{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:11Z","timestamp":1750220651013,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11,20]]},"DOI":"10.1145\/3372454.3372464","type":"proceedings-article","created":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T12:17:26Z","timestamp":1579609046000},"page":"124-128","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly Detection Modeling Based on Self-Adaptive Threshold Voting Integrating DBN-LRs"],"prefix":"10.1145","author":[{"given":"Chao","family":"Lian","sequence":"first","affiliation":[{"name":"Department of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]},{"given":"Hua","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]},{"given":"Bing","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]},{"given":"Tong","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]},{"given":"Jiamao","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE) 2018 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE) F. Huch M. Golagha A. Petrovska A. Krauss Machine learning-based run-time anomaly detection in software systems: An industrial evaluation[C]"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"11","article-title":"Survey on deep belief network model and its applications[J]","volume":"54","author":"Fangyuan LIU","year":"2018","journal-title":"Computer Engineering and Applications"},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"34","article-title":"High-dimensional outlier detection based on deepbelief network and linear one-class SVM [J]","volume":"34","year":"2018","journal-title":"Telecommunications Science"},{"issue":"1","key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/JAS.2017.7510730","article-title":"SVM-DT-based adaptive and collaborative intrusion detection[J]","volume":"5","author":"Teng S.","year":"2018","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"07","key":"e_1_3_2_1_5_1","first-page":"1941","article-title":"Anomaly detection based on synthetic minority oversampling technique and deep belief network[J]","volume":"38","year":"2018","journal-title":"Journal of Computer Applications"},{"issue":"11","key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Intrusion Detection Algorithm Based on DBN-KELM [J]","volume":"44","author":"WU","year":"2018","journal-title":"Computer Engineering"},{"key":"e_1_3_2_1_7_1","unstructured":"2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) G. Zhao C. Zhang L. Zheng Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network[C]"},{"key":"e_1_3_2_1_8_1","unstructured":"Proceedings of the Workshop on Learning from Imbalanced Data Sets Proceedings of the Workshop on Learning from Imbalanced Data Sets I. Mani J. Zhang KNN approach to unbalanced data distributions: A case study involving information extraction[C]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2007853"},{"key":"e_1_3_2_1_10_1","first-page":"16","volume":"45","author":"Xuan UANG","year":"2018","journal-title":"Computer Science"},{"key":"e_1_3_2_1_11_1","unstructured":"Computer Vision Boston MA Computer Vision T. Principal Component Analysis (PCA)[M] 2014"},{"key":"e_1_3_2_1_12_1","unstructured":"Neural Networks for Signal Processing IX: Proceedings of the 1999 IEEE Signal Processing Society Workshop (Cat. No.98TH8468) Madison WI USA Neural Networks for Signal Processing IX: Proceedings of the 1999 IEEE Signal Processing Society Workshop (Cat. No.98TH8468) S. Mika G. Ratsch J. Weston B. Scholkopf K. R. Mullers Fisher discriminant analysis with kernels[C] 1999"},{"key":"e_1_3_2_1_13_1","unstructured":"2018 13th International Conference on Computer Science & Education (ICCSE) 2018 13th International Conference on Computer Science & Education (ICCSE) K. Kang F. Gao J. Feng A New Multi-Layer Classification Method Based on Logistic Regression[C]"},{"key":"#cr-split#-e_1_3_2_1_14_1.1","doi-asserted-by":"crossref","unstructured":"Hinton G E Osindero S Teh Y W. A fast learningalgorithm for deep belief nets [J]. Neural computation 2006 18(7): 1527--1554. DOI:10.1162\/neco.2006.18.7.1527 10.1162\/neco.2006.18.7.1527","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"#cr-split#-e_1_3_2_1_14_1.2","doi-asserted-by":"crossref","unstructured":"Hinton G E Osindero S Teh Y W. A fast learningalgorithm for deep belief nets [J]. Neural computation 2006 18(7): 1527--1554. DOI:10.1162\/neco.2006.18.7.1527","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_3_2_1_15_1","unstructured":"2017 2nd Asia-Pacific Conference on Intelligent Robot Systems (ACIRS) Wuhan 2017 2nd Asia-Pacific Conference on Intelligent Robot Systems (ACIRS) R. Li X. Wang Self-adaptive weighted majority vote algorithm based on entropy"}],"event":{"name":"ICBDR 2019: 2019 The 3rd International Conference on Big Data Research","sponsor":["Shandong Univ. Shandong University","The University of Versailles Saint-Quentin The University of Versailles Saint-Quentin, Versailles, France"],"location":"Cergy-Pontoise France","acronym":"ICBDR 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Big Data Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372454.3372464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:22Z","timestamp":1750197742000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/doi\/10.1145\/3372454.3372464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,20]]},"references-count":16,"alternative-id":["10.1145\/3372454.3372464","10.1145\/3372454"],"URL":"https:\/\/doi.org\/10.1145\/3372454.3372464","relation":{},"subject":[],"published":{"date-parts":[[2019,11,20]]}}}