{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:46:56Z","timestamp":1771613216979,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["U1804263"],"award-info":[{"award-number":["U1804263"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["U1804263"],"award-info":[{"award-number":["U1804263"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["U1804263"],"award-info":[{"award-number":["U1804263"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["U1804263"],"award-info":[{"award-number":["U1804263"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877010"],"award-info":[{"award-number":["61877010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877010"],"award-info":[{"award-number":["61877010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877010"],"award-info":[{"award-number":["61877010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877010"],"award-info":[{"award-number":["61877010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2021J01616"],"award-info":[{"award-number":["2021J01616"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2021J01616"],"award-info":[{"award-number":["2021J01616"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2021J01616"],"award-info":[{"award-number":["2021J01616"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2021J01616"],"award-info":[{"award-number":["2021J01616"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Joint Straits Fund of Key Program of the National Natural Science Foundation of China","award":["U1705262"],"award-info":[{"award-number":["U1705262"]}]},{"name":"Joint Straits Fund of Key Program of the National Natural Science Foundation of China","award":["U1705262"],"award-info":[{"award-number":["U1705262"]}]},{"name":"Joint Straits Fund of Key Program of the National Natural Science Foundation of China","award":["U1705262"],"award-info":[{"award-number":["U1705262"]}]},{"name":"Joint Straits Fund of Key Program of the National Natural Science Foundation of China","award":["U1705262"],"award-info":[{"award-number":["U1705262"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11227-023-05474-y","type":"journal-article","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T03:28:01Z","timestamp":1686799681000},"page":"20445-20480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing"],"prefix":"10.1007","volume":"79","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zude","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yanhua","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,15]]},"reference":[{"key":"5474_CR1","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","volume":"128","author":"N Moustafa","year":"2019","unstructured":"Moustafa N, Hu J, Slay J (2019) A holistic review of network anomaly detection systems: a comprehensive survey. J Netw Comput Appl 128:33\u201355","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"5474_CR2","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2019","unstructured":"Mishra P, Varadharajan V, Tupakula U, Pilli ES (2019) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor 21(1):686\u2013728","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"5474_CR3","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro P, D\u00edaz-Verdejo J, Maci\u00e1-Fern\u00e1ndez G, V\u00e1zquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1):18\u201328","journal-title":"Comput Secur"},{"issue":"1","key":"5474_CR4","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303\u2013336","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"5474_CR5","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2019","unstructured":"Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-KR (2019) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314\u2013323","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"5474_CR6","doi-asserted-by":"crossref","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247","journal-title":"Comput Netw"},{"key":"5474_CR7","doi-asserted-by":"crossref","first-page":"102158","DOI":"10.1016\/j.cose.2020.102158","volume":"103","author":"J Gu","year":"2021","unstructured":"Gu J, Lu S (2021) An effective intrusion detection approach using SVM with na\u00efve Bayes feature embedding. Comput Secur 103:102158","journal-title":"Comput Secur"},{"key":"5474_CR8","doi-asserted-by":"crossref","first-page":"113864","DOI":"10.1016\/j.eswa.2020.113864","volume":"162","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Mazzuchi TA, Sarkani S (2020) M-AdaBoost-A based ensemble system for network intrusion detection. Expert Syst Appl 162:113864","journal-title":"Expert Syst Appl"},{"issue":"4","key":"5474_CR9","first-page":"1591","volume":"18","author":"X Li","year":"2021","unstructured":"Li X, Zhu M, Yang LT, Xu M, Ma Z, Zhong C, Li H, Xiang Y (2021) Sustainable ensemble learning driving intrusion detection model. IEEE Trans Dependable Secure Comput 18(4):1591\u20131604","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"7","key":"5474_CR10","doi-asserted-by":"crossref","first-page":"751","DOI":"10.3390\/math9070751","volume":"9","author":"R Panigrahi","year":"2021","unstructured":"Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH (2021) A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7):751","journal-title":"Mathematics"},{"issue":"4","key":"5474_CR11","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.dcan.2017.09.009","volume":"4","author":"OY Al-Jarrah","year":"2018","unstructured":"Al-Jarrah OY, Al-Hammdi Y, Yoo PD, Muhaidat S, Al-Qutayri M (2018) Semi-supervised multi-layered clustering model for intrusion detection. Digital Commun Netw 4(4):277\u2013286","journal-title":"Digital Commun Netw"},{"key":"5474_CR12","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79\u201389","journal-title":"Appl Soft Comput"},{"issue":"8","key":"5474_CR13","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1109\/TIFS.2019.2894358","volume":"14","author":"J Camacho","year":"2019","unstructured":"Camacho J, Maci\u00e1-Fern\u00e1ndez G, Fuentes-Garc\u00eda NM, Saccenti E (2019) Semi-supervised multivariate statistical network monitoring for learning security threats. IEEE Trans Inf Forensics Secur 14(8):2179\u20132189","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"5474_CR14","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1109\/JIOT.2018.2873125","volume":"6","author":"H Yao","year":"2019","unstructured":"Yao H, Fu D, Zhang P, Li M, Liu Y (2019) MSML: a novel multilevel semi-supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949\u20131959","journal-title":"IEEE Internet Things J"},{"key":"5474_CR15","doi-asserted-by":"crossref","first-page":"102631","DOI":"10.1016\/j.jnca.2020.102631","volume":"161","author":"W Li","year":"2020","unstructured":"Li W, Meng W, Au MH (2020) Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J Netw Comput Appl 161:102631","journal-title":"J Netw Comput Appl"},{"key":"5474_CR16","doi-asserted-by":"crossref","first-page":"2157","DOI":"10.1109\/TIFS.2021.3050605","volume":"16","author":"P-F Marteau","year":"2021","unstructured":"Marteau P-F (2021) Random partitioning forest for point-wise and collective anomaly detection-application to network intrusion detection. IEEE Trans Inf Forensics Secur 16:2157\u20132172","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5474_CR17","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.cose.2018.07.003","volume":"78","author":"RSM Carrasco","year":"2018","unstructured":"Carrasco RSM, Sicilia M-A (2018) Unsupervised intrusion detection through skip-gram models of network behavior. Comput Secur 78:187\u2013197","journal-title":"Comput Secur"},{"key":"5474_CR18","doi-asserted-by":"crossref","first-page":"101851","DOI":"10.1016\/j.cose.2020.101851","volume":"95","author":"X Li","year":"2020","unstructured":"Li X, Chen W, Zhang Q, Wu L (2020) Building auto-encoder intrusion detection system based on random forest feature selection. Comput Secur 95:101851","journal-title":"Comput Secur"},{"issue":"3","key":"5474_CR19","doi-asserted-by":"crossref","first-page":"2063","DOI":"10.1109\/TII.2019.2946791","volume":"16","author":"W Liang","year":"2020","unstructured":"Liang W, Li K-C, Long J, Kui X, Zomaya AY (2020) An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans Industr Inf 16(3):2063\u20132071","journal-title":"IEEE Trans Industr Inf"},{"issue":"10","key":"5474_CR20","doi-asserted-by":"crossref","first-page":"7094","DOI":"10.1007\/s10489-021-02205-9","volume":"51","author":"A Binbusayyis","year":"2021","unstructured":"Binbusayyis A, Vaiyapuri T (2021) Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM. Appl Intell 51(10):7094\u20137108","journal-title":"Appl Intell"},{"key":"5474_CR21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Naser Mahmood A, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19\u201331","journal-title":"J Netw Comput Appl"},{"key":"5474_CR22","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A (2019) A survey of network-based intrusion detection data sets. Comput Secur 86:147\u2013167","journal-title":"Comput Secur"},{"key":"5474_CR23","unstructured":"Joachims T (1999) Transductive inference for text classi cation using support vector machines. In: Icml, vol 99, pp 200\u2013209"},{"key":"5474_CR24","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.neucom.2020.09.069","volume":"426","author":"Y Yuan","year":"2021","unstructured":"Yuan Y, Li X, Wang Q, Nie F (2021) A semi-supervised learning algorithm via adaptive Laplacian graph. Neurocomputing 426:162\u2013173","journal-title":"Neurocomputing"},{"key":"5474_CR25","unstructured":"Calder J, Cook B, Thorpe M, Slepcev D (2020) Poisson Learning: Graph Based Semi-Supervised Learning At Very Low Label Rates. In: Proceedings of the 37th International Conference on Machine Learning, pp 1306\u20131316. PMLR."},{"issue":"11","key":"5474_CR26","doi-asserted-by":"crossref","first-page":"2000","DOI":"10.1109\/TPAMI.2008.235","volume":"31","author":"PK Mallapragada","year":"2009","unstructured":"Mallapragada PK, Jin R, Jain AK, Liu Y (2009) SemiBoost: boosting for semi-supervised learning. IEEE Trans Pattern Anal Mach Intell 31(11):2000\u20132014","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"5474_CR27","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TPAMI.2010.92","volume":"33","author":"K Chen","year":"2011","unstructured":"Chen K, Wang S (2011) Semi-supervised learning via regularized boosting working on multiple semi-supervised assumptions. IEEE Trans Pattern Anal Mach Intell 33(1):129\u2013143","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5474_CR28","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.neucom.2018.06.047","volume":"314","author":"J Tanha","year":"2018","unstructured":"Tanha J (2018) MSSBoost: a new multiclass boosting to semi-supervised learning. Neurocomputing 314:251\u2013266","journal-title":"Neurocomputing"},{"issue":"6","key":"5474_CR29","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1109\/TSMCA.2007.904745","volume":"37","author":"M Li","year":"2007","unstructured":"Li M, Zhou Z-H (2007) Improve computer-aided diagnosis with machine learning techniques using undiagnosed samples. IEEE Trans Syst Man Cybern Part A Syst Humans 37(6):1088\u20131098","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Humans"},{"key":"5474_CR30","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.neucom.2017.03.063","volume":"249","author":"S Gu","year":"2017","unstructured":"Gu S, Jin Y (2017) Multi-train: a semi-supervised heterogeneous ensemble classifier. Neurocomputing 249:202\u2013211","journal-title":"Neurocomputing"},{"key":"5474_CR31","doi-asserted-by":"crossref","first-page":"106738","DOI":"10.1016\/j.knosys.2021.106738","volume":"215","author":"S de Vries","year":"2021","unstructured":"de Vries S, Thierens D (2021) A reliable ensemble based approach to semi-supervised learning. Knowl-Based Syst 215:106738","journal-title":"Knowl-Based Syst"},{"issue":"6","key":"5474_CR32","doi-asserted-by":"crossref","first-page":"3212","DOI":"10.1007\/s10489-020-02014-6","volume":"51","author":"J Lu","year":"2021","unstructured":"Lu J, Gong Y (2021) A co-training method based on entropy and multi-criteria. Appl Intell 51(6):3212\u20133225","journal-title":"Appl Intell"},{"issue":"11","key":"5474_CR33","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1109\/TKDE.2005.186","volume":"17","author":"Z-H Zhou","year":"2005","unstructured":"Zhou Z-H, Li M (2005) Tri-training: exploiting unlabeled data using three classifiers. IEEE Trans Knowl Data Eng 17(11):1529\u20131541","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"5474_CR34","doi-asserted-by":"crossref","unstructured":"Zhou Z-H (2009) When semi-supervised learning meets ensemble learning. In: Benediktsson JA, Kittler J, Roli F (eds) Multiple classifier systems. Lecture Notes in Computer Science, pp 529\u2013538. Springer, Heidelberg","DOI":"10.1007\/978-3-642-02326-2_53"},{"key":"5474_CR35","doi-asserted-by":"crossref","first-page":"105845","DOI":"10.1016\/j.knosys.2020.105845","volume":"196","author":"XW Liang","year":"2020","unstructured":"Liang XW, Jiang AP, Li T, Xue YY, Wang GT (2020) LR-SMOTE - an improved unbalanced data set oversampling based on K-means and SVM. Knowl-Based Syst 196:105845","journal-title":"Knowl-Based Syst"},{"key":"5474_CR36","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.ins.2020.07.014","volume":"542","author":"P Soltanzadeh","year":"2021","unstructured":"Soltanzadeh P, Hashemzadeh M (2021) RCSMOTE: range-controlled synthetic minority over-sampling technique for handling the class imbalance problem. Inf Sci 542:92\u2013111","journal-title":"Inf Sci"},{"key":"5474_CR37","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.ins.2018.10.029","volume":"477","author":"C-F Tsai","year":"2019","unstructured":"Tsai C-F, Lin W-C, Hu Y-H, Yao G-T (2019) Under-sampling class imbalanced datasets by combining clustering analysis and instance selection. Inf Sci 477:47\u201354","journal-title":"Inf Sci"},{"key":"5474_CR38","doi-asserted-by":"crossref","first-page":"114301","DOI":"10.1016\/j.eswa.2020.114301","volume":"168","author":"A Guzm\u00e1n-Ponce","year":"2021","unstructured":"Guzm\u00e1n-Ponce A, S\u00e1nchez JS, Valdovinos RM, Marcial-Romero JR (2021) DBIG-US: a two-stage under-sampling algorithm to face the class imbalance problem. Expert Syst Appl 168:114301","journal-title":"Expert Syst Appl"},{"key":"5474_CR39","doi-asserted-by":"crossref","unstructured":"Halimu C, Kasem A (2021) Split Balancing (sBal)-A Data Preprocessing Sampling Technique for Ensemble Methods for Binary Classification in Imbalanced Datasets. In: Alfred R, Iida H, Haviluddin H, Anthony P (eds) Computational science and technology. Lecture notes in electrical engineering, pp 241\u2013257. Springer, Singapore","DOI":"10.1007\/978-981-33-4069-5_21"},{"key":"5474_CR40","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.neucom.2018.11.099","volume":"343","author":"A Iranmehr","year":"2019","unstructured":"Iranmehr A, Masnadi-Shirazi H, Vasconcelos N (2019) Cost-sensitive support vector machines. Neurocomputing 343:50\u201364","journal-title":"Neurocomputing"},{"key":"5474_CR41","doi-asserted-by":"crossref","first-page":"112918","DOI":"10.1016\/j.eswa.2019.112918","volume":"141","author":"ML Wong","year":"2020","unstructured":"Wong ML, Seng K, Wong PK (2020) Cost-sensitive ensemble of stacked denoising autoencoders for class imbalance problems in business domain. Expert Syst Appl 141:112918","journal-title":"Expert Syst Appl"},{"key":"5474_CR42","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.knosys.2018.05.037","volume":"158","author":"J Bi","year":"2018","unstructured":"Bi J, Zhang C (2018) An empirical comparison on state-of-the-art multi-class imbalance learning algorithms and a new diversified ensemble learning scheme. Knowl-Based Syst 158:81\u201393","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"5474_CR43","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1109\/TNNLS.2019.2920246","volume":"31","author":"K Yang","year":"2020","unstructured":"Yang K, Yu Z, Wen X, Cao W, Chen CLP, Wong H-S, You J (2020) Hybrid classifier ensemble for imbalanced data. IEEE Trans Neural Netw Learn Syst 31(4):1387\u20131400","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"5","key":"5474_CR44","first-page":"1988","volume":"33","author":"R Razavi-Far","year":"2021","unstructured":"Razavi-Far R, Farajzadeh-Zanajni M, Wang B, Saif M, Chakrabarti S (2021) Imputation-based ensemble techniques for class imbalance learning. IEEE Trans Knowl Data Eng 33(5):1988\u20132001","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"5474_CR45","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"5474_CR46","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.ins.2019.11.004","volume":"513","author":"F Thabtah","year":"2020","unstructured":"Thabtah F, Hammoud S, Kamalov F, Gonsalves A (2020) Data imbalance in classification: experimental evaluation. Inf Sci 513:429\u2013441","journal-title":"Inf Sci"},{"issue":"10","key":"5474_CR47","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/TPAMI.2006.211","volume":"28","author":"JJ Rodriguez","year":"2006","unstructured":"Rodriguez JJ, Kuncheva LI, Alonso CJ (2006) Rotation forest: a new classifier ensemble method. IEEE Trans Pattern Anal Mach Intell 28(10):1619\u20131630","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5474_CR48","doi-asserted-by":"crossref","unstructured":"Sagi O, Rokach L (2018) Ensemble learning: A survey. WIREs Data Mining and Knowledge Discovery 8(4)","DOI":"10.1002\/widm.1249"},{"key":"5474_CR49","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"5474_CR50","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"5474_CR51","doi-asserted-by":"crossref","first-page":"102994","DOI":"10.1016\/j.scs.2021.102994","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa N (2021) A new distributed architecture for evaluating AI-based security systems at the edge: network TON_iot datasets. Sustain Cities Soc 72:102994","journal-title":"Sustain Cities Soc"},{"key":"5474_CR52","unstructured":"KDD Cup 1999 Data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html Accessed 20 May 2022"},{"key":"5474_CR53","doi-asserted-by":"crossref","unstructured":"Yarowsky D (1995) Unsupervised word sense disambiguation rivaling supervised methods. In: 33rd Annual Meeting of the Association for Computational Linguistics, pp 189\u2013196","DOI":"10.3115\/981658.981684"},{"key":"5474_CR54","doi-asserted-by":"crossref","unstructured":"Blum A, Mitchell T (1998) Combining labeled and unlabeled data with co-training. In: Proceedings of the Eleventh Annual Conference on Computational Learning Theory, pp 92\u2013100","DOI":"10.1145\/279943.279962"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05474-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05474-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05474-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T21:03:53Z","timestamp":1697835833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05474-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,15]]},"references-count":54,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["5474"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05474-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,15]]},"assertion":[{"value":"1 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Applicable for both human and\/ or animal studies.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}