{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T14:07:13Z","timestamp":1776521233793,"version":"3.51.2"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/bigdata52589.2021.9671576","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:39:16Z","timestamp":1642106356000},"page":"5413-5419","source":"Crossref","is-referenced-by-count":75,"title":["Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Masum","sequence":"first","affiliation":[]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[]},{"given":"Hisham","family":"Haddad","sequence":"additional","affiliation":[]},{"given":"Md Jobair Hossain","family":"Faruk","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Valero","sequence":"additional","affiliation":[]},{"given":"Md Abdullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mohammad A.","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Muhaiminul I.","family":"Adnan","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"Cuzzocrea","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647714"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICM50269.2020.9331794"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12220"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8407032"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2494218"},{"key":"ref16","article-title":"Fast Bayesian optimization of machine learning hyperparameters on large datasets","author":"klein","year":"2017","journal-title":"Proc 20th Int Conf Artif Intell Stat AISTATS 2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-3532-0_2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.633051"},{"key":"ref19","first-page":"714","article-title":"Approximating Number of Hidden layer neurons in Multiple Hidden Layer BPNN Architecture","volume":"3","author":"karsoliya","year":"2012","journal-title":"Int J Eng Trends Technol"},{"key":"ref4","article-title":"Toward classifying small lung nodules with hyperparameter optimization of convolutional neural networks","author":"lima","year":"2020","journal-title":"Comput Intell"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2020.2.3868"},{"key":"ref6","first-page":"2951","article-title":"Practical Bayesian optimization of machine learning algorithms","volume":"4","author":"snoek","year":"2012","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref5","first-page":"281","article-title":"Random Search for Hyper-Parameter Optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref7","first-page":"535","article-title":"Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer 1 )","author":"aminanto","year":"2016"},{"key":"ref2","article-title":"Malware Detection and Prevention using Artificial Intelligence Techniques","author":"jobair","year":"2021","journal-title":"IEEE Intl Conf on Big Data"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014929"},{"key":"ref20","first-page":"1929","article-title":"Dropout: A Simple Way to Prevent Neural Networks from Overfitting","volume":"15","author":"hinton","year":"2014","journal-title":"J Mach Learn Res"}],"event":{"name":"2021 IEEE International Conference on Big Data (Big Data)","location":"Orlando, FL, USA","start":{"date-parts":[[2021,12,15]]},"end":{"date-parts":[[2021,12,18]]}},"container-title":["2021 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9671263\/9671273\/09671576.pdf?arnumber=9671576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:28Z","timestamp":1652201728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9671576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/bigdata52589.2021.9671576","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}