{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:01:55Z","timestamp":1768410115229,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T00:00:00Z","timestamp":1582329600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T00:00:00Z","timestamp":1582329600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11265-019-01494-1","type":"journal-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T13:02:42Z","timestamp":1582376562000},"page":"187-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Model Uncertainty Based Annotation Error Fixing for Web Attack Detection"],"prefix":"10.1007","volume":"93","author":[{"given":"Xinyu","family":"Gong","sequence":"first","affiliation":[]},{"given":"Jialiang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yuefu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Han","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Ruan","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"1494_CR1","doi-asserted-by":"crossref","unstructured":"Qiu, H., Noura, H., Qiu, M., Ming, Z., Memmi, G. (2019). A user-centric data protection method for cloud storage based on invertible dwt. IEEE Transactions on Cloud Computing.","DOI":"10.1109\/TCC.2019.2911679"},{"key":"1494_CR2","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Zhao, H., Xiong, J. (2016). Privacy-aware adaptive data encryption strategy of big data in cloud computing. In 2016 IEEE 3Rd International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 273\u2013278). IEEE.","DOI":"10.1109\/CSCloud.2016.52"},{"issue":"4","key":"1494_CR3","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/2627534.2627557","volume":"41","author":"S Shan","year":"2014","unstructured":"Shan, S. (2014). Big data classification: Problems and challenges in network intrusion prediction with machine learning. Acm Sigmetrics Performance Evaluation Review, 41(4), 70\u201373.","journal-title":"Acm Sigmetrics Performance Evaluation Review"},{"key":"1494_CR4","doi-asserted-by":"crossref","unstructured":"Stein, G., Chen, B., Annie, S.W., Hua, K.A. (2005). Decision tree classifier for network intrusion detection with ga-based feature selection. In Southeast Regional Conference (pp. 136\u2013141).","DOI":"10.1145\/1167253.1167288"},{"key":"1494_CR5","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A. (2002). Intrusion detection using neural networks and support vector machines. In International Joint Conference on Neural Networks (pp. 1702\u20131707).","DOI":"10.1109\/IJCNN.2002.1007774"},{"issue":"3","key":"1494_CR6","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1162\/neco.1989.1.3.295","volume":"1","author":"HB Barlow","year":"1989","unstructured":"Barlow, H.B. (1989). Unsupervised learning. Neural Computation, 1(3), 295\u2013311.","journal-title":"Neural Computation"},{"key":"1494_CR7","first-page":"69","volume":"6973","author":"GR Hendry","year":"2008","unstructured":"Hendry, G.R., & Yang, S.J. (2008). Intrusion signature creation via clustering anomalies. Proc Spie, 6973, 69\u2013730.","journal-title":"Proc Spie"},{"key":"1494_CR8","doi-asserted-by":"crossref","unstructured":"Kalchbrenner, N., Grefenstette, E., Blunsom, P. (2014). A convolutional neural network for modelling sentences. Eprint Arxiv, 1.","DOI":"10.3115\/v1\/P14-1062"},{"key":"1494_CR9","unstructured":"Kim, Y., Jernite, Y., Sontag, D., Rush, A.M. (2015). Character-aware neural language models. Computer Science."},{"key":"1494_CR10","doi-asserted-by":"crossref","unstructured":"Donahue, J., Hendricks, L.A., Guadarrama, S., Rohrbach, M., Venugopalan, S., Saenko, K., Darrell, T. (2015). Long-term recurrent convolutional networks for visual recognition and description. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","DOI":"10.1109\/CVPR.2015.7298878"},{"key":"1494_CR11","doi-asserted-by":"crossref","unstructured":"Le, T.T.H., Kim, J., Kim, H. (2017). An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In 2017 International Conference on Platform Technology and Service (platcon) (pp. 1\u20136).","DOI":"10.1109\/PlatCon.2017.7883684"},{"key":"1494_CR12","doi-asserted-by":"crossref","unstructured":"Vartouni, A.M., Kashi, S.S., Teshnehlab, M. (s2018). An anomaly detection method to detect web attacks using stacked auto-encoder. In 2018 6Th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS) (pp. 131\u2013134).","DOI":"10.1109\/CFIS.2018.8336654"},{"key":"1494_CR13","unstructured":"Chen, Y., Fang, H., Xu, B., Yan, Z., Kalantidis, Y., Rohrbach, M., Yan, S., Feng, J. (2019). Drop an octave: Reducing spatial redundancy in convolutional neural networks with octave convolution. arXiv:1904.05049."},{"key":"1494_CR14","doi-asserted-by":"crossref","unstructured":"Kim, Y. (2014). Convolutional neural networks for sentence classification. Eprint Arxiv.","DOI":"10.3115\/v1\/D14-1181"},{"key":"1494_CR15","doi-asserted-by":"crossref","unstructured":"Lin, M.-S., Chiu, C.-Y., Lee, Y.-J., Pao, H.-K. (2013). Malicious url filtering\u2014a big data application. In 2013 IEEE International Conference on Big Data (pp. 589\u2013596). IEEE.","DOI":"10.1109\/BigData.2013.6691627"},{"key":"1494_CR16","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 120\u2013132). IEEE."},{"key":"1494_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, M., Xu, B., Bai, S., Lu, S., Lin, Z. (2017). A deep learning method to detect web attacks using a specially designed cnn. In Neural Information Processing (pp. 828\u2013836).","DOI":"10.1007\/978-3-319-70139-4_84"},{"key":"1494_CR18","unstructured":"Saxe, J., & Berlin, K. (2017). Expose: A character-level convolutional neural network with embeddings for detecting malicious urls, file paths and registry keys. arXiv:1702.08568."},{"key":"1494_CR19","doi-asserted-by":"crossref","unstructured":"Zheng, H., Wang, Y., Han, C., Le, F., He, R., Lu, J. (2018). Learning and applying ontology for machine learning in cyber attack detection. In 17Th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (trustcom), 2018.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00180"},{"key":"1494_CR20","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv:1412.6572."},{"key":"1494_CR21","unstructured":"Bishop, C.M. (2006). Pattern Recognition and Machine Learning (Information Science and Statistics). Springer."},{"key":"1494_CR22","unstructured":"Gal, Y. (2016). Uncertainty in deep learning. Phd thesis, PhD thesis, University of Cambridge."},{"key":"1494_CR23","unstructured":"Kingma, D.P., Salimans, T., Welling, M. (2015). Variational dropout and the local reparameterization trick. In Advances in Neural Information Processing Systems (pp. 2575\u20132583)."},{"key":"1494_CR24","unstructured":"Kumar, S., & Spafford, E.H. (1994). A pattern matching model for misuse intrusion detection. Computers & Security."},{"key":"1494_CR25","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954\u201321961.","journal-title":"IEEE Access"},{"key":"1494_CR26","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.inffus.2019.02.002","volume":"50","author":"H Qiu","year":"2019","unstructured":"Qiu, H, Qiu, M, Lu, Z, Memmi, G. (2019). An efficient key distribution system for data fusion in v2X heterogeneous networks. Information Fusion, 50, 212\u2013220.","journal-title":"Information Fusion"},{"key":"1494_CR27","doi-asserted-by":"crossref","unstructured":"Sung, A.H., & Mukkamala, S. (2003). Identifying important features for intrusion detection using support vector machines and neural networks. In Null, (p 209). IEEE.","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"1494_CR28","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz, N., & Jabbar, M.A. (2016). Random forest modeling for network intrusion detection system. Procedia Computer Science, 89, 213\u2013217.","journal-title":"Procedia Computer Science"},{"key":"#cr-split#-1494_CR29.1","doi-asserted-by":"crossref","unstructured":"Pham, T. S., Hoang, T. H., Vu, V. C. (Oct 2016). Machine learning techniques for web intrusion detection #x2014","DOI":"10.1109\/KSE.2016.7758069"},{"key":"#cr-split#-1494_CR29.2","unstructured":"a comparison. In 2016 Eighth International Conference on Knowledge and Systems Engineering (KSE) (pp. 291-297)."},{"key":"1494_CR30","unstructured":"Csic 2010 http dataset. http:\/\/www.isi.csic.es\/dataset\/."},{"key":"1494_CR31","doi-asserted-by":"crossref","unstructured":"Gao, Y., Ma, Y., Li, D. (2017). Anomaly detection of malicious users\u2019 behaviors for web applications based on web logs. In 2017 IEEE 17Th International Conference on Communication Technology (ICCT) (pp. 1352\u20131355).","DOI":"10.1109\/ICCT.2017.8359854"},{"key":"1494_CR32","unstructured":"Yu, J., Tao, D., Lin, Z. (2016). A hybrid web log based intrusion detection model. In: 2016 4Th International Conference on Cloud Computing and Intelligence Systems (CCIS) (pp. 356\u2013360)."},{"key":"1494_CR33","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E. (2012). Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems (pp. 1097\u20131105)."},{"issue":"1","key":"1494_CR34","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R. (2014). Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research, 15(1), 1929\u20131958.","journal-title":"The Journal of Machine Learning Research"},{"key":"1494_CR35","unstructured":"Gal, Y., & Ghahramani, Z. (2016). Dropout as a bayesian approximation: representing model uncertainty in deep learning. In International Conference on International Conference on Machine Learning."},{"key":"1494_CR36","doi-asserted-by":"crossref","unstructured":"Gong, X., Zhou, Y., Bi, Y., He, M., Sheng, S., Qiu, H., He, R., Lu, J. (2019). Estimating web attack detection via model uncertainty from inaccurate annotation. In The 6th IEEE International Conference on Cyber Security and Cloud Computing 2019, June 2019.","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00019"},{"key":"1494_CR37","unstructured":"Kingma, D.P., & Adam, J.B. (2014). A method for stochastic optimization. arXiv:1412.6980."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01494-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-019-01494-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01494-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T05:16:10Z","timestamp":1613970970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-019-01494-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,22]]},"references-count":38,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["1494"],"URL":"https:\/\/doi.org\/10.1007\/s11265-019-01494-1","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,22]]},"assertion":[{"value":"16 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}