{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:05:20Z","timestamp":1776888320500,"version":"3.51.2"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/icaiic48513.2020.9064976","type":"proceedings-article","created":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T05:46:17Z","timestamp":1587102377000},"page":"218-224","source":"Crossref","is-referenced-by-count":167,"title":["1D CNN based network intrusion detection with normalization on imbalanced data"],"prefix":"10.1109","author":[{"given":"Meliboev","family":"Azizjon","sequence":"first","affiliation":[]},{"given":"Alikhanov","family":"Jumabek","sequence":"additional","affiliation":[]},{"given":"Wooseong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A deep learning approach for network intrusion detection system","author":"ahmad","year":"0","journal-title":"Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS) ICST (Institute for Computer Sciences Social-Informatics and Telecommunications Engineering)"},{"key":"ref11","first-page":"41","article-title":"A deep learning approach to network intrusion detection","volume":"1","author":"nathan","year":"0","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence 2"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A deep learning approach for intrusion detection using recurrent neural networks","volume":"5","author":"chuanlong","year":"2017","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref15","article-title":"Intrusion detection algorithm based on convolutional neural network","author":"yuchen","year":"2017","journal-title":"DEStech Transactions on Engineering and Technology Research iceta"},{"key":"ref16","author":"teyou","year":"2019","journal-title":"Convolutional Neural Network for Intrusion Detection System In Cyber Physical Systems"},{"key":"ref17","first-page":"412","article-title":"Learning a nonlinear embedding by preserving class neighbourhood structure","author":"salakhutdinov","year":"2007","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref19","author":"ioffe","year":"2015","journal-title":"Batch Normalization Accelerating Deep Network Training by Reducing Internal Covariate Shift"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"ref27","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/240217"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.009"},{"key":"ref8","first-page":"446","article-title":"A study on NSL-KDD dataset for intrusion detection system based on classification algorithms","volume":"4 6","author":"dhanabal","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732199"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref1","year":"0"},{"key":"ref20","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"0","journal-title":"European Conference on Computer Vision"},{"key":"ref22","first-page":"25","article-title":"Handling imbalanced datasets: A review","volume":"30 1","author":"sotiris","year":"2006","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref24","author":"lee","year":"2015","journal-title":"Generalizing Pooling Functions in Convolutional Neural Networks Mixed Gated and Tree"},{"key":"ref23","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11553595_6"},{"key":"ref25","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"}],"event":{"name":"2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","location":"Fukuoka, Japan","start":{"date-parts":[[2020,2,19]]},"end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9046688\/9064864\/09064976.pdf?arnumber=9064976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:16:09Z","timestamp":1656375369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9064976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icaiic48513.2020.9064976","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}