{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:44:26Z","timestamp":1776077066649,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T00:00:00Z","timestamp":1700870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T00:00:00Z","timestamp":1700870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61502230"],"award-info":[{"award-number":["61502230"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61501224"],"award-info":[{"award-number":["61501224"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62202221"],"award-info":[{"award-number":["62202221"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20201357"],"award-info":[{"award-number":["BK20201357"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20201357"],"award-info":[{"award-number":["BK20201357"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20201357"],"award-info":[{"award-number":["BK20201357"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010014","name":"Six Talent Peaks Project in Jiangsu Province","doi-asserted-by":"publisher","award":["RJFW-020"],"award-info":[{"award-number":["RJFW-020"]}],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2021YFB2012301"],"award-info":[{"award-number":["2021YFB2012301"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s12083-023-01595-6","type":"journal-article","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T11:02:28Z","timestamp":1700910148000},"page":"227-245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection"],"prefix":"10.1007","volume":"17","author":[{"given":"Fang","family":"Li","sequence":"first","affiliation":[]},{"given":"Hang","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Jieai","family":"Mai","sequence":"additional","affiliation":[]},{"given":"Tianjing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuanfei","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,25]]},"reference":[{"issue":"9","key":"1595_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3472753","volume":"54","author":"D Chou","year":"2021","unstructured":"Chou D, Jiang M (2021) A Survey on Data-driven Network Intrusion Detection. ACM Comput Surv (CSUR) 54(9):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1595_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840","volume":"188","author":"IF Kilincer","year":"2021","unstructured":"Kilincer IF, Ertam F, Sengur A (2021) Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Comput Netw 188:107840","journal-title":"Comput Netw"},{"key":"1595_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767","volume":"169","author":"S Gamage","year":"2020","unstructured":"Gamage S, Samarabandu J (2020) Deep learning methods in network intrusion detection: A survey and an objective comparison. J Netw Comput Appl 169:102767","journal-title":"J Netw Comput Appl"},{"key":"1595_CR4","doi-asserted-by":"crossref","unstructured":"Mummadi A, Yadav BMK, Sadhwika R, Shitharth S (2021) An appraisal of cyber-attacks and countermeasures using machine learning algorithms. In International Conference on Artificial Intelligence and Data Science, pages 27\u201340","DOI":"10.1007\/978-3-031-21385-4_3"},{"key":"1595_CR5","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.knosys.2017.09.014","volume":"136","author":"H Wang","year":"2017","unstructured":"Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl-Based Syst 136:130\u2013139","journal-title":"Knowl-Based Syst"},{"issue":"18","key":"1595_CR6","doi-asserted-by":"publisher","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","volume":"39","author":"L Koc","year":"2012","unstructured":"Koc L, Mazzuchi TA, Sarkani S (2012) A network intrusion detection system based on a Hidden Na\u00efve Bayes multiclass classifier. Expert Syst Appl 39(18):13492\u201313500","journal-title":"Expert Syst Appl"},{"key":"1595_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: Synthetic Minority Over-sampling Technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"1595_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.comcom.2021.07.016","volume":"178","author":"H Jia","year":"2021","unstructured":"Jia H, Liu J, Zhang M, He X, Sun W (2021) Network intrusion detection based on IE-DBN model. Comput Commun 178:131\u2013140","journal-title":"Comput Commun"},{"key":"1595_CR9","first-page":"1","volume":"1","author":"T Wu","year":"2022","unstructured":"Wu T, Fan H, Zhu H, You C, Zhou H (2022) Huang X (2022) Intrusion detection system combined enhanced random forest with smote algorithm. EURASIP J Adv Signal Process 1:1\u201320","journal-title":"EURASIP J Adv Signal Process"},{"issue":"3","key":"1595_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313778","volume":"10","author":"JW Mikhail","year":"2019","unstructured":"Mikhail JW, Fossaceca JM, Iammartino R (2019) A semi-boosted nested model with sensitivity-based weighted binarization for multi-domain network intrusion detection. ACM Trans Intell Syst Technol\u00a0(TIST) 10(3):1\u201327","journal-title":"ACM Trans Intell Syst Technol\u00a0(TIST)"},{"key":"1595_CR11","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Proces Syst 27"},{"issue":"1","key":"1595_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s00779-019-01332-y","volume":"25","author":"J Lee","year":"2021","unstructured":"Lee J, Park K (2021) GAN-based imbalanced data intrusion detection system. Pers Ubiquit Comput 25(1):121\u2013128","journal-title":"Pers Ubiquit Comput"},{"key":"1595_CR13","doi-asserted-by":"crossref","unstructured":"Lin Z, Shi Y, Xue Z (2022) IDSGAN: Generative adversarial networks for attack generation against intrusion detection. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, pages 79\u201391","DOI":"10.1007\/978-3-031-05981-0_7"},{"key":"1595_CR14","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","volume":"131","author":"H Ding","year":"2022","unstructured":"Ding H, Chen L, Dong L, Fu Z, Cui X (2022) Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection. Futur Gener Comput Syst 131:240\u2013254","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"1595_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/JIOT.2022.3200121","volume":"10","author":"X He","year":"2022","unstructured":"He X, Chen Q, Tang L, Wang W, Liu T (2022) Cgan-based collaborative intrusion detection for uav networks: A blockchain-empowered distributed federated learning approach. IEEE Internet Things J 10(1):120\u2013132","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"1595_CR16","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long Short-Term Memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"1595_CR17","doi-asserted-by":"crossref","unstructured":"Lin SZ, Shi Y, Xue Z (2018) Character-level intrusion detection based on convolutional neural networks. In International Joint Conference on Neural Networks (IJCNN), pages 1\u20138","DOI":"10.1109\/IJCNN.2018.8488987"},{"key":"1595_CR18","doi-asserted-by":"publisher","first-page":"102725","DOI":"10.1016\/j.cose.2022.102725","volume":"118","author":"H Ayd\u0131n","year":"2022","unstructured":"Ayd\u0131n H, Orman Z, Ayd\u0131n MA (2022) A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. Comput Secur 118:102725","journal-title":"Comput Secur"},{"key":"1595_CR19","unstructured":"Huang Z, Xu W, Yu K (2015) Bidirectional LSTM-CRF Models for Sequence Tagging. arXiv preprint arXiv:1508.01991"},{"key":"1595_CR20","doi-asserted-by":"crossref","unstructured":"Roy B, Cheung H (2018) A deep learning approach for intrusion detection in internet of things using bi-directional long short-term memory recurrent neural network. In International Telecommunication Networks and Applications Conference (ITNAC), pages 1\u20136","DOI":"10.1109\/ATNAC.2018.8615294"},{"key":"1595_CR21","doi-asserted-by":"crossref","unstructured":"Kim J, Kim J, Thu HLT, Kim H (2016) Long short term memory recurrent neural network classifier for intrusion detection. In International Conference on Platform Technology and Service (PlatCon), pages 1\u20135","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"1595_CR22","doi-asserted-by":"crossref","unstructured":"Althubiti SA, Jones EM, Roy K (2018) LSTM for Anomaly-Based Network Intrusion Detection. In International Telecommunication Networks and Applications Conference (ITNAC), pages 1\u20133","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"1595_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115524","volume":"185","author":"Y Imrana","year":"2021","unstructured":"Imrana Y, Xiang Y, Ali L, Abdul-Rauf Z (2021) A bidirectional LSTM deep learning approach for intrusion detection. Expert Syst Appl 185:115524","journal-title":"Expert Syst Appl"},{"key":"1595_CR24","doi-asserted-by":"crossref","unstructured":"Shitharth S, Satheesh N, Kumar BP, Sangeetha K (2021) IDS detection based on optimization based on WI-CS and GNN algorithm in SCADA network. Architectural Wireless Networks Solutions and Security Issues 247\u2013265","DOI":"10.1007\/978-981-16-0386-0_14"},{"key":"1595_CR25","unstructured":"Ling C, Zhao X, Lu J, Deng C, Zheng C, Wang J, Chowdhury T, Li Y, Cui H, Zhao T et\u00a0al (2023) Beyond one-model-fits-all: A survey of domain specialization for large language models. arXiv preprint arXiv:2305.18703"},{"key":"1595_CR26","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K (2018) BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv preprint arXiv:1810.04805"},{"key":"1595_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106529","volume":"210","author":"J Yin","year":"2020","unstructured":"Yin J, Tang MJ, Cao Jinli, Wang Hua (2020) Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description. Knowl-Based Syst 210:106529","journal-title":"Knowl-Based Syst"},{"key":"1595_CR28","unstructured":"Lee Y, Kim J, Kang P (2021) LAnoBERT: System log anomaly detection based on bert masked language model. arXiv preprint arXiv:2111.09564"},{"key":"1595_CR29","doi-asserted-by":"crossref","unstructured":"Alkhatib N, Mushtaq M, Ghauch H, Danger JL (2022) CAN-BERT do it? controller area network intrusion detection system based on bert language model. In IEEE\/ACS 19th International Conference on Computer Systems and Applications (AICCSA), pages 1\u20138","DOI":"10.1109\/AICCSA56895.2022.10017800"},{"key":"1595_CR30","unstructured":"Mirza M, Osindero S (2014) Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784"},{"key":"1595_CR31","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.eswa.2017.09.030","volume":"91","author":"G Douzas","year":"2018","unstructured":"Douzas G, Bacao F (2018) Effective data generation for imbalanced learning using conditional generative adversarial networks. Expert Syst Appl 91:464\u2013471","journal-title":"Expert Syst Appl"},{"key":"1595_CR32","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"key":"1595_CR33","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"1595_CR34","doi-asserted-by":"crossref","unstructured":"Salem M, Taheri S, Yuan JS (2018) Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection. In IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pages 683\u2013687","DOI":"10.1109\/UEMCON.2018.8796769"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01595-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01595-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01595-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T11:10:06Z","timestamp":1707822606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01595-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,25]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["1595"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01595-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,25]]},"assertion":[{"value":"10 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article contains no studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"All authors agree to publish the paper and related research results.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"We declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. We declare that there is no financial interest\/personal relationship which may be considered as potential competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}