{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:34:09Z","timestamp":1778693649395,"version":"3.51.4"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"EU Horizon2020 project MariCybERA","award":["952360"],"award-info":[{"award-number":["952360"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3341755","type":"journal-article","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T18:52:38Z","timestamp":1702407158000},"page":"140428-140442","source":"Crossref","is-referenced-by-count":22,"title":["Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1019-0366","authenticated-orcid":false,"given":"Seyed Mohammad Hadi","family":"Mirsadeghi","sequence":"first","affiliation":[{"name":"Department of Software Science, Centre for Digital Forensics and Cyber Security, Tallinn University of Technology, Tallinn, Estonia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8882-4095","authenticated-orcid":false,"given":"Hayretdin","family":"Bahsi","sequence":"additional","affiliation":[{"name":"Department of Software Science, Centre for Digital Forensics and Cyber Security, Tallinn University of Technology, Tallinn, Estonia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7781-5863","authenticated-orcid":false,"given":"Risto","family":"Vaarandi","sequence":"additional","affiliation":[{"name":"Department of Software Science, Centre for Digital Forensics and Cyber Security, Tallinn University of Technology, Tallinn, Estonia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5121-9043","authenticated-orcid":false,"given":"Wissem","family":"Inoubli","sequence":"additional","affiliation":[{"name":"CNRS, UMR 8188, Centre de Recherche en Informatique de Lens (CRIL), Artois University, Lens, France"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","first-page":"32","article-title":"Dynamic routing in covert channel overlays based on control protocols","volume-title":"Proc. Int. Conf. Internet Technol. Secured Trans.","author":"Backs"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00390-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11552253_3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.07.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501746"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4_45"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref9","article-title":"Cost-aware pre-training for multiclass cost-sensitive deep learning","author":"Chung","year":"2015","journal-title":"arXiv:1511.09337"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2006.1635905"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.03.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022633"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/j.0824-7935.2004.t01-1-00228.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.79"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2011.06.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-007-0087-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-022-06268-8"},{"key":"ref19","article-title":"NIPS 2016 tutorial: Generative adversarial networks","author":"Goodfellow","year":"2017","journal-title":"arXiv:1701.00160"},{"key":"ref20","article-title":"Metrics for multi-class classification: An overview","author":"Grandini","year":"2020","journal-title":"arXiv:2008.05756"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3437984.3458842"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6504"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0192-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2732482"},{"key":"ref27","first-page":"10","article-title":"Siamese neural networks for one-shot image recognition","volume-title":"Proc. ICML Deep Learn. Workshop","volume":"2","author":"Koch"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48229-6_9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0151-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048198"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.07.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206730"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.09.065"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543587"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2007.12.031"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36574-4_20"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36574-4_20"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071389"},{"key":"ref40","article-title":"Discriminators for use in flow-based classification","author":"Moore","year":"2013"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113696"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref43","first-page":"1","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Paszke"},{"key":"ref44","article-title":"Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation","author":"Powers","year":"2020","journal-title":"arXiv:2010.16061"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107852"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46182-3_13"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7755181"},{"key":"ref48","first-page":"29","article-title":"GAN-SMOTE: A generative adversarial network approach to synthetic minority oversampling for one-hot encoded data","volume-title":"Proc. ICONIP","author":"Scott"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CUBE.2013.31"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.21.09.p1.741755"},{"key":"ref53","first-page":"97","article-title":"Learning imbalanced and overlapping classes using fuzzy sets","volume-title":"Proc. ICML","volume":"3","author":"Visa"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106631"},{"key":"ref55","article-title":"The effect of class distribution on classifier learning: An empirical study","author":"Weiss","year":"2001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11196"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953565"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107315"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2010.00358.x"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10353929.pdf?arnumber=10353929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T22:29:29Z","timestamp":1710196169000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10353929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3341755","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}