{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:59:21Z","timestamp":1772121561858,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/icccn52240.2021.9522215","type":"proceedings-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T20:31:47Z","timestamp":1630441907000},"page":"1-9","source":"Crossref","is-referenced-by-count":34,"title":["Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Jianyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianli","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Ismail","family":"AlQerm","sequence":"additional","affiliation":[]},{"given":"Yuanni","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"CSE-CIC-IDS2018 Dataset"},{"key":"ref11","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv preprint arXiv 1412 6572"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref14","article-title":"IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection","author":"lin","year":"2018","journal-title":"arXiv preprint arXiv 1809 02077"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599759"},{"key":"ref16","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016","journal-title":"arXiv preprint arXiv 1605 07761"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref18","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"arXiv preprint arXiv 1607 02533"},{"key":"ref19","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref28","year":"0","journal-title":"Keras The Python deep learning library"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2922584"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"key":"ref29","article-title":"Foolbox: a python toolbox to benchmark the robustness of machine learning models","author":"rauber","year":"2017","journal-title":"arXiv preprint arXiv 1707 00666"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2018.8466271"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref1","article-title":"Cisco 2020 Annual Cybersecurity Report","year":"0","journal-title":"Cisco"},{"key":"ref20","article-title":"Conditional image synthesis with auxiliary classifier gans","author":"odena","year":"2016","journal-title":"arXiv preprint arXiv 1610 09585"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"ref24","article-title":"Semi-supervised learning with generative adversarial networks","author":"odena","year":"2016","journal-title":"arXiv preprint arXiv 1606 01583"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.013"},{"key":"ref26","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"2017","journal-title":"arXiv preprint arXiv 1712 04248"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"}],"event":{"name":"2021 International Conference on Computer Communications and Networks (ICCCN)","location":"Athens, Greece","start":{"date-parts":[[2021,7,19]]},"end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521949\/9522143\/09522215.pdf?arnumber=9522215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:14Z","timestamp":1652197514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9522215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icccn52240.2021.9522215","relation":{},"subject":[],"published":{"date-parts":[[2021,7]]}}}