{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:03:03Z","timestamp":1765357383983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T00:00:00Z","timestamp":1683244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,5]]},"DOI":"10.1145\/3589462.3589489","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T22:07:36Z","timestamp":1685138856000},"page":"161-169","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A method combining improved Mahalanobis distance and adversarial autoencoder to detect abnormal network traffic"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5290-7446","authenticated-orcid":false,"given":"Li","family":"Ming","sequence":"first","affiliation":[{"name":"Shanghai Maritime University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8861-5461","authenticated-orcid":false,"given":"Han","family":"Dezhi","sequence":"additional","affiliation":[{"name":"Shanghai Maritime University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1986-7144","authenticated-orcid":false,"given":"Li","family":"Dun","sequence":"additional","affiliation":[{"name":"Shanghai Maritime University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.2024509"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.05.007"},{"key":"e_1_3_2_1_4_1","volume-title":"Tutorial on variational autoencoders. arXiv preprint arXiv:1606.05908","author":"Doersch Carl","year":"2016","unstructured":"Carl Doersch . 2016. Tutorial on variational autoencoders. arXiv preprint arXiv:1606.05908 ( 2016 ). Carl Doersch. 2016. Tutorial on variational autoencoders. arXiv preprint arXiv:1606.05908 (2016)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102890"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2022.119475"},{"key":"e_1_3_2_1_7_1","volume-title":"Anomaly detection in blockchain networks: A comprehensive survey","author":"Hassan Muneeb\u00a0Ul","year":"2022","unstructured":"Muneeb\u00a0Ul Hassan , Mubashir\u00a0Husain Rehmani , and Jinjun Chen . 2022. Anomaly detection in blockchain networks: A comprehensive survey . IEEE Communications Surveys & Tutorials ( 2022 ). Muneeb\u00a0Ul Hassan, Mubashir\u00a0Husain Rehmani, and Jinjun Chen. 2022. Anomaly detection in blockchain networks: A comprehensive survey. IEEE Communications Surveys & Tutorials (2022)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym11040583"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.106017"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.04.004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06496-5"},{"key":"e_1_3_2_1_14_1","volume-title":"Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD) 6, 1","author":"Liu Fei\u00a0Tony","year":"2012","unstructured":"Fei\u00a0Tony Liu , Kai\u00a0Ming Ting , and Zhi-Hua Zhou . 2012. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD) 6, 1 ( 2012 ), 1\u201339. Fei\u00a0Tony Liu, Kai\u00a0Ming Ting, and Zhi-Hua Zhou. 2012. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD) 6, 1 (2012), 1\u201339."},{"key":"e_1_3_2_1_15_1","volume-title":"Sparse autoencoder. CS294A Lecture notes 72","author":"Andrew Ng","year":"2011","unstructured":"Andrew Ng 2011. Sparse autoencoder. CS294A Lecture notes 72 , 2011 (2011), 1\u201319. Andrew Ng 2011. Sparse autoencoder. CS294A Lecture notes 72, 2011 (2011), 1\u201319."},{"key":"e_1_3_2_1_16_1","volume-title":"Learning representations by back-propagating errors. nature 323, 6088","author":"Rumelhart E","year":"1986","unstructured":"David\u00a0 E Rumelhart , Geoffrey\u00a0 E Hinton , and Ronald\u00a0 J Williams . 1986. Learning representations by back-propagating errors. nature 323, 6088 ( 1986 ), 533\u2013536. David\u00a0E Rumelhart, Geoffrey\u00a0E Hinton, and Ronald\u00a0J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533\u2013536."},{"key":"e_1_3_2_1_17_1","volume-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin , Arash\u00a0Habibi Lashkari , and Ali\u00a0 A Ghorbani . 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1 ( 2018 ), 108\u2013116. Iman Sharafaldin, Arash\u00a0Habibi Lashkari, and Ali\u00a0A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1 (2018), 108\u2013116."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2975227"},{"key":"e_1_3_2_1_20_1","volume-title":"International conference on learning representations.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong , Qi Song , Martin\u00a0Renqiang Min , Wei Cheng , Cristian Lumezanu , Daeki Cho , and Haifeng Chen . 2018 . Deep autoencoding gaussian mixture model for unsupervised anomaly detection . In International conference on learning representations. Bo Zong, Qi Song, Martin\u00a0Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International conference on learning representations."}],"event":{"name":"IDEAS '23: International Database Engineered Applications Symposium Conference","acronym":"IDEAS '23","location":"Heraklion, Crete Greece"},"container-title":["International Database Engineered Applications Symposium Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589462.3589489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589462.3589489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:16Z","timestamp":1750291396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589462.3589489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,5]]},"references-count":20,"alternative-id":["10.1145\/3589462.3589489","10.1145\/3589462"],"URL":"https:\/\/doi.org\/10.1145\/3589462.3589489","relation":{},"subject":[],"published":{"date-parts":[[2023,5,5]]},"assertion":[{"value":"2023-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}