{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T07:57:30Z","timestamp":1775203050169,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297230","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"81-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":114,"title":["Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks"],"prefix":"10.1145","author":[{"given":"Yalei","family":"Ding","sequence":"first","affiliation":[{"name":"Southeast University, China"}]},{"given":"Yuqing","family":"Zhai","sequence":"additional","affiliation":[{"name":"Southeast University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SANS Institute.(2018 Oct.) The History and Evolution of Intrusion Detection. {Online}.Available: https:\/\/www.sans.org\/reading-room\/whitepapers\/detection\/history-evolution-intrusion-detection-344.  SANS Institute.(2018 Oct.) The History and Evolution of Intrusion Detection. {Online}.Available: https:\/\/www.sans.org\/reading-room\/whitepapers\/detection\/history-evolution-intrusion-detection-344."},{"key":"e_1_3_2_1_2_1","volume-title":"Survey on Host and Network Based Intrusion Detection System{J}","author":"Sarkar T","year":"2014","unstructured":"Sarkar T , Das N. Survey on Host and Network Based Intrusion Detection System{J} . 2014 , 6(2):2266--2269. Sarkar T, Das N. Survey on Host and Network Based Intrusion Detection System{J}. 2014, 6(2):2266--2269."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.028"},{"issue":"5","key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2014\/240217","article-title":"A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network{J}","volume":"2014","author":"Li W","year":"2014","unstructured":"Li W , Yi P , Wu Y , A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network{J} . Journal of Electrical and Computer Engineering , 2014 , 2014 ( 5 ): 1 -- 8 . Li W, Yi P, Wu Y, et al. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network{J}. Journal of Electrical and Computer Engineering, 2014, 2014(5):1--8.","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"e_1_3_2_1_9_1","first-page":"92","article-title":"Performance analysis of NSL-KDD dataset using ANN{C}\/\/ International Conference on Signal Processing and Communication Engineering Systems","volume":"2015","author":"Ingre B","unstructured":"Ingre B , Yadav A . Performance analysis of NSL-KDD dataset using ANN{C}\/\/ International Conference on Signal Processing and Communication Engineering Systems . IEEE , 2015 : 92 -- 96 . Ingre B, Yadav A. Performance analysis of NSL-KDD dataset using ANN{C}\/\/ International Conference on Signal Processing and Communication Engineering Systems. IEEE, 2015:92--96.","journal-title":"IEEE"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171592.3171598"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection{C}\/\/ International Conference on Platform Technology and Service","volume":"2016","author":"Kim J","unstructured":"Kim J , Kim J , Thu H L T , Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection{C}\/\/ International Conference on Platform Technology and Service . IEEE , 2016 : 1 -- 5 . Kim J, Kim J, Thu H L T, et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection{C}\/\/ International Conference on Platform Technology and Service. IEEE, 2016:1--5.","journal-title":"IEEE"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features{C}\/\/ Information and Knowledge Technology","volume":"2015","author":"Abolhasanzadeh B","unstructured":"Abolhasanzadeh B . Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features{C}\/\/ Information and Knowledge Technology . IEEE , 2015 : 1 -- 5 . Abolhasanzadeh B. Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features{C}\/\/ Information and Knowledge Technology. IEEE, 2015:1--5.","journal-title":"IEEE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"e_1_3_2_1_16_1","unstructured":"Gibiansky A.(2018 Oct.) Convolutional Neural Networks{Online}. Available: http:\/\/andrew.gibiansky.com\/blog\/machine-learning\/convolutional-neural-networks\/.  Gibiansky A.(2018 Oct.) Convolutional Neural Networks{Online}. Available: http:\/\/andrew.gibiansky.com\/blog\/machine-learning\/convolutional-neural-networks\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33863-2_51"},{"key":"e_1_3_2_1_18_1","unstructured":"(2018 Oct.) KDD Cup 1999. {Online}. Available: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/.  (2018 Oct.) KDD Cup 1999. {Online}. Available: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/."},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset{C}\/\/ Electrical","volume":"2017","author":"Paulauskas N","unstructured":"Paulauskas N , Auskalnis J . Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset{C}\/\/ Electrical , Electronic and Information Sciences. IEEE , 2017 : 1 -- 5 . Paulauskas N, Auskalnis J. Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset{C}\/\/ Electrical, Electronic and Information Sciences. IEEE, 2017:1--5.","journal-title":"Electronic and Information Sciences. IEEE"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","location":"Shenzhen China","acronym":"CSAI '18","sponsor":["Shenzhen University Shenzhen University"]},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297230","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":21,"alternative-id":["10.1145\/3297156.3297230","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297230","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}