{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:54:30Z","timestamp":1772934870318,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401465","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"6597-6605","source":"Crossref","is-referenced-by-count":0,"title":["Building a Robust and Explainable IDS Using ML Techniques"],"prefix":"10.1109","author":[{"given":"Mayank","family":"Kapadia","sequence":"first","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]},{"given":"Tanya","family":"Yadav","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]},{"given":"Aditya","family":"Tekale","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]},{"given":"Kevin","family":"Gao","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]},{"given":"Nandhakumar","family":"Apparsamy","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]},{"given":"Matthew","family":"Leffler","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]},{"given":"Jeff","family":"Chong","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]},{"given":"Shih-Yu","family":"Chang","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Applied Data Intelligence,San Jose,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Evaluation of Network Intrusion Detection with Features Selection and Machine Learning Algorithms on CICIDS-2017 Dataset","volume-title":"Proc. Int. Conf. on Advances in Engineering Science Management & Technology (ICAESMT)","author":"Panwar","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icaccm56405.2022.10009400"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-022-09587-0"},{"key":"ref4","first-page":"131","article-title":"Machine Learning Techniques for Anomaly-Based Detection System on CSE-CIC- IDS20 18 Dataset","volume-title":"Proc. Int. Conf. on Applications in Electronics Pervading Industry, Environment and Society","author":"Elhanashi","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i1.pp1134-1141"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"ref7","first-page":"97","article-title":"Ctab-GAN: Effective Table Data Synthesizing","volume-title":"Proc. Asian Conf. on Machine Learning (ACML)","author":"Zhao","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75171-7_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295070"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"issue":"22","key":"ref14","first-page":"41","article-title":"An Empirical Study of the Naive Bayes Classifier","volume-title":"IJCAI 2001 Workshop on Empirical Methods in AI","volume":"3","author":"Rish","year":"2001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"ref16","article-title":"Neural Networks: A Comprehensive Foundation","author":"Haykin","year":"1998","journal-title":"Prentice Hall"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2006.1688199"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"},{"key":"ref20","first-page":"281","article-title":"Some Methods for Classification and Analysis of Mul-tivariate Observations","volume-title":"Proc. 5th Berkeley Symp. on Mathematical Statistics and Probability","volume":"1","author":"MacQueen","year":"1967"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00357-014-9161-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref23","article-title":"Learning from Labeled and Unlabeled Data with Label Propagation","volume-title":"Technical Report CMU -CALD-02\u20131 07, Carnegie Mellon University","author":"Zhu","year":"2002"},{"key":"ref24","first-page":"321","article-title":"Learning with Local and Global Consistency","volume":"16","author":"Zhou","year":"2004","journal-title":"Advances in Neural Information Processing Systems (Ne u rIPS)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3115\/981658.981684"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0706-y"},{"key":"ref27","article-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018","journal-title":"MIT Press"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref29","first-page":"1928","article-title":"Asynchronous Methods for Deep Re-inforcement Learning","volume-title":"Proc. 33rd Int. Conf. on Machine Learning (ICML)","author":"Mnih","year":"2016"},{"key":"ref30","article-title":"Prox-imal Policy Optimization Algorithms","author":"Schulman","year":"2017","journal-title":"arXiv preprint"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2018.08.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF01908075"},{"key":"ref34","first-page":"410","article-title":"V-Measure: A Conditional Entropy-Based External Cluster Evaluation Measure","volume-title":"Proc. 2007 Joint Conf. on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp","author":"Rosenberg","year":"2007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref36","first-page":"4765","article-title":"A Unified Approach to Interpreting Model Predictions","volume-title":"Proc. 31st Conf. on Neural Information Processing Systems (NeurIPS)","author":"Lundberg","year":"2017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401465.pdf?arnumber=11401465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:19:03Z","timestamp":1772867943000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401465","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}