{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T15:53:12Z","timestamp":1762098792897,"version":"build-2065373602"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1109\/iccais59597.2023.10382282","type":"proceedings-article","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T19:38:20Z","timestamp":1704915500000},"page":"553-559","source":"Crossref","is-referenced-by-count":2,"title":["Particle Swarm Optimization of Deep Auto-Encoder Network Architectures for Anomaly-based Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Quoc Trung","family":"Tran","sequence":"first","affiliation":[{"name":"Le Quy Don Technical University"}]},{"given":"Van Quan","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University"}]},{"given":"Thanh Long","family":"Ngo","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v8i330202"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9376174"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s42452\u2013021-04156-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC51351.2021.9451740"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3472753"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/13608-1412"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2021.1885150"},{"article-title":"Deep learning","year":"2016","author":"Goodfellow","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7503.003.0024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3163811"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63924-2_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NICS54270.2021.9701456"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2838668"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369451"},{"issue":"1","key":"ref18","first-page":"1","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"2","author":"An","year":"2015","journal-title":"Special lecture on IE"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2848210"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116612"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/KSE56063.2022.9953763"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2881143"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.05.010"},{"issue":"2","key":"ref24","first-page":"2012","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"Bergstra","journal-title":"Journal of machine learning research"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28650-9_4"},{"key":"ref26","article-title":"Designing neural network architectures using reinforcement learning","author":"Baker","year":"2016","journal-title":"arXiv preprint arXiv:1611.02167"},{"issue":"2011","key":"ref27","first-page":"1","article-title":"Sparse autoencoder","volume":"72","author":"Andrew","year":"2011","journal-title":"CS294A Lecture notes"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-27705-6_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"}],"event":{"name":"2023 12th International Conference on Control, Automation and Information Sciences (ICCAIS)","start":{"date-parts":[[2023,11,27]]},"location":"Hanoi, Vietnam","end":{"date-parts":[[2023,11,29]]}},"container-title":["2023 12th International Conference on Control, Automation and Information Sciences (ICCAIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10382256\/10382242\/10382282.pdf?arnumber=10382282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T18:20:30Z","timestamp":1705170030000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10382282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iccais59597.2023.10382282","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]}}}