{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:12:32Z","timestamp":1772910752736,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966342","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T17:41:30Z","timestamp":1499708490000},"page":"3854-3861","source":"Crossref","is-referenced-by-count":241,"title":["Autoencoder-based feature learning for cyber security applications"],"prefix":"10.1109","author":[{"given":"Mahmood","family":"Yousefi-Azar","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]},{"given":"Len","family":"Hamey","sequence":"additional","affiliation":[]},{"given":"Uday","family":"Tupakula","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"3221","article-title":"Accelerating t-sne using tree-based algorithms","volume":"15","author":"van der maaten","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"ref38","year":"0","journal-title":"Malware classification Distributed data mining with spark"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1162\/089976602760128018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.79.8.2554"},{"key":"ref31","first-page":"926","article-title":"A practical guide to training restricted boltzmann machines","volume":"9","author":"hinton","year":"2010","journal-title":"Momentum"},{"key":"ref30","first-page":"3371","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","volume":"11","author":"vincent","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-3-642-35289-8_26","article-title":"Practical recommendations for gradient-based training of deep architectures","author":"bengio","year":"2012","journal-title":"Neural Networks Tricks of the Trade"},{"key":"ref36","first-page":"265","article-title":"On optimization methods for deep learning","author":"ngiam","year":"2011","journal-title":"Proceedings of the 28th International Conference on Machine Learning (ICML-11)"},{"key":"ref35","first-page":"33","article-title":"On contrastive divergence learning","author":"carreira-perpinan","year":"2005","journal-title":"Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics"},{"key":"ref34","author":"wang","year":"2015","journal-title":"First place team Say no to overfitting"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.11.006"},{"key":"ref40","article-title":"Fuzziness based semi-supervised learning approach for intrusion detection system","author":"ashfaq","year":"2016","journal-title":"Information Sciences"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-010814-020120"},{"key":"ref12","author":"narayanan","year":"2016","journal-title":"subgraph2vec Learning distributed representations of rooted sub-graphs from large graphs"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"ref14","author":"xu","year":"0","journal-title":"Hadm Hybrid analysis for detection of malware"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1441"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"ref17","author":"wang","year":"2016","journal-title":"A multi-task learning model for malware classification with useful file access pattern from api call sequence"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref19","first-page":"399","article-title":"Mtnet: a multi-task neural network for dynamic malware classification","author":"huang","year":"2016","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment 13th International Conference DIMVA 2016"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"ref27","author":"hinton","year":"1997","journal-title":"Minimizing description length in an unsupervised neural network"},{"key":"ref3","article-title":"Intrusion detection techniques in cloud environment: A survey","author":"mishra","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","article-title":"Anomalous payload-based network intrusion detection","author":"wang","year":"2004","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"key":"ref8","author":"kessy","year":"2015","journal-title":"Optimal whitening and decorrelation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref9","author":"krizhevsky","year":"2009","journal-title":"Learning multiple layers of features from tiny images"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011079199"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46307-0_28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48057-2_9"},{"key":"ref42","first-page":"1","article-title":"Class dependent feature transformation for intrusion detection systems","author":"mohammadi","year":"2011","journal-title":"2011 19th Iranian Conference on Electrical Engineering ICEE"},{"key":"ref24","author":"an","year":"2015","journal-title":"Variational autoencoder based anomaly detection using reconstruction probability"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083684"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s16101701"},{"key":"ref25","first-page":"717","article-title":"A hybrid autoencoder and density estimation model for anomaly detection","author":"nicolau","year":"2016","journal-title":"Conference on Parallel Problem Solving from Nature"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","location":"Anchorage, AK, USA","start":{"date-parts":[[2017,5,14]]},"end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966342.pdf?arnumber=7966342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T06:21:36Z","timestamp":1569738096000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966342","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}