{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T18:51:08Z","timestamp":1773168668897,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s12652-022-04350-6","type":"journal-article","created":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T18:24:54Z","timestamp":1662747894000},"page":"10799-10809","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Hybrid intrusion detection model based on a designed autoencoder"],"prefix":"10.1007","volume":"14","author":[{"given":"Yuluo","family":"Hou","sequence":"first","affiliation":[]},{"given":"Yusheng","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jinhong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Renting","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"4350_CR1","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.3390\/sym13061011","volume":"13","author":"A Adnan","year":"2021","unstructured":"Adnan A, Muhammed A, Abd Ghani AA, Abdullah A, Hakim F (2021) An intrusion detection system for the internet of things based on machine learning: review and challenges. Symmetry 13:1011","journal-title":"Symmetry"},{"key":"4350_CR2","doi-asserted-by":"publisher","first-page":"106798","DOI":"10.1016\/j.knosys.2021.106798","volume":"216","author":"G Andresini","year":"2021","unstructured":"Andresini G, Appice A, Malerba D (2021) Nearest cluster-based intrusion detection through convolutional neural networks. Knowl-Based Syst 216:106798","journal-title":"Knowl-Based Syst"},{"key":"4350_CR3","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s10489-020-01886-y","volume":"51","author":"P Bedi","year":"2021","unstructured":"Bedi P, Gupta N, Jindal V (2021) I-siamids: an improved siam-ids for handling class imbalance in network-based intrusion detection systems. Appl Intell 51:1133\u20131151","journal-title":"Appl Intell"},{"key":"4350_CR4","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1007\/s13369-019-03970-z","volume":"45","author":"BS Bhati","year":"2020","unstructured":"Bhati BS, Rai C (2020) Analysis of support vector machine-based intrusion detection techniques. Arab J Sci Eng 45:2371\u20132383","journal-title":"Arab J Sci Eng"},{"key":"4350_CR5","doi-asserted-by":"publisher","first-page":"7094","DOI":"10.1007\/s10489-021-02205-9","volume":"51","author":"A Binbusayyis","year":"2021","unstructured":"Binbusayyis A, Vaiyapuri T (2021) Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class svm. Appl Intell 51:7094\u20137108","journal-title":"Appl Intell"},{"key":"4350_CR6","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for iot security based on learning techniques. IEEE Commun Surv Tutor 21:2671\u20132701","journal-title":"IEEE Commun Surv Tutor"},{"key":"4350_CR7","doi-asserted-by":"publisher","first-page":"5597","DOI":"10.1007\/s11227-019-02805-w","volume":"75","author":"H Choi","year":"2019","unstructured":"Choi H, Kim M, Lee G, Kim W (2019) Unsupervised learning approach for network intrusion detection system using autoencoders. J Supercomput 75:5597\u20135621","journal-title":"J Supercomput"},{"key":"4350_CR8","doi-asserted-by":"crossref","unstructured":"Cui J, Zong L, Xie J, Tang M (2022) A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl Intell 1\u201317","DOI":"10.1007\/s10489-022-03361-2"},{"key":"4350_CR25","doi-asserted-by":"publisher","first-page":"107417","DOI":"10.1016\/j.comnet.2020.107417","volume":"180","author":"CA de Souza","year":"2020","unstructured":"de Souza CA, Westphall CB, Machado RB, Sobral JBM, dos Santos Vieira G (2020) Hybrid approach to intrusion detection in fog-based iot environments. Comput Netw 180:107417","journal-title":"Comput Netw"},{"key":"4350_CR9","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.3390\/s20051452","volume":"20","author":"M Gao","year":"2020","unstructured":"Gao M, Ma L, Liu H, Zhang Z, Ning Z, Xu J (2020) Malicious network traffic detection based on deep neural networks and association analysis. Sensors 20:1452","journal-title":"Sensors"},{"key":"4350_CR10","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s00607-022-01059-4","volume":"104","author":"P Ghosh","year":"2022","unstructured":"Ghosh P, Alam Z, Sharma RR, Phadikar S (2022) An efficient sgm based ids in cloud environment. Computing 104:553\u2013576","journal-title":"Computing"},{"key":"4350_CR11","doi-asserted-by":"publisher","first-page":"102158","DOI":"10.1016\/j.cose.2020.102158","volume":"103","author":"J Gu","year":"2021","unstructured":"Gu J, Lu S (2021) An effective intrusion detection approach using svm with na\u00efve bayes feature embedding. Comput Secur 103:102158","journal-title":"Comput Secur"},{"key":"4350_CR12","doi-asserted-by":"crossref","first-page":"e4240","DOI":"10.1002\/ett.4240","volume":"32","author":"S Hajj","year":"2021","unstructured":"Hajj S, El Sibai R, Bou Abdo J, Demerjian J, Makhoul A, Guyeux C (2021) Anomaly-based intrusion detection systems: requirements, methods, measurements, and datasets. Trans Emerg Telecommun Technol 32:e4240","journal-title":"Trans Emerg Telecommun Technol"},{"key":"4350_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.04.012","volume":"49","author":"N Hubballi","year":"2014","unstructured":"Hubballi N, Suryanarayanan V (2014) False alarm minimization techniques in signature-based intrusion detection systems: a survey. Comput Commun 49:1\u201317","journal-title":"Comput Commun"},{"key":"4350_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.neucom.2019.11.016","volume":"387","author":"C Ieracitano","year":"2020","unstructured":"Ieracitano C, Adeel A, Morabito FC, Hussain A (2020) A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 387:51\u201362","journal-title":"Neurocomputing"},{"key":"4350_CR15","doi-asserted-by":"crossref","unstructured":"Kannari PR, Shariff NC, Biradar RL (2021) Network intrusion detection using sparse autoencoder with swish-prelu activation model. J Ambient Intell Hum Comput 1\u201313","DOI":"10.1007\/s12652-021-03077-0"},{"key":"4350_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2:1\u201322","journal-title":"Cybersecurity"},{"key":"4350_CR17","doi-asserted-by":"publisher","first-page":"103111","DOI":"10.1016\/j.jnca.2021.103111","volume":"187","author":"SW Lee","year":"2021","unstructured":"Lee SW, Mohammadi M, Rashidi S, Rahmani AM, Masdari M, Hosseinzadeh M et al (2021) Towards secure intrusion detection systems using deep learning techniques: comprehensive analysis and review. J Netw Comput Appl 187:103111","journal-title":"J Netw Comput Appl"},{"key":"4350_CR18","doi-asserted-by":"publisher","first-page":"101851","DOI":"10.1016\/j.cose.2020.101851","volume":"95","author":"X Li","year":"2020","unstructured":"Li X, Chen W, Zhang Q, Wu L (2020) Building auto-encoder intrusion detection system based on random forest feature selection. Comput Secur 95:101851","journal-title":"Comput Secur"},{"key":"4350_CR19","first-page":"1271","volume":"37","author":"Y Liu","year":"2017","unstructured":"Liu Y, Liu S, Zhao X et al (2017) Intrusion detection algorithm based on convolutional neural network. Beijing Ligong Daxue Xuebao\/Trans. Beijing Inst Technol 37:1271\u20131275","journal-title":"Beijing Inst Technol"},{"key":"4350_CR20","doi-asserted-by":"publisher","first-page":"6273","DOI":"10.1109\/JIOT.2020.3004469","volume":"8","author":"Z Lv","year":"2020","unstructured":"Lv Z, Chen D, Lou R, Song H (2020) Industrial security solution for virtual reality. IEEE Internet Things J 8:6273\u20136281","journal-title":"IEEE Internet Things J"},{"key":"4350_CR21","doi-asserted-by":"publisher","first-page":"4477","DOI":"10.1007\/s12652-019-01417-9","volume":"11","author":"J Meira","year":"2020","unstructured":"Meira J, Andrade R, Pra\u00e7a I, Carneiro J, Bol\u00f3n-Canedo V, Alonso-Betanzos A, Marreiros G (2020) Performance evaluation of unsupervised techniques in cyber-attack anomaly detection. J Ambient Intell Hum Comput 11:4477\u20134489","journal-title":"J Ambient Intell Hum Comput"},{"key":"4350_CR22","doi-asserted-by":"publisher","first-page":"167059","DOI":"10.1109\/ACCESS.2020.3022855","volume":"8","author":"K Sadaf","year":"2020","unstructured":"Sadaf K, Sultana J (2020) Intrusion detection based on autoencoder and isolation forest in fog computing. IEEE Access 8:167059\u2013167068","journal-title":"IEEE Access"},{"key":"4350_CR23","doi-asserted-by":"crossref","unstructured":"Shahriar MH, Haque NI, Rahman MA, Alonso M (2020) G-ids: generative adversarial networks assisted intrusion detection system. In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), IEEE, pp 376\u2013385","DOI":"10.1109\/COMPSAC48688.2020.0-218"},{"key":"4350_CR24","doi-asserted-by":"publisher","first-page":"4294","DOI":"10.3390\/s21134294","volume":"21","author":"Y Song","year":"2021","unstructured":"Song Y, Hyun S, Cheong YG (2021) Analysis of autoencoders for network intrusion detection. Sensors 21:4294","journal-title":"Sensors"},{"key":"4350_CR26","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1007\/s00521-015-1939-3","volume":"27","author":"Y Sun","year":"2016","unstructured":"Sun Y, Mao H, Guo Q, Yi Z (2016) Learning a good representation with unsymmetrical auto-encoder. Neural Comput Appl 27:1361\u20131367","journal-title":"Neural Comput Appl"},{"key":"4350_CR27","doi-asserted-by":"crossref","unstructured":"Taghavinejad SM, Taghavinejad M, Shahmiri L, Zavvar M, Zavvar MH (2020) Intrusion detection in iot-based smart grid using hybrid decision tree. In: 2020 6th International Conference on Web Research (ICWR), IEEE, pp 152\u2013156","DOI":"10.1109\/ICWR49608.2020.9122320"},{"key":"4350_CR28","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.3390\/sym12091458","volume":"12","author":"C Tang","year":"2020","unstructured":"Tang C, Luktarhan N, Zhao Y (2020) An efficient intrusion detection method based on lightgbm and autoencoder. Symmetry 12:1458","journal-title":"Symmetry"},{"key":"4350_CR29","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","volume":"12","author":"A Thakkar","year":"2021","unstructured":"Thakkar A, Lohiya R (2021) Attack classification using feature selection techniques: a comparative study. J Ambient Intell Hum Comput 12:1249\u20131266","journal-title":"J Ambient Intell Hum Comput"},{"key":"4350_CR30","doi-asserted-by":"publisher","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","volume":"28","author":"A Thakkar","year":"2021","unstructured":"Thakkar A, Lohiya R (2021) A review on machine learning and deep learning perspectives of ids for iot: recent updates, security issues, and challenges. Arch Comput Methods Eng 28:3211\u20133243","journal-title":"Arch Comput Methods Eng"},{"key":"4350_CR31","doi-asserted-by":"publisher","first-page":"10859","DOI":"10.1007\/s13369-020-04907-7","volume":"45","author":"R Wazirali","year":"2020","unstructured":"Wazirali R (2020) An improved intrusion detection system based on knn hyperparameter tuning and cross-validation. Arab J Sci Eng 45:10859\u201310873","journal-title":"Arab J Sci Eng"},{"key":"4350_CR32","doi-asserted-by":"publisher","first-page":"6187","DOI":"10.1109\/JIOT.2020.3034621","volume":"8","author":"X Xu","year":"2020","unstructured":"Xu X, Li J, Yang Y, Shen F (2020) Toward effective intrusion detection using log-cosh conditional variational autoencoder. IEEE Internet Things J 8:6187\u20136196","journal-title":"IEEE Internet Things J"},{"key":"4350_CR33","doi-asserted-by":"publisher","first-page":"238","DOI":"10.3390\/app9020238","volume":"9","author":"Y Yang","year":"2019","unstructured":"Yang Y, Zheng K, Wu C, Niu X, Yang Y (2019) Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks. Appl Sci 9:238","journal-title":"Appl Sci"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04350-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-04350-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04350-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T19:57:01Z","timestamp":1701028621000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-04350-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,9]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["4350"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-04350-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,9]]},"assertion":[{"value":"18 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On the behalf of all the authors corresponding author declares that there is no conflict of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}