{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:38:48Z","timestamp":1769747928852,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Vietnam International Education Development"},{"DOI":"10.13039\/501100001631","name":"University College Dublin","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001631","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/tcyb.2018.2838668","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T19:29:09Z","timestamp":1529090949000},"page":"3074-3087","source":"Crossref","is-referenced-by-count":116,"title":["Learning Neural Representations for Network Anomaly Detection"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3637-9230","authenticated-orcid":false,"given":"Van Loi","family":"Cao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1981-1300","authenticated-orcid":false,"given":"Miguel","family":"Nicolau","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1402-6995","authenticated-orcid":false,"given":"James","family":"McDermott","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"ref38","author":"lichman","year":"2013","journal-title":"UCI Machine Learning Repository"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref32","first-page":"432","article-title":"R1SVM: A randomised nonlinear approach to large-scale anomaly detection","author":"erfani","year":"2015","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"ref30","first-page":"395","article-title":"A linear programming approach to novelty detection","volume":"14","author":"bennett","year":"2001","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref37","author":"duchi","year":"2007","journal-title":"Derivations for linear algebra and optimization"},{"key":"ref36","first-page":"833","article-title":"Contractive auto-encoders: Explicit invariance during feature extraction","author":"rifai","year":"2011","journal-title":"Proc ICML"},{"key":"ref35","first-page":"1137","article-title":"Efficient learning of sparse representations with an energy-based model","author":"ranzato","year":"2007","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref34","first-page":"1185","article-title":"Sparse feature learning for deep belief networks","author":"ranzato","year":"2008","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref28","article-title":"Auto-encoding variational Bayes","author":"kingma","year":"2013","journal-title":"arXiv preprint arXiv 1312 6114"},{"key":"ref27","first-page":"3371","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","volume":"11","author":"vincent","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref2","article-title":"Unsupervised machine learning for networking: Techniques, applications and research challenges","author":"usama","year":"2017","journal-title":"arXiv preprint arXiv 1709 04396"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref22","first-page":"153","article-title":"Greedy layer-wise training of deep networks","author":"bengio","year":"2007","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1201\/b14876"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0052"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref50","first-page":"303","article-title":"Optimal stopping and effective machine complexity in learning","author":"wang","year":"1994","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190725"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11161"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-30668-1_1","article-title":"One-class classification for anomaly detection with kernel density estimation and genetic programming","volume":"9594","author":"cao","year":"2016","journal-title":"Proc Eur Conf Genet Program"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/978-3-319-45823-6_67","article-title":"A hybrid autoencoder and density estimation model for anomaly detection","author":"cao","year":"2016","journal-title":"Parallel Problem Solving from Nature"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref15","first-page":"3","article-title":"Autoencoders, minimum description length and Helmholtz free energy","author":"hinton","year":"1994","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00332918"},{"key":"ref17","first-page":"518","article-title":"A novelty detection approach to classification","author":"japkowicz","year":"1995","journal-title":"Proc IJCAI"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/3-540-46145-0_17","article-title":"Outlier detection using replicator neural networks","author":"hawkins","year":"2002","journal-title":"Data Warehousing and Knowledge Discovery"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref4","author":"phoha","year":"2007","journal-title":"Internet Security Dictionary"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-011-0255-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref49","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"glorot","year":"2010","journal-title":"Proc Int Conf Artif Intell Stat"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/S026988891300043X"},{"key":"ref46","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref48","first-page":"553","article-title":"Early stopping&#x2014;But when?","author":"prechelt","year":"1998","journal-title":"Neural Networks Tricks of the Trade"},{"key":"ref47","article-title":"ADADELTA: An adaptive learning rate method","author":"zeiler","year":"2012","journal-title":"arXiv preprint arXiv 1212 5701"},{"key":"ref42","year":"1999","journal-title":"Kdd cup data"},{"key":"ref41","first-page":"1","article-title":"Data analytics on network traffic flows for botnet behaviour detection","author":"le","year":"2006","journal-title":"Proc IEEE SSC"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/8708695\/08386786.pdf?arnumber=8386786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:54:01Z","timestamp":1657745641000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8386786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":50,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2018.2838668","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8]]}}}