{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:08:52Z","timestamp":1757542132346,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T00:00:00Z","timestamp":1602720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,15]]},"DOI":"10.1145\/3421766.3421891","type":"proceedings-article","created":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T02:57:42Z","timestamp":1603767462000},"page":"64-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Deep Learning for IoT Intrusion Detection based on LSTMs-AE"],"prefix":"10.1145","author":[{"given":"Yingfei","family":"Xu","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_1_2_1","first-page":"656","volume-title":"Conf. Distrib. Comput. Syst.","author":"Midi D.","year":"2017"},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"695","article-title":"Network Traffic Anomaly Detection Method Based on Deep Features Learning","volume":"42","author":"Dong S.","year":"2020","journal-title":"Dianzi Yu Xinxi Xuebao\/Journal Electron. Inf. Technol."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19214612"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"issue":"0123456789","key":"e_1_3_2_1_7_1","article-title":"A survey of neural networks usage for intrusion detection systems","author":"Drewek-Ossowicka A.","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"volume":"9","volume-title":"Sci.","author":"Liu H.","key":"e_1_3_2_1_8_1"},{"issue":"1","key":"e_1_3_2_1_9_1","article-title":"A new intrusion detection system based on KNN classification algorithm in wireless sensor network","volume":"2014","author":"Li W.","year":"2014","journal-title":"J. Electr. Comput. Eng."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Conf. Learn. Represent. ICLR 2018 - Conf. Track Proc.","author":"Zong B.","year":"2018"},{"key":"e_1_3_2_1_12_1","first-page":"566","article-title":"Principal components analysis","author":"Syms C.","year":"2018","journal-title":"Encycl. Ecol."},{"volume-title":"Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network,\" Sensors (Switzerland)","author":"Yang Y.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"3104","volume-title":"Sequence to sequence learning with neural networks,\" in Advances in Neural Information Processing Systems","author":"Sutskever I.","year":"2014"},{"volume-title":"Conf. Platf. Technol. Serv. PlatCon 2016 -- Proc.","author":"Kim J.","key":"e_1_3_2_1_15_1"},{"volume-title":"NY","year":"2016","author":"Malhotra P.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"volume-title":"Anomaly detection using autoencoders with nonlinear dimensionality reduction,\" in ACM International Conference Proceeding Series","year":"2014","author":"Sakurada M.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","first-page":"18","volume-title":"February","author":"Mirsky Y.","year":"2018"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"ICPHM 2019","author":"Yao R.","year":"2019"},{"key":"e_1_3_2_1_21_1","first-page":"739","volume-title":"Conf. Comput. Sci. Inf. Process. CSIP 2012","author":"Xie Y.","year":"2012"},{"key":"e_1_3_2_1_22_1","first-page":"921","volume-title":"ACM Symp. Appl. Comput.","author":"Kuang L.","year":"2008"}],"event":{"name":"AIAM2020: 2nd International Conference on Artificial Intelligence and Advanced Manufacture","acronym":"AIAM2020","location":"Manchester United Kingdom"},"container-title":["Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421766.3421891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3421766.3421891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:43Z","timestamp":1750195903000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421766.3421891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,15]]},"references-count":22,"alternative-id":["10.1145\/3421766.3421891","10.1145\/3421766"],"URL":"https:\/\/doi.org\/10.1145\/3421766.3421891","relation":{},"subject":[],"published":{"date-parts":[[2020,10,15]]},"assertion":[{"value":"2020-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}