{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:06:06Z","timestamp":1750824366114,"version":"3.41.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/cscwd64889.2025.11033632","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:40Z","timestamp":1750699480000},"page":"1764-1769","source":"Crossref","is-referenced-by-count":0,"title":["A Dual-Module Intrusion Detection Framework for Industrial Internet Collaboration: Tackling Data Imbalance Challenges"],"prefix":"10.1109","author":[{"given":"Bo","family":"Cui","sequence":"first","affiliation":[{"name":"Engineering Research Center of Ecological Big Data, Ministry of Education College of Computer Science, Inner Mongolia University,Hohhot,China"}]},{"given":"JiaHui","family":"Yao","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Ecological Big Data, Ministry of Education College of Computer Science, Inner Mongolia University,Hohhot,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.026"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.03.056"},{"key":"ref4","article-title":"SMOTE: Syn-thetic Minority Over-sampling Technique[J]","author":"Bowyer","year":"2011","journal-title":"CoRR, vol. abs\/1106.1813"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108511"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.026"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ins.2021.12.066","article-title":"SVDD-based weighted oversampling technique for imbalanced and overlapped dataset learning[J]","volume":"588","author":"X","year":"2022","journal-title":"Inf. Sci."},{"issue":"3","key":"ref8","doi-asserted-by":"crossref","first-page":"102889","DOI":"10.1016\/j.ipm.2022.102889","article-title":"Data augmentation of credit default swap transactions based on a sequence GAN[J]","volume":"59","author":"X","year":"2022","journal-title":"Inf. Process. Manag."},{"issue":"4","key":"ref9","first-page":"4567","article-title":"N-GNN Model for Imbalanced Data in Industrial IoT Intrusion Detection","volume":"19","author":"Zhang","year":"2023","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"ref10","first-page":"1234","article-title":"Self-Supervised GANs for Imbalanced Intrusion Detection in High-Dimensional Data","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"38","author":"Wang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s16101701"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01694-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s19112528"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01332-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2017.11.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref21","first-page":"155","article-title":"Support Vector Regression Machines[C]","volume-title":"Advances in Neural Information Processing Systems 9, NIPS, Denver, CO, USA","author":"Drucker","year":"1996"},{"key":"ref22","first-page":"15","article-title":"A neural network based system for intrusion detection and classification of attacks[C]","volume-title":"Proceedings of the IEEE international conference on advances in intelligent systems-theory and applications, pp","author":"Moradi"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.03.014"},{"key":"ref24","first-page":"66","article-title":"Generative Oversampling for Mining Imbal-anced Datasets[C]","volume-title":"Proceedings of the 2007 International Conference on Data Mining, DMIN 2007, June 25\u201328","author":"Liu"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03995-2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03361-2"}],"event":{"name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2025,5,5]]},"location":"Compiegne, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11033175\/11033221\/11033632.pdf?arnumber=11033632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:20:30Z","timestamp":1750746030000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11033632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cscwd64889.2025.11033632","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}