{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:42:31Z","timestamp":1776444151355,"version":"3.51.2"},"reference-count":147,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T00:00:00Z","timestamp":1571184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,11,30]]},"abstract":"<jats:p>In this technology-based era, network-based systems are facing new cyber-attacks on daily bases. Traditional cybersecurity approaches are based on old threat-knowledge databases and need to be updated on a daily basis to stand against new generation of cyber-threats and protect underlying network-based systems. Along with updating threat-knowledge databases, there is a need for proper management and processing of data generated by sensitive real-time applications. In recent years, various computing platforms based on representation learning algorithms have emerged as a useful resource to manage and exploit the generated data to extract meaningful information. If these platforms are properly utilized, then strong cybersecurity systems can be developed to protect the underlying network-based systems and support sensitive real-time applications. In this survey, we highlight various cyber-threats, real-life examples, and initiatives taken by various international organizations. We discuss various computing platforms based on representation learning algorithms to process and analyze the generated data. We highlight various popular datasets introduced by well-known global organizations that can be used to train the representation learning algorithms to predict and detect threats. We also provide an in-depth analysis of research efforts based on representation learning algorithms made in recent years to protect the underlying network-based systems against current cyber-threats. Finally, we highlight various limitations and challenges in these efforts and available datasets that need to be considered when using them to build cybersecurity systems.<\/jats:p>","DOI":"10.1145\/3331174","type":"journal-article","created":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T18:55:35Z","timestamp":1571252135000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["A Survey on Representation Learning Efforts in Cybersecurity Domain"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2165-4575","authenticated-orcid":false,"given":"Muhammad","family":"Usman","sequence":"first","affiliation":[{"name":"Department of Computer Science and Software Engineering, Swinburne University of Technology, Melbourne, Victoria, Australia"}]},{"given":"Mian Ahmad","family":"Jan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Abdul Wali Khan University, Mardan, Khyber Pakhtunkhwa, Pakistan"}]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1677-9525","authenticated-orcid":false,"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Swinburne University of Technology, Melbourne, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,10,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2018. Network Forensics and Network Security Monitoring (Netresec). Retrieved from http:\/\/www.netresec.com\/?page&equals;AboutNetresec.  2018. Network Forensics and Network Security Monitoring (Netresec). Retrieved from http:\/\/www.netresec.com\/?page&equals;AboutNetresec."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"e_1_2_1_3_1","unstructured":"United States Military Academy. 2018. Cyber Research Center. Retrieved from https:\/\/www.usma.edu\/crc\/SitePages\/Home.aspx.  United States Military Academy. 2018. Cyber Research Center. Retrieved from https:\/\/www.usma.edu\/crc\/SitePages\/Home.aspx."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.12.024"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521727"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762828"},{"key":"e_1_2_1_7_1","first-page":"190","article-title":"BLITHE: Behavior rule-based insider threat detection for smart grid","volume":"3","author":"Bao Haiyong","year":"2016","journal-title":"IEEE Iof T J."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.08.026"},{"key":"e_1_2_1_9_1","volume-title":"Wee Hyong Tok, and Luis Cabrera-Cordon","author":"Barga Roger","year":"2015"},{"key":"e_1_2_1_10_1","volume-title":"QoS-Enabled Networks: Tools and Foundations","author":"Barreiros Miguel"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.008"},{"key":"e_1_2_1_12_1","first-page":"22","article-title":"An assessment of the DARPA IDS evaluation dataset using Snort","volume":"1","author":"Terry Brugger S.","year":"2007","journal-title":"UCDAVIS Department of Computer Science"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.08.002"},{"key":"e_1_2_1_15_1","volume-title":"An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search. Concurrency and Computation: Practice and Experience","author":"Cai Xingjuan","year":"2019"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2927733"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-011-0073-z"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.06.032"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.034"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.12.014"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.10.011"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9729-5"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2002.1039705"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the SANE","volume":"2004","author":"Luca"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the USENIX Security Symposium","volume":"8","author":"Durumeric Zakir"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2341597"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015495"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the USENIX Security Symposium. 241--256","author":"Fogla Prahlad","year":"2006"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2766446"},{"key":"e_1_2_1_39_1","first-page":"169","article-title":"Ethereal vs. Tcpdump: A comparative study on packet sniffing tools for educational purpose","volume":"20","author":"Fuentes Felix","year":"2005","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.940293"},{"key":"e_1_2_1_41_1","unstructured":"Gigaom. 2013. This Is Interesting: A Fraud-Detection Company Built on Google\u2019s Prediction API. Retrieved from https:\/\/gigaom.com\/2013\/07\/31\/this-is-interesting-a-fraud-detection-company-built-on-googles-prediction-api\/.  Gigaom. 2013. This Is Interesting: A Fraud-Detection Company Built on Google\u2019s Prediction API. Retrieved from https:\/\/gigaom.com\/2013\/07\/31\/this-is-interesting-a-fraud-detection-company-built-on-googles-prediction-api\/."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_2_1_45_1","first-page":"14","article-title":"Biggest data breaches of 2015","volume":"10","author":"Greene Tim","year":"2015","journal-title":"Network"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-017-0605-4"},{"key":"e_1_2_1_47_1","first-page":"14","article-title":"A systematic review to merge discourses: Interoperability, integration and cyber-physical systems","volume":"9","author":"G\u00fcrd\u00fcr Didem","year":"2017","journal-title":"J. Industr. Inf. Integr."},{"key":"e_1_2_1_48_1","volume-title":"Laura Porter, and A. Nur Zincir-Heywood.","author":"Haddadi Fariba","year":"2015"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2226919"},{"key":"e_1_2_1_50_1","volume-title":"Kremer","author":"Hamed Tarfa","year":"2018"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.04.012"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0019"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835375"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2616285"},{"key":"e_1_2_1_56_1","volume-title":"Neural Networks: Tricks of the Trade","author":"Hinton Geoffrey E."},{"key":"e_1_2_1_57_1","volume-title":"Hinton and Terrence Joseph Sejnowski","author":"Geoffrey","year":"1999"},{"key":"e_1_2_1_58_1","first-page":"1","article-title":"Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm","volume":"8","author":"Holz Thorsten","year":"2008","journal-title":"Large-Scale Exploits and Emergent Threats (LEET)"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.06.006"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_2_1_61_1","first-page":"1802","article-title":"Cyber-physical systems security: A survey","volume":"4","author":"Humayed Abdulmalik","year":"2017","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_62_1","unstructured":"Rahat Iqbal Faiyaz Doctor Brian More Shahid Mahmud and Usman Yousuf. 2017. Big data analytics and computational intelligence for cyber--physical systems: Recent trends and state of the art applications. Fut. Gener. Comput. Syst. (2017).  Rahat Iqbal Faiyaz Doctor Brian More Shahid Mahmud and Usman Yousuf. 2017. Big data analytics and computational intelligence for cyber--physical systems: Recent trends and state of the art applications. Fut. Gener. Comput. Syst. (2017)."},{"key":"e_1_2_1_63_1","volume-title":"Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance","author":"Jacobs Stuart"},{"key":"e_1_2_1_64_1","first-page":"1576","article-title":"SAMS: A seamless and authorized multimedia streaming framework for WMSN-based IoMT","volume":"6","author":"Jan Mian Ahmad","year":"2018","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_65_1","volume-title":"International Encyclopedia of Statistical Science","author":"Jolliffe Ian"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.11.023"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"e_1_2_1_68_1","volume-title":"Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT\u201918)","author":"Kao Da-Yu","year":"2018"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.053"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.022714.00160"},{"key":"e_1_2_1_72_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012"},{"key":"e_1_2_1_73_1","first-page":"1","article-title":"A survey of deep learning-based network anomaly detection","volume":"22","author":"Kwon Donghwoon","year":"2017","journal-title":"Cluster Comput."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2008.04-07-510"},{"key":"e_1_2_1_75_1","volume-title":"Deep learning. Nature 521, 7553","author":"LeCun Yann","year":"2015"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11740-017-0729-4"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2717807"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800664"},{"key":"e_1_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Yinghua Li He Yu Bin Song and Jinjun Chen. 2019. Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurr. Comput.: Pract. Exper. (2019). DOI:https:\/\/doi.org\/10.1002\/cpe.5182  Yinghua Li He Yu Bin Song and Jinjun Chen. 2019. Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurr. Comput.: Pract. Exper. (2019). DOI:https:\/\/doi.org\/10.1002\/cpe.5182","DOI":"10.1002\/cpe.5182"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"e_1_2_1_81_1","unstructured":"WIRED Magazine. 2011. FORD Google team up to make smarter cars. Retrieved from https:\/\/www.wired.com\/2011\/05\/ford-google-prediction-api\/.  WIRED Magazine. 2011. FORD Google team up to make smarter cars. Retrieved from https:\/\/www.wired.com\/2011\/05\/ford-google-prediction-api\/."},{"key":"e_1_2_1_82_1","first-page":"346","article-title":"Proactive network security system to protect against hackers","volume":"7","author":"Miliefsky Gary","year":"2008","journal-title":"U.S. Patent"},{"key":"e_1_2_1_83_1","volume-title":"Foundations of Machine Learning","author":"Mohri Mehryar"},{"key":"e_1_2_1_84_1","volume-title":"Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks","author":"Moustafa Nour","year":"2017"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-014-0007-7"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745446"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.292"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2367322"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.04.006"},{"key":"e_1_2_1_90_1","volume-title":"Wireshark 8 Ethereal Network Protocol Analyzer Toolkit","author":"Orebaugh Angela"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.07.016"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2017.92"},{"key":"e_1_2_1_93_1","first-page":"725","article-title":"System and method for using sandboxes in a managed shell","volume":"7","author":"Pouliot Sebastien","year":"2010","journal-title":"U.S. Patent"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.119"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145153"},{"key":"e_1_2_1_96_1","volume-title":"Khan Muhammad, Jong Weon Lee, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Awan, and Irfan Mehmood.","author":"Rehman Zahoor-Ur","year":"2017"},{"key":"e_1_2_1_97_1","doi-asserted-by":"crossref","volume-title":"Linux Kernel Networking","author":"Rosen Rami","DOI":"10.1007\/978-1-4302-6197-1"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2655032"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.89"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2016.10.003"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801792"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2749976"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.101"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET\u201909)","author":"Sangster Benjamin"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"e_1_2_1_106_1","volume-title":"Proceedings of the IEEE 36th International Conference on Distributed Computing Systems (ICDCS\u201916)","author":"Scaife Nolen"},{"key":"e_1_2_1_107_1","volume-title":"Artificial Neural Networks","author":"Schalkoff Robert J."},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.04.013"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2006.886775"},{"key":"e_1_2_1_110_1","volume-title":"Singer and Allan Friedman","author":"Peter","year":"2014"},{"key":"e_1_2_1_111_1","volume-title":"Proceedings of the Cybersecurity Symposium (CYBERSEC\u201916)","author":"Smith Sidney C."},{"key":"e_1_2_1_112_1","volume-title":"Security and Privacy in Cyber-physical Systems: Foundations, Principles, and Applications","author":"Song Houbing"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.90"},{"key":"e_1_2_1_114_1","volume-title":"Honeypots: Tracking Hackers.","author":"Spitzner Lance","year":"2003"},{"key":"e_1_2_1_115_1","volume-title":"Proceedings of the International Symposium on Security in Computing and Communication. Springer, 291--303","author":"Srihari V."},{"key":"e_1_2_1_116_1","first-page":"1","article-title":"Survey on SDN based network intrusion detection system using machine learning approaches","volume":"12","author":"Sultana Nasrin","year":"2018","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.05.006"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.74"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145054"},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security","volume":"6973","author":"Thomas Ciza","year":"2008"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_4"},{"key":"e_1_2_1_122_1","volume-title":"Clarke","author":"Tjhai Gina C.","year":"2008"},{"key":"e_1_2_1_123_1","volume-title":"Proceedings of the USENIX Security Symposium. 601--618","author":"Tram\u00e8r Florian","year":"2016"},{"key":"e_1_2_1_124_1","volume-title":"Syed Mohsin Matloob Bokhari, and Mian Ahmad","author":"Usman Muhammad","year":"2017"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2537200"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.059"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.030"},{"key":"e_1_2_1_128_1","volume-title":"Xiangjian He, and Jinjun Chen.","author":"Usman Muhammad","year":"2018"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904349"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0114"},{"key":"e_1_2_1_131_1","volume-title":"Xiangjian He, and Priyadarsi Nanda.","author":"Usman Muhammad","year":"2018"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2739744"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2224144"},{"key":"e_1_2_1_134_1","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","author":"Vincent Pascal","year":"2010","journal-title":"J. Mach. Learn. Res. 11"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.05.009"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2703784"},{"key":"e_1_2_1_137_1","doi-asserted-by":"crossref","unstructured":"Penghong Wang Jianrou Huang Zhihua Cui Liping Xie and Jinjun Chen. 2019. A Gaussian error correction multi-objective positioning model with NSGA-II. Concurr. Comput.: Pract. Exper. (2019). DOI:https:\/\/doi.org\/10.1002\/cpe.5464  Penghong Wang Jianrou Huang Zhihua Cui Liping Xie and Jinjun Chen. 2019. A Gaussian error correction multi-objective positioning model with NSGA-II. Concurr. Comput.: Pract. Exper. (2019). DOI:https:\/\/doi.org\/10.1002\/cpe.5464","DOI":"10.1002\/cpe.5464"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2781198"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11768-016-5123-9"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2472993"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-017-1315-5"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2013.6743952"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2014.6980972"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.03.011"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-009-0338-x"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1058-9"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12293-017-0237-2"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2718036"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331174","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3331174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:07Z","timestamp":1750206367000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,16]]},"references-count":147,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11,30]]}},"alternative-id":["10.1145\/3331174"],"URL":"https:\/\/doi.org\/10.1145\/3331174","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,16]]},"assertion":[{"value":"2018-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}