{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:06:25Z","timestamp":1772301985788,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9206805","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-9","source":"Crossref","is-referenced-by-count":17,"title":["P-DNN: An Effective Intrusion Detection Method based on Pruning Deep Neural Network"],"prefix":"10.1109","author":[{"given":"Mingjian","family":"Lei","sequence":"first","affiliation":[]},{"given":"Xiaoyong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Binsi","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Yunfeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Limengwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenping","family":"Kong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014"},{"key":"ref38","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref33","article-title":"Improving neural networks by preventing co-adaptation of feature detectors","author":"hinton","year":"2012"},{"key":"ref32","first-page":"1","article-title":"Learning representations by back-propagating errors","volume":"5","author":"rumelhart","year":"1988","journal-title":"Cognitive Modeling"},{"key":"ref31","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref30","article-title":"Lecture 6.5-rmsprop, coursera: Neural networks for machine learning","author":"tieleman","year":"2012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3005348"},{"key":"ref35","article-title":"Pruning filters for efficient convnets","author":"li","year":"2016"},{"key":"ref34","first-page":"1135","article-title":"Learning both weights and connections for efficient neural network","author":"han","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.29"},{"key":"ref40","first-page":"2148","article-title":"Predicting parameters in deep learning","author":"denil","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref11","first-page":"209","article-title":"Application of machine learning algorithms to kdd intrusion detection dataset within misuse detection context","author":"sabhnani","year":"2003","journal-title":"MLMTA"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967989"},{"key":"ref13","first-page":"4","article-title":"Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework","author":"tsang","year":"2005","journal-title":"Data Mining Fifth IEEE International Conference on"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-011-9143-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2014.6993345"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref18","article-title":"DARPA 1998 dataset","year":"0"},{"key":"ref19","article-title":"Kdd Cup 99 dataset","year":"0"},{"key":"ref28","first-page":"315","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"2011","journal-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref4","article-title":"Towards detecting intrusions in a networked environment","author":"heberlein","year":"1991","journal-title":"Ph D Dissertation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639346"},{"key":"ref3","article-title":"A Summary of China&#x2019;s Internet Network Security Situation in 2018","year":"0"},{"key":"ref6","article-title":"Suricata","year":"0"},{"key":"ref29","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","article-title":"Snort","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846201"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846200"},{"key":"ref2","article-title":"China Internet of Things Application Research Report 2018","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846202"},{"key":"ref1","article-title":"Internet Trends 2019","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2010-0466"},{"key":"ref22","article-title":"A taxonomy and survey of intrusion detection system design techniques, network threats and datasets","author":"hindy","year":"2018"},{"key":"ref21","first-page":"1","article-title":"The use of artificial neural networks in network intrusion detection: A systematic review","author":"\u00f6ney","year":"2018","journal-title":"2018 International Conference on Artificial Intelligence and Data Processing (IDAP)"},{"key":"ref42","article-title":"Network in network","author":"lin","year":"2013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref41","article-title":"Weightless: Lossy weight encoding for deep neural network compression","author":"reagen","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref26","article-title":"Deep learning pruning","year":"0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2004-8406"},{"key":"ref25","first-page":"1263","article-title":"Learning from imbalanced data","author":"he","year":"2008","journal-title":"IEEE Transactions on Knowledge & Data Engineering"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,7,19]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09206805.pdf?arnumber=9206805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:09Z","timestamp":1656453369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9206805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9206805","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}