{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:44:50Z","timestamp":1776876290331,"version":"3.51.2"},"reference-count":72,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:00:00Z","timestamp":1775606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100031478","name":"NextGenerationEU","doi-asserted-by":"publisher","award":["E53D23007950001"],"award-info":[{"award-number":["E53D23007950001"]}],"id":[{"id":"10.13039\/100031478","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115185","type":"journal-article","created":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T17:05:03Z","timestamp":1776013503000},"page":"115185","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Inter-layer autoencoder for mitigating evasion attacks against network intrusion detection systems"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7164-5736","authenticated-orcid":false,"given":"Gianni","family":"D\u2019Angelo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4199-8199","authenticated-orcid":false,"given":"Massimo","family":"Ficco","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1760-5527","authenticated-orcid":false,"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.asoc.2026.115185_bib0005","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/TNET.2021.3137084","article-title":"Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms","volume":"30","author":"Zhang","year":"2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.asoc.2026.115185_bib0010","author":"Szegedy"},{"key":"10.1016\/j.asoc.2026.115185_bib0015","article-title":"Adversarial attacks on machine learning cybersecurity defences in industrial control systems","volume":"58","author":"Anthi","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"10.1016\/j.asoc.2026.115185_bib0020","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1016\/j.dcan.2022.10.010","article-title":"Adversarial attacks and defenses for digital communication signals identification","volume":"10","author":"Tian","year":"2024","journal-title":"Digit. Commun. Netw."},{"issue":"22","key":"10.1016\/j.asoc.2026.115185_bib0025","doi-asserted-by":"crossref","first-page":"33773","DOI":"10.1007\/s11042-023-14702-9","article-title":"Adversarial examples: attacks and defences on medical deep learning systems","volume":"82","author":"Puttagunta","year":"2023","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0030","doi-asserted-by":"crossref","DOI":"10.3390\/risks11010020","article-title":"Adversarial artificial intelligence in insurance: from an example to some potential remedies","volume":"11","author":"Amerirad","year":"2023","journal-title":"Risks"},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0035","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/TDSC.2023.3247585","article-title":"Automatic evasion of machine learning-based network intrusion detection systems","volume":"21","author":"Yan","year":"2024","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0040","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10207-024-00940-x","article-title":"Deep behavioral analysis of machine learning algorithms against data poisoning","volume":"24","author":"Paracha","year":"2024","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"10.1016\/j.asoc.2026.115185_bib0045","doi-asserted-by":"crossref","first-page":"9351","DOI":"10.1007\/s11042-023-15883-z","article-title":"A state-of-the-art review on adversarial machine learning in image classification","volume":"83","author":"Bajaj","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.asoc.2026.115185_bib0050","series-title":"Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES \u201919)","article-title":"Black box attacks on deep anomaly detectors","author":"Kuppa","year":"2019"},{"key":"10.1016\/j.asoc.2026.115185_bib0055","author":"Lord"},{"key":"10.1016\/j.asoc.2026.115185_bib0060","series-title":"2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"20534","article-title":"Towards transferable targeted adversarial examples","author":"Wang","year":"2023"},{"key":"10.1016\/j.asoc.2026.115185_bib0065","doi-asserted-by":"crossref","first-page":"61113","DOI":"10.1109\/ACCESS.2024.3395118","article-title":"How deep learning sees the world: a survey on adversarial attacks & defenses","volume":"12","author":"Costa","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.115185_bib0070","series-title":"2016 IEEE Symposium on Security and Privacy","first-page":"582","article-title":"Distillation as a defense to adversarial perturbations against deep neural networks","author":"Papernot","year":"2016"},{"key":"10.1016\/j.asoc.2026.115185_bib0075","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"16447","article-title":"Randomized adversarial training via taylor expansion","author":"Jin","year":"2023"},{"key":"10.1016\/j.asoc.2026.115185_bib0080","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.neucom.2022.10.046","article-title":"Adversarial examples based on object detection tasks: a survey","volume":"519","author":"Mi","year":"2023","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.115185_bib0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118957","article-title":"Collaborative defense-gan for protecting adversarial attacks on classification system","volume":"214","author":"Laykaviriyakul","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0090","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0956792525100235","article-title":"Adversarial robustness of artificial intelligence","volume":"37","author":"Bungert","year":"2026","journal-title":"European Journal of Applied Mathematics"},{"key":"10.1016\/j.asoc.2026.115185_bib0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.110105","article-title":"An application of generative adversarial networks to improve automatic inspection in automotive manufacturing","volume":"136","author":"Mumbelli","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115185_bib0100","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.ins.2020.08.040","article-title":"GGA: a modified genetic algorithm with gradient-based local search for solving constrained optimization problems","volume":"547","author":"D\u2019Angelo","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115185_bib0105","author":"Sadeghzadeh"},{"key":"10.1016\/j.asoc.2026.115185_bib0110","series-title":"MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)","first-page":"559","article-title":"Adversarial examples against the deep learning based network intrusion detection systems","author":"Yang","year":"2018"},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0115","doi-asserted-by":"crossref","DOI":"10.1155\/int\/1500333","article-title":"Securing data privacy in NIDS: black-box adversarial attacks","volume":"2025","author":"Xu","year":"2025","journal-title":"Int. J. Intell. Syst."},{"key":"10.1016\/j.asoc.2026.115185_bib0120","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.jpdc.2022.06.004","article-title":"A novel flow-vector generation approach for malicious traffic detection","volume":"169","author":"Hou","year":"2022","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.asoc.2026.115185_bib0125","series-title":"2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007)","first-page":"744","article-title":"Using a packet manipulation tool for security analysis of industrial network protocols","author":"Kobayashi","year":"2007"},{"key":"10.1016\/j.asoc.2026.115185_bib0130","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103257","article-title":"Gpmt: generating practical malicious traffic based on adversarial attacks with little prior knowledge","volume":"130","author":"Sun","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.115185_bib0135","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.110173","article-title":"A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems","volume":"137","author":"Mohammadian","year":"2023","journal-title":"Appl. Soft Comput."},{"issue":"3","key":"10.1016\/j.asoc.2026.115185_bib0140","article-title":"Modeling realistic adversarial attacks against network intrusion detection systems","volume":"3","author":"Apruzzese","year":"2022","journal-title":"Digit. Threats"},{"key":"10.1016\/j.asoc.2026.115185_bib0145","series-title":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201921)","first-page":"495","article-title":"On the robustness of domain constraints","author":"Sheatsley","year":"2021"},{"key":"10.1016\/j.asoc.2026.115185_bib0150","article-title":"Defending against adversarial machine learning attacks using hierarchical learning: a case study on network traffic attack classification","volume":"72","author":"McCarthy","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"issue":"12","key":"10.1016\/j.asoc.2026.115185_bib0155","doi-asserted-by":"crossref","DOI":"10.3390\/fi15120405","article-title":"Securing network traffic classification models against adversarial examples using derived variables","volume":"15","author":"Adeke","year":"2023","journal-title":"Future Internet"},{"issue":"3","key":"10.1016\/j.asoc.2026.115185_bib0160","doi-asserted-by":"crossref","first-page":"732","DOI":"10.23919\/cje.2022.00.342","article-title":"Robust regularization design of graph neural networks against adversarial attacks based on lyapunov theory","volume":"33","author":"Yan","year":"2024","journal-title":"Chin. J. Electron."},{"issue":"15","key":"10.1016\/j.asoc.2026.115185_bib0165","doi-asserted-by":"crossref","DOI":"10.3390\/app13158830","article-title":"Universal adversarial training using auxiliary conditional generative model-based adversarial attack generation","volume":"13","author":"Dingeto","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.asoc.2026.115185_bib0170","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103644","article-title":"A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system","volume":"137","author":"Yuan","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.115185_bib0175","series-title":"Proceedings of the 6th International Conference on Electronics, Communications and Control Engineering (ICECC \u201923)","first-page":"220","article-title":"Explainable AI based adversarial examples and its evaluation","author":"Kumagai","year":"2023"},{"key":"10.1016\/j.asoc.2026.115185_bib0180","first-page":"1","article-title":"Moarnn-am: multi-objective automated recurrent neural network with attention mechanism for cyber-attack detection of UAV","author":"Lu","year":"2025","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"3","key":"10.1016\/j.asoc.2026.115185_bib0185","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TR.2025.3528256","article-title":"Evolutionary adversarial autoencoder for unsupervised anomaly detection of industrial internet of things","volume":"74","author":"Zeng","year":"2025","journal-title":"IEEE Trans. Reliab."},{"issue":"2","key":"10.1016\/j.asoc.2026.115185_bib0190","doi-asserted-by":"crossref","DOI":"10.3390\/fi15020062","article-title":"Adversarial machine learning attacks against intrusion detection systems: a survey on strategies and defense","volume":"15","author":"Alotaibi","year":"2023","journal-title":"Future Internet"},{"issue":"24","key":"10.1016\/j.asoc.2026.115185_bib0195","first-page":"5030","article-title":"A systematic study of adversarial attacks against network intrusion detection systems","volume":"13","author":"Sharma","year":"2024","journal-title":"Electronics (Basel)"},{"issue":"1\u20132","key":"10.1016\/j.asoc.2026.115185_bib0200","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1504\/IJESDF.2025.143481","article-title":"Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences","volume":"17","author":"Patel","year":"2025","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"10.1016\/j.asoc.2026.115185_bib0205","series-title":"Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES \u201923","article-title":"Modern netflow network dataset with labeled attacks and detection methods","author":"Komisarek","year":"2023"},{"key":"10.1016\/j.asoc.2026.115185_bib0210","series-title":"2015 Military Communications and Information Systems Conference (MilCIS)","first-page":"1","article-title":"Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set)","author":"Moustafa","year":"2015"},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0215","doi-asserted-by":"crossref","first-page":"e331","DOI":"10.1002\/spy2.331","article-title":"UNSW-nb15 computer security dataset: analysis through visualization","volume":"7","author":"Zoghi","year":"2024","journal-title":"Secur. Priv."},{"key":"10.1016\/j.asoc.2026.115185_bib0220","series-title":"Mahalanobis Distance","first-page":"325","author":"Dodge","year":"2008"},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0225","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1186\/s40537-020-00379-6","article-title":"Performance analysis of intrusion detection systems using a feature selection method on the unsw-nb15 dataset","volume":"7","author":"Kasongo","year":"2020","journal-title":"J. Big Data"},{"key":"10.1016\/j.asoc.2026.115185_bib0230","author":"Chollet"},{"issue":"Oct","key":"10.1016\/j.asoc.2026.115185_bib0235","first-page":"2825","article-title":"Scikit-learn: machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.asoc.2026.115185_bib0240","series-title":"2010 IEEE 26-Th Convention of Electrical and Electronics Engineers in Israel","first-page":"555","article-title":"Using the confusion matrix for improving ensemble classifiers","author":"Marom","year":"2010"},{"key":"10.1016\/j.asoc.2026.115185_bib0245","article-title":"Intelligent network intrusion detection system using optimized deep cnn-lstm with unsw-nb15","author":"Thaljaoui","year":"2025","journal-title":"Int. J. Inf. Technol."},{"key":"10.1016\/j.asoc.2026.115185_bib0250","series-title":"AI, Machine Learning and Deep Learning: A Security Perspective","author":"Hu","year":"2023"},{"key":"10.1016\/j.asoc.2026.115185_bib0255","author":"Goodfellow"},{"key":"10.1016\/j.asoc.2026.115185_bib0260","series-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"Moosavi-Dezfooli","year":"2016"},{"key":"10.1016\/j.asoc.2026.115185_bib0265","series-title":"2017 IEEE Symposium on Security and Privacy","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"Carlini","year":"2017"},{"key":"10.1016\/j.asoc.2026.115185_bib0270","series-title":"Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (AISec \u201917)","first-page":"15","article-title":"Zoo: zeroth order optimization based black-box attacks to deep neural networks without training substitute models","author":"Chen","year":"2017"},{"key":"10.1016\/j.asoc.2026.115185_bib0275","series-title":"Computer Vision \u2013 ECCV 2020","first-page":"484","article-title":"Square attack: a query-efficient black-box adversarial attack via random search","author":"Andriushchenko","year":"2020"},{"key":"10.1016\/j.asoc.2026.115185_bib0280","author":"Nicolae"},{"issue":"5","key":"10.1016\/j.asoc.2026.115185_bib0285","first-page":"2106","article-title":"Image transformation-based defense against adversarial perturbation on deep learning models","volume":"18","author":"Agarwal","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.asoc.2026.115185_bib0290","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104368","article-title":"Adaptive patch transformation for adversarial defense","volume":"153","author":"Zhang","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.115185_bib0295","series-title":"International Conference on Learning Representations","article-title":"Sensitivity and generalization in neural networks: an empirical study","author":"Novak","year":"2018"},{"issue":"9","key":"10.1016\/j.asoc.2026.115185_bib0300","doi-asserted-by":"crossref","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","article-title":"Adversarial examples: attacks and defenses for deep learning","volume":"30","author":"Yuan","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115185_bib0305","author":"Xu"},{"key":"10.1016\/j.asoc.2026.115185_bib0310","series-title":"2025 International Conference on Networks and Cryptology (NETCRYPT)","first-page":"1551","article-title":"The evolution of adversarial attacks in deep learning: a holistic survey","author":"Singh","year":"2025"},{"key":"10.1016\/j.asoc.2026.115185_bib0315","series-title":"2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring)","first-page":"1","article-title":"Adversarial attacks on machine learning-based IDS for v2x networks: a ciciov2024 study","author":"Mamun","year":"2025"},{"issue":"1","key":"10.1016\/j.asoc.2026.115185_bib0320","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-00890-x","article-title":"A multi-layered defense against adversarial attacks in brain tumor classification using ensemble adversarial training and feature squeezing","volume":"15","author":"Yinusa","year":"2025","journal-title":"Sci. Rep."},{"issue":"4","key":"10.1016\/j.asoc.2026.115185_bib0325","doi-asserted-by":"crossref","first-page":"387","DOI":"10.15625\/1813-9663\/22884","article-title":"Adversarial attack and defense in ai-powered intrusion detection","volume":"41","author":"Nguyen","year":"2025","journal-title":"J. Comput. Sci. Cybern."},{"issue":"19","key":"10.1016\/j.asoc.2026.115185_bib0330","doi-asserted-by":"crossref","DOI":"10.3390\/app12199406","article-title":"Adversarial detection based on inner-class adjusted cosine similarity","volume":"12","author":"Guan","year":"2022","journal-title":"Appl. Sci."},{"key":"10.1016\/j.asoc.2026.115185_bib0335","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107986","article-title":"Closeness and uncertainty aware adversarial examples detection in adversarial machine learning","volume":"101","author":"Tuna","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.asoc.2026.115185_bib0340","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1016\/j.neunet.2023.08.022","article-title":"Adversarial attacks and defenses using feature-space stochasticity","volume":"167","author":"Ukita","year":"2023","journal-title":"Neural Netw."},{"key":"10.1016\/j.asoc.2026.115185_bib0345","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.dsp.2017.10.011","article-title":"Methods for interpreting and understanding deep neural networks","volume":"73","author":"Montavon","year":"2018","journal-title":"Digit. Signal Process."},{"issue":"2","key":"10.1016\/j.asoc.2026.115185_bib0350","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/s00521-024-10437-2","article-title":"Unlocking the black box: an in-depth review on interpretability, explainability, and reliability in deep learning","volume":"37","author":"\u015eAHiN","year":"2025","journal-title":"Neural Comput. Appl."},{"issue":"7","key":"10.1016\/j.asoc.2026.115185_bib0355","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v102.i07","article-title":"Neuralsens: sensitivity analysis of neural networks","volume":"102","author":"Pizarroso","year":"2022","journal-title":"J. Stat. Softw."},{"issue":"10","key":"10.1016\/j.asoc.2026.115185_bib0360","doi-asserted-by":"crossref","first-page":"2225","DOI":"10.1016\/j.neucom.2010.01.011","article-title":"First and second order sensitivity analysis of MLP","volume":"73","author":"Yeh","year":"2010","journal-title":"Neurocomputing"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006332?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006332?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:00:41Z","timestamp":1776873641000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":72,"alternative-id":["S1568494626006332"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115185","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Inter-layer autoencoder for mitigating evasion attacks against network intrusion detection systems","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115185","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"115185"}}