{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:20:48Z","timestamp":1762341648110,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T00:00:00Z","timestamp":1607126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,5]]},"DOI":"10.1145\/3453187.3453311","type":"proceedings-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T10:32:03Z","timestamp":1616581923000},"page":"44-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Network Intrusion Detection Model Based on PCA + ADASYN and XGBoost"],"prefix":"10.1145","author":[{"given":"Leilei","family":"Pan","sequence":"first","affiliation":[{"name":"Guilin University of Technology, Guilin, China"}]},{"given":"Xiaolan","family":"Xie","sequence":"additional","affiliation":[{"name":"Guilin University of Technology, Guilin, China"}]}],"member":"320","published-online":{"date-parts":[[2021,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"e_1_3_2_1_2_1","first-page":"2441","article-title":"Network Intrusion Detection Using Improved Genetic k-means Algorithm[C]\/\/2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"2018","unstructured":"Anand Sukumar J V, Pranav I, Neetish M, Network Intrusion Detection Using Improved Genetic k-means Algorithm[C]\/\/2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) . IEEE , 2018 : 2441 -- 2446 . Anand Sukumar J V, Pranav I, Neetish M, et al. Network Intrusion Detection Using Improved Genetic k-means Algorithm[C]\/\/2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2018:2441--2446.","journal-title":"IEEE"},{"key":"e_1_3_2_1_3_1","volume-title":"Machine Learning Method and Application in Network Intrusion Detection[D]","author":"HU R S","year":"2019","unstructured":"HU R S . Machine Learning Method and Application in Network Intrusion Detection[D] . Beijing : Beijing University of Post and Telecommunication , 2019 . HU R S. Machine Learning Method and Application in Network Intrusion Detection[D]. Beijing: Beijing University of Post and Telecommunication, 2019."},{"issue":"07","key":"e_1_3_2_1_4_1","first-page":"83","article-title":"Application of Deep Learning in New Intrusion Detection System.[J]","volume":"35","author":"WANG M","year":"2018","unstructured":"WANG M , WANG Y G , HAN J G . Application of Deep Learning in New Intrusion Detection System.[J] . Microelectronics & Computer , 2018 , 35 ( 07 ): 83 -- 86 WANG M, WANG Y G, HAN J G. Application of Deep Learning in New Intrusion Detection System.[J]. Microelectronics & Computer, 2018, 35(07):83--86","journal-title":"Microelectronics & Computer"},{"key":"e_1_3_2_1_5_1","volume-title":"Research on Intrusion Detection Technology Based on Machine Learning[D]. Xi an: Xidian University","author":"WANG J.","year":"2018","unstructured":"WANG J. Research on Intrusion Detection Technology Based on Machine Learning[D]. Xi an: Xidian University , 2018 . WANG J. Research on Intrusion Detection Technology Based on Machine Learning[D]. Xi an: Xidian University, 2018."},{"issue":"02","key":"e_1_3_2_1_6_1","first-page":"82","article-title":"Network Intrusion Detection Method Based on Random Forest[J]","volume":"56","author":"GOU J J","year":"2020","unstructured":"GOU J J , LI J H , CHEN C , Network Intrusion Detection Method Based on Random Forest[J] . Computer Engineering and Applications , 2020 , 56 ( 02 ): 82 -- 88 . GOU J J, LI J H, CHEN C, et al. Network Intrusion Detection Method Based on Random Forest[J]. Computer Engineering and Applications, 2020, 56(02):82--88.","journal-title":"Computer Engineering and Applications"},{"issue":"04","key":"e_1_3_2_1_7_1","first-page":"142","article-title":"Intrusion Detection Method Based on Cloud Model and Decision Tree[J]","volume":"45","author":"GUO H","year":"2019","unstructured":"GUO H , LIU Z B , LIU X . Intrusion Detection Method Based on Cloud Model and Decision Tree[J] . Computer Engineering , 2019 , 45 ( 04 ): 142 -- 147 . GUO H, LIU Z B, LIU X. Intrusion Detection Method Based on Cloud Model and Decision Tree[J]. Computer Engineering, 2019, 45(04): 142--147.","journal-title":"Computer Engineering"},{"issue":"04","key":"e_1_3_2_1_8_1","first-page":"115","article-title":"SVM-KNN Network Intrusion Detection Method Based on Incremental Learning[J]","volume":"46","author":"FU Z X","year":"2020","unstructured":"FU Z X , XU Y , WU Z D , SVM-KNN Network Intrusion Detection Method Based on Incremental Learning[J] . Computer Engineering , 2020 , 46 ( 04 ): 115 -- 122 . FU Z X, XU Y, WU Z D, et al. SVM-KNN Network Intrusion Detection Method Based on Incremental Learning[J]. Computer Engineering, 2020, 46(04):115--122.","journal-title":"Computer Engineering"},{"issue":"12","key":"e_1_3_2_1_9_1","first-page":"3749","article-title":"Network intrusion detection system based on connection data analysis and OSELM classifier[J]","volume":"34","author":"YA S","year":"2017","unstructured":"YA S , AI Z Z , MU N L , Network intrusion detection system based on connection data analysis and OSELM classifier[J] . Application Research of Computers , 2017 , 34 ( 12 ): 3749 -- 3752 . YA S, AI Z Z, MU N L, et al. Network intrusion detection system based on connection data analysis and OSELM classifier[J]. Application Research of Computers, 2017, 34(12):3749--3752.","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_10_1","volume-title":"Intrusion detection model based on ensemble learning for U2R and R2L attacks[C]\/\/ 2015 7th international conference on information technology and electrical engineering (ICITEE)","author":"S.","year":"2015","unstructured":"Sornsuwit P, Jaiyen S. Intrusion detection model based on ensemble learning for U2R and R2L attacks[C]\/\/ 2015 7th international conference on information technology and electrical engineering (ICITEE) . IEEE , 2015 : 354--359. Sornsuwit P, Jaiyen S. Intrusion detection model based on ensemble learning for U2R and R2L attacks[C]\/\/ 2015 7th international conference on information technology and electrical engineering (ICITEE). IEEE, 2015: 354--359."},{"issue":"12","key":"e_1_3_2_1_11_1","first-page":"3745","article-title":"Study of network intrusion detection method based on SMOTE and GBDT[J]","volume":"2017","author":"FENG H M","unstructured":"FENG H M , LI M W , HOU X L , Study of network intrusion detection method based on SMOTE and GBDT[J] . Application Research of Computers , 2017 ( 12 ): 3745 -- 3748 . FENG H M, LI M W, HOU X L, et al. Study of network intrusion detection method based on SMOTE and GBDT[J]. Application Research of Computers, 2017(12):3745--3748.","journal-title":"Application Research of Computers"}],"event":{"name":"EBIMCS 2020: 2020 3rd International Conference on E-Business, Information Management and Computer Science","sponsor":["Guilin Guilin University of Technology, Guilin, China","International Engineering and Technology Institute, Hong Kong International Engineering and Technology Institute, Hong Kong"],"location":"Wuhan China","acronym":"EBIMCS 2020"},"container-title":["Proceedings of the 2020 3rd International Conference on E-Business, Information Management and Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453187.3453311","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453187.3453311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:39Z","timestamp":1750195719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453187.3453311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,5]]},"references-count":11,"alternative-id":["10.1145\/3453187.3453311","10.1145\/3453187"],"URL":"https:\/\/doi.org\/10.1145\/3453187.3453311","relation":{},"subject":[],"published":{"date-parts":[[2020,12,5]]},"assertion":[{"value":"2021-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}