{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T00:43:32Z","timestamp":1764377012445,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/fuzz-ieee.2018.8491578","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T22:18:38Z","timestamp":1539987518000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Network Intrusion Detection Using Kernel-based Fuzzy-rough Feature Selection"],"prefix":"10.1109","author":[{"given":"Qiangyi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yanpeng","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Ansheng","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref33","first-page":"1","article-title":"Multi-functional nearest-neighbour classification","author":"qu","year":"2017","journal-title":"Soft Computing"},{"key":"ref32","first-page":"299","article-title":"Classes of kernels for machine learning: a statistics perspective","volume":"2","author":"genton","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref30","first-page":"3175","article-title":"Feature reduction using principal component analysis for effective anomalycbased intrusion detection on nsl-kdd","volume":"2","author":"lakhina","year":"2010","journal-title":"International Journal of Engineering Science and Technology"},{"key":"ref37","first-page":"148","article-title":"Experiments with a new boosting algorithm","volume":"13","author":"freund","year":"2001"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref34","first-page":"338","article-title":"Estimating continuous distributions in bayesian classifiers","author":"john","year":"2013"},{"article-title":"Correlation-based feature selection for machine learning","year":"1999","author":"hall","key":"ref10"},{"key":"ref11","first-page":"153","article-title":"Principal components analysis","volume":"32","author":"hsing","year":"2013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2015.7349827"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7975-9_14"},{"journal-title":"Rough Sets Theoretical Aspects of Reasoning about Data","year":"1991","author":"pawlak","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809682"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2011.6007401"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-015-0044-1"},{"key":"ref19","article-title":"Correlation-based feature selection for machine learning","author":"hall","year":"1998","journal-title":"PhD thesis"},{"key":"ref28","article-title":"An extended TakagiSugenoKang inference system (TSK+) with fuzzy interpolation and its rule base generation","author":"li","year":"2017","journal-title":"Soft Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11569596_25"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.12.001"},{"key":"ref3","first-page":"443","article-title":"Artificial neural networks for misuse detection","author":"cannady","year":"1998"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015710"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1360\/jos181369","article-title":"An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm","volume":"18","author":"yan","year":"2007","journal-title":"Journal of Software"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.10.002"},{"key":"ref7","first-page":"120","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"1999","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"ref2","first-page":"877","article-title":"Data mining for intrusion detection: Techniques, applications and systems","author":"pei","year":"2004","journal-title":"International Conference on Data Engineering"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.07.008"},{"key":"ref1","first-page":"16","article-title":"Fuzzy data mining and genetic algorithms applied to intrusion detection","author":"bridges","year":"2000"},{"key":"ref20","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"guyon","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.06.036"},{"key":"ref21","article-title":"An adaptation of relief for attribute estimation in regression","author":"robnik-sikonja","year":"1997","journal-title":"Likonja"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-319-46562-3_8","article-title":"TSK inference with sparse rule bases","volume":"513","author":"li","year":"2017","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2582526"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2013.04.001"},{"key":"ref25","first-page":"102","article-title":"Experience-based Rule Base Generation and Adaptation for Fuzzy Interpolation","author":"li","year":"2016","journal-title":"IEEE International Conference on Fuzzy Systems"}],"event":{"name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466242\/8491438\/08491578.pdf?arnumber=8491578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:00:18Z","timestamp":1598238018000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2018.8491578","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}