{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:33:17Z","timestamp":1774539197389,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972412"],"award-info":[{"award-number":["61972412"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB0204301"],"award-info":[{"award-number":["2018YFB0204301"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3193099","type":"journal-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T16:35:53Z","timestamp":1658507753000},"page":"4750-4763","source":"Crossref","is-referenced-by-count":27,"title":["Improving the Stability of Intrusion Detection With Causal Deep Learning"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5329-0713","authenticated-orcid":false,"given":"Zengri","family":"Zeng","sequence":"first","affiliation":[{"name":"College of Computers, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5456-9126","authenticated-orcid":false,"given":"Wei","family":"Peng","sequence":"additional","affiliation":[{"name":"College of Computers, National University of Defense Technology, Changsha, China"}]},{"given":"Detian","family":"Zeng","sequence":"additional","affiliation":[{"name":"College of Computers, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01843-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8986243"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103124"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2830661"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220082"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107383"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5876"},{"key":"ref9","article-title":"Stable predictions for health related anticausal prediction tasks affected by selection biases: The need to deconfound the test set features","author":"Neto","year":"2020","journal-title":"arXiv:2011.04128"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/sim.1903"},{"key":"ref11","article-title":"From the separable Tammes problem to extremal distributions of great circles in the unit sphere","author":"Bezdek","year":"2022","journal-title":"arXiv:2201.11234"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4433"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102375"},{"issue":"3","key":"ref14","first-page":"361","article-title":"A new approach to intrusion detection based on rough set theory","volume":"26","author":"Zhong-Min","year":"2003","journal-title":"Chin. J. Comput."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851790"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4018\/ijrqeh.289175"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2019.8698029"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010173"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107183"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3803"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920326"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-021-09581-z"},{"issue":"1","key":"ref24","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1111\/j.1467-985X.2009.00624_10.x","article-title":"Dataset shift in machine learning","volume":"173","author":"Niall","year":"2010","journal-title":"J. Roy. Stat. Soc. Ser. A, Stat. Soc."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1872"},{"key":"ref26","article-title":"Invariant risk minimization","author":"Arjovsky","year":"2019","journal-title":"arXiv.1907.02893"},{"issue":"1","key":"ref27","first-page":"3482","article-title":"Causal discovery from heterogeneous\/nonstationary data","volume":"21","author":"Huang","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSW.2018.8439889"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-3758(00)00115-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/70.1.41"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10480"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441722"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00533"},{"key":"ref34","article-title":"Regularizing CNNs with locally constrained decorrelations","author":"Rodr\u00edguez","year":"2016","journal-title":"arXiv:1611.01967"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_5"},{"key":"ref36","first-page":"5171","article-title":"On variational bounds of mutual information","volume-title":"Proc. ICML","author":"Poole"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3104169"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-016-9485-8"},{"key":"ref39","article-title":"On the origin of number and arrangement of the places of exit on the surface of pollen-grains","volume-title":"Recueil de Travaux Botaniques N\u00e9erlandais","volume":"27","author":"Tammes","year":"1930"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5486\/PMD.1975.22.1-2.14"},{"issue":"4","key":"ref41","first-page":"393","article-title":"The Fekete problem and construction of the spherical coverage by cones","volume":"28","author":"Petkovi\u0107","year":"2013","journal-title":"Facta Universitatis Ser. Math. Inform."},{"key":"ref42","volume-title":"Tables of Spherical Codes","author":"Sloane","year":"2000"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-011-9392-2"},{"key":"ref44","first-page":"19099","article-title":"MMA regularization: Decorrelating weights of neural networks by maximizing the minimal angles","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Wang","year":"2020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12268"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/BF03025291"},{"key":"ref47","first-page":"2217","article-title":"Understanding and improving convolutional neural networks via concatenated rectified linear units","volume-title":"Proc. ICML","author":"Shang"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105980"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.5220\/0010908200003120"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101681"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s19112528"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.138"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014929"},{"key":"ref56","article-title":"A hybrid intrusion detection with decision tree for feature selection","author":"Umar","year":"2020","journal-title":"arXiv:2009.13067"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.147"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102983"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09837308.pdf?arnumber=9837308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T09:24:28Z","timestamp":1706779468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9837308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":59,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3193099","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}