{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:33:02Z","timestamp":1772821982860,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,18]]},"DOI":"10.1145\/3483207.3483232","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T16:26:20Z","timestamp":1635438380000},"page":"152-159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["ADASYN\u2212Random Forest Based Intrusion Detection Model"],"prefix":"10.1145","author":[{"given":"Zhewei","family":"Chen","sequence":"first","affiliation":[{"name":"Zhejiang Normal University, China"}]},{"given":"Linyue","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang Normal University, China"}]},{"given":"Wenwen","family":"Yu","sequence":"additional","affiliation":[{"name":"NingboTech University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,28]]},"reference":[{"issue":"04","key":"e_1_3_2_1_1_1","first-page":"96","article-title":". Overview of Network Intrusion Detection Technology","volume":"5","author":"Jian S","year":"2020","unstructured":"Jian S , Lu Z , Du D , 2020 . Overview of Network Intrusion Detection Technology . Journal of Cyber Security , 5 ( 04 ): 96 - 122 . Jian S, Lu Z, Du D, 2020. Overview of Network Intrusion Detection Technology. Journal of Cyber Security, 5(04): 96-122.","journal-title":"Journal of Cyber Security"},{"key":"e_1_3_2_1_2_1","volume-title":"Anomaly-Intrusion Detection Methods Research for Host-Based Intrusion Detection System. PhD Theis","author":"Gao C.","year":"2009","unstructured":"Gao C. 2009. Anomaly-Intrusion Detection Methods Research for Host-Based Intrusion Detection System. PhD Theis . Huazhong University of Science and Technology , 2009 . Gao C. 2009. Anomaly-Intrusion Detection Methods Research for Host-Based Intrusion Detection System. PhD Theis. Huazhong University of Science and Technology,2009."},{"issue":"11","key":"e_1_3_2_1_3_1","first-page":"10","article-title":". Research on Network Attack Situation Forecast Technique Based on Support Vector Machine","volume":"2007","author":"Zhang X","year":"2007","unstructured":"Zhang X , Hu C , Liu S , 2007 . Research on Network Attack Situation Forecast Technique Based on Support Vector Machine . J. Computer Engineering and Applications , 2007 ( 11 ): 10 - 12 . Zhang X, Hu C, Liu S, 2007. Research on Network Attack Situation Forecast Technique Based on Support Vector Machine. J. Computer Engineering and Applications, 2007(11):10-12.","journal-title":"J. Computer Engineering and Applications"},{"key":"e_1_3_2_1_4_1","volume-title":"The Detection and Filtration of Anomaly Network Flow Based on Decision Trees. Master Theis","author":"Ding W.","year":"2013","unstructured":"Ding W. 2013. The Detection and Filtration of Anomaly Network Flow Based on Decision Trees. Master Theis . University of Electronic Science and Technology of China , 2013 . Ding W. 2013. The Detection and Filtration of Anomaly Network Flow Based on Decision Trees. Master Theis. University of Electronic Science and Technology of China,2013."},{"issue":"04","key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Survey on Imbalanced Data Ming Methods","volume":"55","author":"Xiang H","year":"2019","unstructured":"Xiang H , Yang Y. 2019 . Survey on Imbalanced Data Ming Methods . J. Computer Engineering and Applications , 55 ( 04 ): 1 - 16 . Xiang H, Yang Y. 2019. Survey on Imbalanced Data Ming Methods. J. Computer Engineering and Applications, 55(04): 1-16.","journal-title":"J. Computer Engineering and Applications"},{"issue":"02","key":"e_1_3_2_1_6_1","first-page":"437","article-title":". Research and Application of Machine Learning in Industrial Network Intrusion Detection","volume":"42","author":"He K","year":"2021","unstructured":"He K , Qu C , Zong X , 2021 . Research and Application of Machine Learning in Industrial Network Intrusion Detection . Journal of Chinese Computer Systems , 42 ( 02 ): 437 - 442 . He K, Qu C, Zong X, 2021. Research and Application of Machine Learning in Industrial Network Intrusion Detection. Journal of Chinese Computer Systems, 42(02): 437-442.","journal-title":"Journal of Chinese Computer Systems"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"82","article-title":"Network intrusion detection method based on random forest","volume":"56","author":"Gou J","year":"2020","unstructured":"Gou J , Li J , Chen C , 2020 . Network intrusion detection method based on random forest . J. Computer Engineering and Applications , 56 ( 2 ): 82 - 88 . Gou J, Li J, Chen C, 2020. Network intrusion detection method based on random forest. J. Computer Engineering and Applications, 56(2): 82-88.","journal-title":"J. Computer Engineering and Applications"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546162"},{"issue":"03","key":"e_1_3_2_1_9_1","first-page":"769","article-title":"Intrusion detection based on improved sparse denoising autoencoder","volume":"39","author":"Guo X","year":"2019","unstructured":"Guo X , Li X , Jing R , 2019 . Intrusion detection based on improved sparse denoising autoencoder . Journal of Computer Applications , 39 ( 03 ): 769 - 773 . Guo X, Li X, Jing R, 2019. Intrusion detection based on improved sparse denoising autoencoder. Journal of Computer Applications, 39(03):769-773.","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_10_1","unstructured":"Jing H Zhang K Cai B 2019. Detection of Application Layer DDoS Based on BP Neural Network. J. Computer Engineering and Applications.  Jing H Zhang K Cai B 2019. Detection of Application Layer DDoS Based on BP Neural Network. J. Computer Engineering and Applications."},{"key":"e_1_3_2_1_11_1","unstructured":"Alkasassbeh M Almseidin M. 2018. Machine learning methods for network intrusion detection. Online source. Retrieved from: https:\/\/www.researchgate.net\/publication\/327550168_Machine_Learning_Methods_for_Network_Intrusion_Detection  Alkasassbeh M Almseidin M. 2018. Machine learning methods for network intrusion detection. Online source. Retrieved from: https:\/\/www.researchgate.net\/publication\/327550168_Machine_Learning_Methods_for_Network_Intrusion_Detection"},{"issue":"20","key":"e_1_3_2_1_12_1","first-page":"84","article-title":"DDoS attack detection based on C4.5 in SDN","volume":"55","author":"Liu J","year":"2019","unstructured":"Liu J , Wang J , Wang M , 2019 . DDoS attack detection based on C4.5 in SDN . J. Computer Engineering and Applications , 55 ( 20 ): 84 - 88 . Liu J, Wang J, Wang M, 2019. DDoS attack detection based on C4.5 in SDN. J. Computer Engineering and Applications, 55(20): 84-88.","journal-title":"J. Computer Engineering and Applications"},{"key":"e_1_3_2_1_13_1","volume-title":"Research on Network Traffic Intrusion Detection Based on Deep Learning. Master Theis. Shenzhen Institutes of Advanced Technology","author":"Ji S.","unstructured":"Ji S. 2020. Research on Network Traffic Intrusion Detection Based on Deep Learning. Master Theis. Shenzhen Institutes of Advanced Technology , Chinese Academy of Sciences . Ji S. 2020. Research on Network Traffic Intrusion Detection Based on Deep Learning. Master Theis. Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences."},{"key":"e_1_3_2_1_14_1","first-page":"2011","article-title":"Naive Bayesian Classifier Based on Genetic Simulated Annealing Algorithm","volume":"23","author":"Liu J","year":"2011","unstructured":"Liu J , Song B. 2011 . Naive Bayesian Classifier Based on Genetic Simulated Annealing Algorithm . J. Procedia Engineering , Volume 23 , 2011 . PP 504-509. Liu J, Song B. 2011. Naive Bayesian Classifier Based on Genetic Simulated Annealing Algorithm. J. Procedia Engineering, Volume 23, 2011. PP 504-509.","journal-title":"J. Procedia Engineering"},{"key":"e_1_3_2_1_15_1","volume-title":"Research on Optimization and Improvement of Random Forests Algorithm. Master Theis","author":"Ma L.","year":"2016","unstructured":"Ma L. 2016. Research on Optimization and Improvement of Random Forests Algorithm. Master Theis . Jinan University , 2016 . Ma L. 2016. Research on Optimization and Improvement of Random Forests Algorithm. Master Theis. Jinan University,2016."},{"issue":"04","key":"e_1_3_2_1_16_1","first-page":"673","article-title":"Review of imbalanced data classification methods","volume":"34","author":"Li Y","year":"2019","unstructured":"Li Y , Chai Y , Hu Y , 2019 . Review of imbalanced data classification methods . J. Control and Decision , 34 ( 04 ): 673 - 688 . Li Y, Chai Y, Hu Y, 2019. Review of imbalanced data classification methods. J. Control and Decision, 34(04):673-688.","journal-title":"J. Control and Decision"},{"issue":"12","key":"e_1_3_2_1_17_1","first-page":"3745","article-title":"Study of Network Intrusion Detection Based on SMOTE and GBDT","volume":"34","author":"Feng H","year":"2017","unstructured":"Feng H , Li M , Hou X , Xu Z. 2017 . Study of Network Intrusion Detection Based on SMOTE and GBDT . J. Application Research of Computers , 34 ( 12 ): 3745 - 3748 . Feng H, Li M, Hou X, Xu Z. 2017. Study of Network Intrusion Detection Based on SMOTE and GBDT. J. Application Research of Computers, 34(12): 3745-3748.","journal-title":"J. Application Research of Computers"},{"issue":"02","key":"e_1_3_2_1_18_1","first-page":"23","article-title":"DDoS Attack Detection Method Based on Combination Correlation Degree and Random Forest","volume":"51","author":"Li M","year":"2019","unstructured":"Li M , Tang X , Cheng J , Liu Y. 2019 . DDoS Attack Detection Method Based on Combination Correlation Degree and Random Forest . Journal of Zhengzhou University: Natural Science Edition , 51 ( 02 ): 23 - 28 +39. Li M, Tang X, Cheng J, Liu Y. 2019. DDoS Attack Detection Method Based on Combination Correlation Degree and Random Forest. Journal of Zhengzhou University: Natural Science Edition, 51(02): 23-28+39.","journal-title":"Journal of Zhengzhou University: Natural Science Edition"},{"issue":"2","key":"e_1_3_2_1_19_1","first-page":"97","article-title":"Research on improved intrusion detection model of ADASYN-SDA","volume":"56","author":"Chen H","year":"2020","unstructured":"Chen H , Zhao J , Xiao C , 2020 . Research on improved intrusion detection model of ADASYN-SDA . J. Computer Engineering and Applications , 56 ( 2 ): 97 - 105 . Chen H, Zhao J, Xiao C, 2020. Research on improved intrusion detection model of ADASYN-SDA. J. Computer Engineering and Applications, 56(2): 97-105.","journal-title":"J. Computer Engineering and Applications"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Zhang L Cui Y Liu J 2018. Application of Machine Learning in Cyberspace Security Research. Chinese Journal of Computers (9)  Zhang L Cui Y Liu J 2018. Application of Machine Learning in Cyberspace Security Research. Chinese Journal of Computers (9)","DOI":"10.2991\/cimns-18.2018.9"}],"event":{"name":"SPML 2021: 2021 4th International Conference on Signal Processing and Machine Learning","location":"Beijing China","acronym":"SPML 2021"},"container-title":["2021 4th International Conference on Signal Processing and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3483207.3483232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3483207.3483232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:57Z","timestamp":1750191537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3483207.3483232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":20,"alternative-id":["10.1145\/3483207.3483232","10.1145\/3483207"],"URL":"https:\/\/doi.org\/10.1145\/3483207.3483232","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}