{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:49:35Z","timestamp":1774540175741,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Defense Industrial Technology Development Program","award":["JCKY2016212C005"],"award-info":[{"award-number":["JCKY2016212C005"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572153"],"award-info":[{"award-number":["61572153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572155"],"award-info":[{"award-number":["61572155"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002851","name":"China Academy of Engineering Physics","doi-asserted-by":"publisher","award":["TCGF1203"],"award-info":[{"award-number":["TCGF1203"]}],"id":[{"id":"10.13039\/501100002851","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002851","name":"China Academy of Engineering Physics","doi-asserted-by":"publisher","award":["2015A0403002"],"award-info":[{"award-number":["2015A0403002"]}],"id":[{"id":"10.13039\/501100002851","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Sustain. Comput."],"published-print":{"date-parts":[[2020,4,1]]},"DOI":"10.1109\/tsusc.2018.2793284","type":"journal-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T19:08:07Z","timestamp":1516043287000},"page":"204-212","source":"Crossref","is-referenced-by-count":179,"title":["Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8342-1211","authenticated-orcid":false,"given":"Feng","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0070-2315","authenticated-orcid":false,"given":"Yunsheng","family":"Fu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-4698","authenticated-orcid":false,"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Yongsheng","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1936-6785","authenticated-orcid":false,"given":"Seungmin","family":"Rho","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Fanzhi","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Distributed attack detection scheme using deep learning approach for Internet of Things [J]","author":"diro","year":"2017","journal-title":"Future Generation Comput Syst"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.031"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-3662-9_21"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48057-2_9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s16101701"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"ref35","article-title":"A deep learning-based framework for conducting stealthy attacks in industrial control systems [J]","author":"feng","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1524473113"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.466"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30507-8_13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v56i1.248"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2017.7883684"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2017.63"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4642-1_5"},{"key":"ref50","first-page":"184","article-title":"Feature selection for intrusion detection using NSL-KDD [J]","author":"chae","year":"2013","journal-title":"Recent Advances in Engineering and Computer Science"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2009.03.005"},{"key":"ref11","first-page":"242","article-title":"Network intrusion detection system using neural network","author":"shum","year":"2008","journal-title":"Proc IEEE 4th Int Conf Natural Comput"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2244211"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44999-7_23"},{"key":"ref13","first-page":"2676","article-title":"Recurrent network in network intrusion detection system","volume":"5","author":"xue","year":"0","journal-title":"Proc Int Conf Mach Learn Cybern"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370428"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.108"},{"key":"ref16","first-page":"5","article-title":"Discriminative multinomial naive bayes for network intrusion detection","author":"panda","year":"0","journal-title":"Proc 6th Int Conf Inf Assurance Secur IAS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.827"},{"key":"ref18","first-page":"363","article-title":"Principle components analysis and support vector machine based intrusion detection system","author":"eid","year":"0","journal-title":"Proc 10th Int Conf Intell Syst Des Appl"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27189-2_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2539860"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2586194"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2721108"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2766093"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref9","first-page":"209","article-title":"Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context [C]","author":"sabhnani","year":"2003","journal-title":"MLMTA"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/5.58337"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(88)90007-X"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5174444"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.64"},{"key":"ref44","author":"robinson","year":"1987","journal-title":"The utility driven dynamic error propagation network"},{"key":"ref43","first-page":"349","article-title":"A focused backpropagation algorithm for temporal pattern recognition","author":"mozer","year":"1995","journal-title":"Backpropagation Theory Architectures and Applications"}],"container-title":["IEEE Transactions on Sustainable Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7274860\/9113128\/08259310.pdf?arnumber=8259310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T12:34:11Z","timestamp":1651062851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8259310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":50,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsusc.2018.2793284","relation":{},"ISSN":["2377-3782","2377-3790"],"issn-type":[{"value":"2377-3782","type":"electronic"},{"value":"2377-3790","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}