{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T05:48:47Z","timestamp":1773553727589,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T00:00:00Z","timestamp":1741737600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T00:00:00Z","timestamp":1741737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62263021"],"award-info":[{"award-number":["62263021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industrial Support Project of Education Department of Gansu Province","award":["2023CYZC-24"],"award-info":[{"award-number":["2023CYZC-24"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01938-5","type":"journal-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T07:51:33Z","timestamp":1741765893000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An intrusion detection imbalanced data classification algorithm based on CWGAN-GP oversampling"],"prefix":"10.1007","volume":"18","author":[{"given":"Qinglei","family":"Yao","sequence":"first","affiliation":[]},{"given":"Xiaoqiang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,12]]},"reference":[{"issue":"1","key":"1938_CR1","first-page":"59","volume":"18","author":"S Eswaran","year":"2022","unstructured":"Eswaran S, Rani V, Ramakrishnan J, Selvakumar S (2022) An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure. Int J Perv Comput Commun 18(1):59\u201378","journal-title":"Int J Perv Comput Commun"},{"key":"1938_CR2","doi-asserted-by":"publisher","unstructured":"Yang H (2020) Research on classification algorithm for civil aviation internal network intrusion detection based on machine learning. 2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology (ICCASIT), Weihai, pp. 1\u20134. https:\/\/doi.org\/10.1109\/ICCASIT50869.2020.9368594","DOI":"10.1109\/ICCASIT50869.2020.9368594"},{"key":"1938_CR3","doi-asserted-by":"publisher","first-page":"109778","DOI":"10.1016\/j.ress.2023.109778","volume":"242","author":"Y Liu","year":"2024","unstructured":"Liu Y, Li K, Yan D (2024) Quantification analysis of potential risk in railway accidents: a new random walk based approach. Reliab Eng Syst Saf 242:109778","journal-title":"Reliab Eng Syst Saf"},{"issue":"16","key":"1938_CR4","doi-asserted-by":"publisher","first-page":"12563","DOI":"10.3390\/su151612563","volume":"15","author":"N Savanovi\u0107","year":"2023","unstructured":"Savanovi\u0107 N et al (2023) Intrusion detection in healthcare 4.0 internet of things systems via metaheuristics optimized machine learning. Sustainability 15(16):12563","journal-title":"Sustainability"},{"key":"1938_CR5","first-page":"19","volume":"22","author":"D Roy","year":"2024","unstructured":"Roy D, Roy A, Roy U (2024) Learning from imbalanced data in healthcare: state-of-the-art and research challenges. Comput Intel Healthc Inform 22:19\u201332","journal-title":"Comput Intel Healthc Inform"},{"key":"1938_CR6","doi-asserted-by":"publisher","unstructured":"Malarvizhi Kumar P, Choong Seon H (2023) RETRACTED ARTICLE: Internet of things-based digital video intrusion for intelligent monitoring approach. Arab J Sci Eng 48:2613. https:\/\/doi.org\/10.1007\/s13369-021-05902-2","DOI":"10.1007\/s13369-021-05902-2"},{"key":"1938_CR7","doi-asserted-by":"publisher","first-page":"122198","DOI":"10.1016\/j.eswa.2023.122198","volume":"238","author":"S Li","year":"2024","unstructured":"Li S, Cao Y, Liu S, Lai Y, Zhu Y, Ahmad N (2024) HDA-IDS: a hybrid DoS attacks intrusion detection system for IoT by using semi-supervised CL-GAN. Expert Syst Appl 238:122198","journal-title":"Expert Syst Appl"},{"issue":"8","key":"1938_CR8","doi-asserted-by":"publisher","first-page":"9741","DOI":"10.1007\/s13369-021-06377-x","volume":"47","author":"K Upadhyay","year":"2022","unstructured":"Upadhyay K, Kaur P, Verma DK (2022) Evaluating the performance of data level methods using keel tool to address class imbalance problem. Arab J Sci Eng 47(8):9741\u201354","journal-title":"Arab J Sci Eng"},{"key":"1938_CR9","doi-asserted-by":"publisher","first-page":"110986","DOI":"10.1016\/j.asoc.2023.110986","volume":"150","author":"J Guo","year":"2024","unstructured":"Guo J, Wu H, Chen X, Lin W (2024) Adaptive SV-Borderline SMOTE-SVM algorithm for imbalanced data classification. Appl Soft Comput 150:110986","journal-title":"Appl Soft Comput"},{"key":"1938_CR10","doi-asserted-by":"publisher","first-page":"111272","DOI":"10.1016\/j.knosys.2023.111272","volume":"284","author":"Y Chen","year":"2024","unstructured":"Chen Y, Yang X, Dai H-L (2024) Cost-sensitive continuous ensemble kernel learning for imbalanced data streams with concept drift. Knowl-Based Syst 284:111272","journal-title":"Knowl-Based Syst"},{"key":"1938_CR11","first-page":"321","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intel Res 16:321\u2013357","journal-title":"J Artif Intel Res"},{"key":"1938_CR12","doi-asserted-by":"crossref","unstructured":"Han H, Wang WY, Mao BH (2005) Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In International conference on intelligent computing (pp. 878-887). Berlin, Heidelberg: Springer Berlin Heidelberg","DOI":"10.1007\/11538059_91"},{"key":"1938_CR13","doi-asserted-by":"publisher","unstructured":"He H, Bai Y, Garcia EA, Li S (2008) ADASYN: Adaptive synthetic sampling approach for imbalanced learning. 2008 IEEE International Joint Conference on Neural Networks (IEEE world congress on computational Intelligence), Hong Kong, pp. 1322\u20131328.\u00a0https:\/\/doi.org\/10.1109\/IJCNN.2008.4633969","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"1938_CR14","doi-asserted-by":"crossref","unstructured":"Bousmalis K, Silberman N, Dohan D, Erhan D, Krishnan D (2017) Unsupervised pixel-level domain adaptation with generative adversarial networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3722\u20133731","DOI":"10.1109\/CVPR.2017.18"},{"key":"1938_CR15","first-page":"2672","volume":"27","author":"I Goodfellow","year":"2014","unstructured":"Goodfellow I et al (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27:2672\u20132680","journal-title":"Adv Neural Inf Process Syst"},{"key":"1938_CR16","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.eswa.2017.09.030","volume":"91","author":"G Douzas","year":"2018","unstructured":"Douzas G, Bacao F (2018) Effective data generation for imbalanced learning using conditional generative adversarial networks. Expert Syst Appl 91:464\u2013471","journal-title":"Expert Syst Appl"},{"key":"1938_CR17","unstructured":"Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. Proceedings of the 34th International Conference on Machine\u00a0Learning, vol 70. PMLR, pp. 214\u2013223"},{"key":"1938_CR18","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of wasserstein gans. Adv Neur Inform Proc Syst 30:5767\u20135777"},{"issue":"1","key":"1938_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/s40537-024-00886-w","volume":"11","author":"MA Talukder","year":"2024","unstructured":"Talukder MA et al (2024) Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction. J Big Data 11(1):33","journal-title":"J Big Data"},{"issue":"1","key":"1938_CR20","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10207-022-00634-2","volume":"22","author":"S Mohamed","year":"2023","unstructured":"Mohamed S, Ejbali R (2023) Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system. Int J Inf Secur 22(1):235\u2013247","journal-title":"Int J Inf Secur"},{"key":"1938_CR21","unstructured":"Ba H (2019) Improving detection of credit card fraudulent transactions using generative adversarial networks, arXiv preprint arXiv:1907.03355"},{"key":"1938_CR22","doi-asserted-by":"crossref","unstructured":"Lin Z, Shi Y, Xue Z (2022) Idsgan: Generative adversarial networks for attack generation against intrusion detection,\" in Advances in Knowledge Discovery and Data Mining: 26th Pacific-Asia Conference, PAKDD 2022, Chengdu, China, May 16\u201319, 2022, Proceedings, Part III pp. 79\u201391: Springer","DOI":"10.1007\/978-3-031-05981-0_7"},{"issue":"09","key":"1938_CR23","doi-asserted-by":"publisher","first-page":"375","DOI":"10.3390\/info12090375","volume":"12","author":"S Bourou","year":"2021","unstructured":"Bourou S, El Saer A, Velivassaki T-H, Voulkidis A, Zahariadis T (2021) A review of tabular data synthesis using GANs on an IDS dataset. Information 12(09):375","journal-title":"Information"},{"key":"1938_CR24","doi-asserted-by":"publisher","first-page":"13635","DOI":"10.1007\/s00521-021-05993-w","volume":"33","author":"G Dlamini","year":"2021","unstructured":"Dlamini G, Fahim M (2021) DGM: a data generative model to improve minority class presence in anomaly detection domain. Neural Comput Appl 33:13635\u201313646","journal-title":"Neural Comput Appl"},{"issue":"5","key":"1938_CR25","first-page":"2","volume":"2014","author":"J Gauthier","year":"2014","unstructured":"Gauthier J (2014) \u201cConditional generative adversarial nets for convolutional face generation,\u201d Class project for Stanford CS231N: convolutional neural networks for visual recognition. Winter semester 2014(5):2","journal-title":"Winter semester"},{"key":"1938_CR26","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1016\/j.neucom.2018.10.109","volume":"396","author":"X Gao","year":"2020","unstructured":"Gao X, Deng F, Yue X (2020) Data augmentation in fault diagnosis based on the Wasserstein generative adversarial network with gradient penalty. Neurocomputing 396:487\u2013494","journal-title":"Neurocomputing"},{"key":"1938_CR27","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273\u2013297","journal-title":"Mach Learn"},{"issue":"4","key":"1938_CR28","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TNNLS.2015.2424995","volume":"27","author":"J Tang","year":"2015","unstructured":"Tang J, Deng C, Huang G-B (2015) Extreme learning machine for multilayer perceptron. IEEE Trans Neur Netw Learn Syst 27(4):809\u2013821","journal-title":"IEEE Trans Neur Netw Learn Syst"},{"key":"1938_CR29","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1:81\u2013106","journal-title":"Mach Learn"},{"key":"1938_CR30","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45:5\u201332","journal-title":"Mach Learn"},{"key":"1938_CR31","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani\u00a0AA (2009) A detailed analysis of the KDD CUP 99 data set. 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE,\u00a0Ottawa, pp. 1\u20136.\u00a0https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"1938_CR32","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS),\u00a0IEEE, Canberra, pp. 1\u20136.\u00a0https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"4","key":"1938_CR33","first-page":"1","volume":"5","author":"D Ramyachitra","year":"2014","unstructured":"Ramyachitra D, Manikandan P (2014) Imbalanced dataset classification and solutions: a review. Int J Comput Business Res (IJCBR) 5(4):1\u201329","journal-title":"Int J Comput Business Res (IJCBR)"},{"key":"1938_CR34","doi-asserted-by":"publisher","first-page":"2839","DOI":"10.1007\/s00521-020-05130-z","volume":"33","author":"E Elyan","year":"2021","unstructured":"Elyan E, Moreno-Garcia CF, Jayne C (2021) CDSMOTE: class decomposition and synthetic minority class oversampling technique for imbalanced-data classification. Neural Comput Appl 33:2839\u20132851","journal-title":"Neural Comput Appl"},{"key":"1938_CR35","unstructured":"Hardt M, Recht B, Singer Y (2016) Train faster, generalize better: Stability of stochastic gradient descent. InInternational conference on machine learning (pp. 1225-1234). PMLR"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01938-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01938-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01938-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:47Z","timestamp":1746844307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01938-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,12]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1938"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01938-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,12]]},"assertion":[{"value":"12 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No ethical approval is required based on the following a. This article does not contain any studies with animals performed by any of the authors. b. This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"121"}}