane C, Chikhi S (2017) Negative selection algorithm: recent improvements and its application in intrusion detection system. Int J Comput Acad Res (IJCAR) 6(2):20\u201330","journal-title":"Int J Comput Acad Res (IJCAR)"},{"key":"4295_CR6","doi-asserted-by":"publisher","first-page":"20954","DOI":"10.1109\/ACCESS.2020.2968362","volume":"8","author":"F Khan","year":"2020","unstructured":"Khan F, Kanwal S, Alamri S, Mumtaz B (2020) Hyper-parameter optimization of classifiers, using an artificial immune network and its application to software bug prediction. IEEE Access 8:20954\u201320964","journal-title":"IEEE Access"},{"key":"4295_CR7","doi-asserted-by":"crossref","unstructured":"Fu J, Yang H, Liang Y, Tan C (2012 August) Bait a trap: introducing natural killer cells to artificial immune system for spyware detection. In: Proceedings of the International Conference on Artificial Immune Systems. Springer, Berlin, Heidelberg. pp 125\u2013138","DOI":"10.1007\/978-3-642-33757-4_10"},{"issue":"6","key":"4295_CR8","doi-asserted-by":"publisher","first-page":"6957","DOI":"10.1016\/j.eswa.2010.12.019","volume":"38","author":"CA Laurentys","year":"2011","unstructured":"Laurentys CA, Palhares RM, Caminhas WM (2011) A novel artificial immune system for fault behavior detection. Expert Syst Appl 38(6):6957\u20136966","journal-title":"Expert Syst Appl"},{"key":"4295_CR9","doi-asserted-by":"crossref","unstructured":"Bejoy BJ, Janakiraman S (2018 May) An intrusion detection and prevention system using AIS-An NK cell-based approach. In: proceedings of the International Conference on Ismac in Computational Vision and Bio-engineering. Springer, Cham. pp 883\u2013893","DOI":"10.1007\/978-3-030-00665-5_86"},{"key":"4295_CR10","unstructured":"Greensmith J (2007) The dendritic cell algorithm (Doctoral dissertation, University of Nottingham, UK)"},{"key":"4295_CR11","doi-asserted-by":"crossref","unstructured":"Igbe O, Darwish I, Saadawi T (2017 June) Deterministic dendritic cell algorithm application to smart grid cyber-attack detection. In: Proceedings of the 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE pp 199\u2013204","DOI":"10.1109\/CSCloud.2017.12"},{"key":"4295_CR12","doi-asserted-by":"publisher","first-page":"107055","DOI":"10.1016\/j.asoc.2020.107055","volume":"102","author":"W Zhou","year":"2021","unstructured":"Zhou W, Liang Y (2021) A new version of the deterministic dendritic cell algorithm based on numerical differential and immune response. Appl Soft Comput 102:107055","journal-title":"Appl Soft Comput"},{"key":"4295_CR13","doi-asserted-by":"crossref","unstructured":"Elisa N, Yang L, Qu Y, Chao F (2018 June) A revised dendritic cell algorithm using k-means clustering. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE pp 1547\u20131554","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00254"},{"key":"4295_CR14","doi-asserted-by":"crossref","unstructured":"Greensmith J, Aickelin U (2008 August) The deterministic dendritic cell algorithm. In: proceedings of the International Conference on Artificial Immune Systems. Springer, Berlin, Heidelberg. pp 291\u2013302","DOI":"10.1007\/978-3-540-85072-4_26"},{"issue":"6284","key":"4295_CR15","doi-asserted-by":"publisher","first-page":"aaf1098","DOI":"10.1126\/science.aaf1098","volume":"352","author":"M. G. Netea","year":"2016","unstructured":"Netea M. G., Joosten L. A. B., Latz E, Mills K. H. G, Natoli G, Stunnenberg H. G et al (2016) IIM: a program of trained immunity in health and disease. Science 352(6284):aaf1098\u2013aaf1098","journal-title":"Science"},{"issue":"3","key":"4295_CR16","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.chom.2017.02.003","volume":"21","author":"MG Netea","year":"2017","unstructured":"Netea MG, van der Meer JW (2017) IIM: an ancient way of remembering. Cell Host Microbe 21(3):297\u2013300","journal-title":"Cell Host Microbe"},{"issue":"6","key":"4295_CR17","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1016\/j.cell.2018.11.007","volume":"175","author":"MG Netea","year":"2018","unstructured":"Netea MG, Joosten LA (2018) IIM and local trained immunity in the lung. Cell 175(6):1463\u20131465","journal-title":"Cell"},{"issue":"1","key":"4295_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.chom.2018.12.006","volume":"25","author":"MG Netea","year":"2019","unstructured":"Netea MG, Schlitzer A, Placek K, Joosten LA, Schultze JL (2019) Innate and adaptive immune memory: an evolutionary continuum in the host\u2019s response to pathogens. Cell Host Microbe 25(1):13\u201326","journal-title":"Cell Host Microbe"},{"issue":"9","key":"4295_CR19","doi-asserted-by":"publisher","first-page":"3482","DOI":"10.1172\/JCI128877","volume":"129","author":"SA Khader","year":"2020","unstructured":"Khader SA, Divangahi M, Hanekom W, Hill PC, Maeurer M, Makar KW, Netea MG (2020) Targeting innate immunity for tuberculosis vaccination. J Clin Investig 129(9):3482\u20133491","journal-title":"J Clin Investig"},{"issue":"11","key":"4295_CR20","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1056\/NEJMcibr2011679","volume":"383","author":"A Mantovani","year":"2020","unstructured":"Mantovani A, Netea MG (2020) Trained innate immunity, epigenetics, and Covid-19. N Engl J Med 383(11):1078\u20131080","journal-title":"N Engl J Med"},{"issue":"2","key":"4295_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.3390\/v12020135","volume":"12","author":"LE Gralinski","year":"2020","unstructured":"Gralinski LE, Menachery VD (2020) Return of the coronavirus: 2019-nCoV. Viruses 12(2):135","journal-title":"Viruses"},{"issue":"1","key":"4295_CR22","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/v11010056","volume":"11","author":"S Xia","year":"2019","unstructured":"Xia S, Lan Q, Pu J, Wang C, Liu Z, Xu W, Lu L (2019) Potent MERS-CoV fusion inhibitory peptides identified from HR2 domain in spike protein of bat coronavirus HKU4. Viruses 11(1):56","journal-title":"Viruses"},{"issue":"10","key":"4295_CR23","doi-asserted-by":"publisher","first-page":"2696","DOI":"10.1073\/pnas.1518240113","volume":"113","author":"P Zhou","year":"2016","unstructured":"Zhou P, Tachedjian M, Wynne JW, Boyd V, Cui J, Smith I, Mendenhall IH (2016) Contraction of the type I IFN locus and unusual constitutive expression of IFN-$$\\alpha$$ in bats. Proc Natl Acad Sci 113(10):2696\u20132701","journal-title":"Proc Natl Acad Sci"},{"issue":"5","key":"4295_CR24","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1038\/s41564-019-0371-3","volume":"4","author":"M Ahn","year":"2019","unstructured":"Ahn M, Anderson DE, Zhang Q, Tan CW, Lim BL, Luko K, Ng JHJ (2019) Dampened NLRP3-mediated inflammation in bats and implications for a special viral reservoir host. Nat Microbiol 4(5):789\u2013799","journal-title":"Nat Microbiol"},{"key":"4295_CR25","doi-asserted-by":"crossref","unstructured":"Greensmith J (2019) Migration Threshold Tuning in the Deterministic Dendritic Cell Algorithm. In: proceedings of the International Conference on Theory and Practice of Natural Computing. Springer, Cham. pp 122\u2013133","DOI":"10.1007\/978-3-030-34500-6_8"},{"issue":"1","key":"4295_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"4295_CR27","unstructured":"Chang CC (2001) LIBSVM: a library for support vector machines, 2001. http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm"},{"issue":"3","key":"4295_CR28","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/S0034-4257(01)00209-7","volume":"77","author":"H Franco-Lopez","year":"2001","unstructured":"Franco-Lopez H, Ek AR, Bauer ME (2001) Estimation and mapping of forest stand density, volume, and cover type using the k-nearest neighbors method. Remote Sens Environ 77(3):251\u2013274","journal-title":"Remote Sens Environ"},{"key":"4295_CR29","unstructured":"Medsker LR, Jain LC (2001) Recurrent neural networks. Design and Applications, 5"},{"issue":"2","key":"4295_CR30","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1038\/nri.2016.13","volume":"16","author":"DL Farber","year":"2016","unstructured":"Farber DL, Netea MG, Radbruch A, Rajewsky K, Zinkernagel RM (2016) Immunological memory: lessons from the past and a look to the future. Nat Rev Immunol 16(2):124","journal-title":"Nat Rev Immunol"},{"issue":"7","key":"4295_CR31","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1038\/s41590-019-0399-9","volume":"20","author":"G Natoli","year":"2019","unstructured":"Natoli G, Ostuni R (2019) Adaptation and memory in immune responses. Nat Immunol 20(7):783\u2013792","journal-title":"Nat Immunol"},{"key":"4295_CR32","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-1-4614-1680-7_13","volume-title":"Self and Nonself","author":"N Danilova","year":"2012","unstructured":"Danilova N (2012) The evolution of adaptive immunity. Self and Nonself. Springer, New York, NY, pp 218\u2013235"},{"key":"4295_CR33","doi-asserted-by":"crossref","unstructured":"Forrest S, Perelson AS, Allen L, Cherukuri R (1994 May) Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy. Ieee pp 202\u2013212","DOI":"10.1109\/RISP.1994.296580"},{"key":"4295_CR34","unstructured":"De Castro LN, Von Zuben FJ (2000) The clonal selection algorithm with engineering applications. In: Proceedings of the GECCO (Vol. 2000, pp. 36-39)"},{"key":"4295_CR35","doi-asserted-by":"crossref","unstructured":"Zhou W, Liang Y, Dong H, Tan C, Xiao Z, Liu W (2017 November) A Numerical Differentiation Based Dendritic Cell Model. In: proceedings of the 2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI). IEEE pp 1092\u20131098","DOI":"10.1109\/ICTAI.2017.00167"},{"key":"4295_CR36","doi-asserted-by":"crossref","unstructured":"Yang H, Xiong S (2015) Method for Presenting Danger Signals Based on System Balance. In International Conference on Advances in Mechanical Engineering and Industrial Informatics. Atlantis Press","DOI":"10.2991\/ameii-15.2015.46"},{"key":"4295_CR37","doi-asserted-by":"crossref","unstructured":"Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: proceedings of the International Conference on Artificial Immune Systems. Springer, Berlin, Heidelberg. pp 153\u2013167","DOI":"10.1007\/11536444_12"},{"key":"4295_CR38","doi-asserted-by":"crossref","unstructured":"Elisa N, Yang L, Naik N (2018) Dendritic cell algorithm with optimised parameters using genetic algorithm. In: proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC). IEEE pp 1\u20138","DOI":"10.1109\/CEC.2018.8477932"},{"key":"4295_CR39","doi-asserted-by":"crossref","unstructured":"Santanelli JL, de Lima Neto FB (2016) Network intrusion detection using danger theory and genetic algorithms. In: proceedings of the International Conference on Intelligent Systems Design and Applications. Springer, Cham. pp 394\u2013405","DOI":"10.1007\/978-3-319-53480-0_39"},{"issue":"1","key":"4295_CR40","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10489-016-0891-y","volume":"47","author":"JT Oliva","year":"2017","unstructured":"Oliva JT, Rosa JLG (2017) How an epileptic EEG segment, used as reference, can influence a cross-correlation classifier? Appl Intell 47(1):178\u2013196","journal-title":"Appl Intell"},{"key":"4295_CR41","unstructured":"Sobieszek A (2014) [In search of the sharp wave of epileptic nature]. przegl lek, 690-693"},{"issue":"2","key":"4295_CR42","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1016\/j.neuroimage.2007.07.009","volume":"39","author":"K Hamandi","year":"2008","unstructured":"Hamandi K, Laufs H, Naey U, Carmichael DW, Duncan JS, Lemieux L (2008) Bold and perfusion changes during epileptic generalised spike wave activity. Neuroimage 39(2):608\u2013618","journal-title":"Neuroimage"},{"key":"4295_CR43","doi-asserted-by":"crossref","unstructured":"Dornaika F (2020) Multi-layer manifold learning with feature selection. Applied Intelligence, 1-13","DOI":"10.1007\/s10489-019-01563-9"},{"key":"4295_CR44","doi-asserted-by":"crossref","unstructured":"Sharma M, Patel S, Acharya U R (2020) Automated detection of abnormal EEG signals using localized wavelet filter banks. Pattern Recognition Letters","DOI":"10.1016\/j.patrec.2020.03.009"},{"issue":"3","key":"4295_CR45","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10115-015-0891-y","volume":"48","author":"Z Chelly","year":"2016","unstructured":"Chelly Z, Elouedi Z (2016) A survey of the dendritic cell algorithm. Knowl Inf Syst 48(3):505\u2013535","journal-title":"Knowl Inf Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04295-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04295-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04295-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T23:28:05Z","timestamp":1744154885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04295-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,16]]},"references-count":45,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["4295"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04295-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,2,16]]},"assertion":[{"value":"29 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}