{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:48:32Z","timestamp":1777657712476,"version":"3.51.4"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,10]]},"DOI":"10.1109\/icpr48806.2021.9412580","type":"proceedings-article","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T02:15:54Z","timestamp":1620267354000},"page":"8148-8155","source":"Crossref","is-referenced-by-count":14,"title":["Spiking Neural Networks with Single-Spike Temporal-Coded Neurons for Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Shibo","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiaohua","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2017.00682"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011319"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(01)00658-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00790"},{"key":"ref14","author":"hunsberger","year":"2015","journal-title":"Spiking Deep Networks with LIF Neurons"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"508","DOI":"10.3389\/fnins.2016.00508","article-title":"Training deep spiking neural networks using backpropagation","volume":"10","author":"lee","year":"2016","journal-title":"Frontiers in Neuroscience"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2726060"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011311"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref3","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref27","author":"g\u00f6ltz","year":"2019","journal-title":"Fast and deep neuromorphic learning with time-to-first-spike coding"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.12.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2018.00331"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/COMST.2015.2402161","article-title":"Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset","volume":"18","author":"kolias","year":"2015","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2015.00099"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.31.060407.125639"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2019.2931595"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.12.002"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TCDS.2018.2833071","article-title":"Deep spiking convolutional neural network trained with unsupervised spike-timing-dependent plasticity","volume":"11","author":"lee","year":"2018","journal-title":"IEEE Transactions on Cognitive and Developmental Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53806-7_8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8693059"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"}],"event":{"name":"2020 25th International Conference on Pattern Recognition (ICPR)","location":"Milan, Italy","start":{"date-parts":[[2021,1,10]]},"end":{"date-parts":[[2021,1,15]]}},"container-title":["2020 25th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9411940\/9411911\/09412580.pdf?arnumber=9412580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T06:54:53Z","timestamp":1725000893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9412580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icpr48806.2021.9412580","relation":{},"subject":[],"published":{"date-parts":[[2021,1,10]]}}}