{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:31:27Z","timestamp":1752672687834,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1109\/iwsda50346.2022.9870444","type":"proceedings-article","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T15:28:12Z","timestamp":1662478092000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Solving the data imbalance problem in network intrusion detection : A MP-CVAE based method"],"prefix":"10.1109","author":[{"given":"Hongyi","family":"Li","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University,Chengdu,China"}]},{"given":"Zicheng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mathematics, Southwest Jiaotong University,Chengdu,China"}]},{"given":"Hua","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Mathematics, Southwest Jiaotong University,Chengdu,China"}]},{"given":"Zhengchun","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University,Chengdu,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2017.8268911"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s19112528"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034621"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1306-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02566-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3428363.3428371"},{"key":"ref16","first-page":"3581","article-title":"Semisupervised learning with deep generative models","volume":"4","author":"kingma","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref17","article-title":"Adversarial autoencoders","author":"makhzani","year":"0","journal-title":"Computer ence"},{"key":"ref18","first-page":"2313","article-title":"The usual suspects? reassessing blame for VAE posterior collapse","volume":"119","author":"dai","year":"2020","journal-title":"Proceedings of the 37th International Conference on Machine Learning ICML 2020 13-18 July 2020 Virtual Event ser Proceedings of Machine Learning Research"},{"key":"ref19","first-page":"446","article-title":"A study on nsl-kdd dataset for intrusion detection system based on classification algorithms","volume":"4","author":"dhanabal","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref4","first-page":"746","article-title":"Intrusion detection system using fuzzy rough set feature selection and modified knn classifier","volume":"16","author":"senthilnayaki","year":"2019","journal-title":"Int Arab J Inf Technol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.041"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB53066.2021.9547087"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3242102.3242145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102499"},{"key":"ref7","article-title":"Feature encoding with autoencoders for weakly-supervised anomaly detection","volume":"abs 2105 10500","author":"zhou","year":"2021","journal-title":"CoRR"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.147"},{"key":"ref1","article-title":"Computer security threat monitoring and surveillance","author":"anderson","year":"1980","journal-title":"Technical Report James P Anderson Company"},{"journal-title":"Auto-encoding variational bayes","year":"0","author":"kingma","key":"ref9"}],"event":{"name":"2022 10th International Workshop on Signal Design and Its Applications in Communications (IWSDA)","start":{"date-parts":[[2022,8,1]]},"location":"Colchester, United Kingdom","end":{"date-parts":[[2022,8,5]]}},"container-title":["2022 10th International Workshop on Signal Design and Its Applications in Communications (IWSDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9870553\/9870443\/09870444.pdf?arnumber=9870444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T17:07:09Z","timestamp":1664212029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9870444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwsda50346.2022.9870444","relation":{},"subject":[],"published":{"date-parts":[[2022,8,1]]}}}