{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:03:48Z","timestamp":1774454628241,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T00:00:00Z","timestamp":1721779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,24]]},"DOI":"10.1145\/3688574.3688578","type":"proceedings-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T12:21:55Z","timestamp":1726230115000},"page":"25-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Toward Deep Learning based Intrusion Detection System: A Survey"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2160-6418","authenticated-orcid":false,"given":"Zhiqi","family":"Li","sequence":"first","affiliation":[{"name":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rUniversity of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9139-2892","authenticated-orcid":false,"given":"Weidong","family":"Fang","sequence":"additional","affiliation":[{"name":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rShanghai Research and Development Center for Micro-Nano Electronics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8041-0197","authenticated-orcid":false,"given":"Chunsheng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shenzhen Technology University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7469-8969","authenticated-orcid":false,"given":"Guannan","family":"Song","sequence":"additional","affiliation":[{"name":"Shuiyan Microsystem and Information Technology, Co., Ltd.,, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5084-3351","authenticated-orcid":false,"given":"Wuxiong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rUniversity of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3320934"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3006137"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3306452"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3097247"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8981988"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.54039\/ijcnis.v13i3.5148"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2693948"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671576"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3088149"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049249"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6173-7_7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103644"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13052754"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110173"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13084921"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103516"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.08.026"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417568"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT53264.2022.9716485"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12473"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3047642"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22124459"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3184975"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.02.063"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040524"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9023719"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082147"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2196"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2022.100746"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"V. Gowdhaman and R. Dhanapal. 2021. An intrusion detection system for wireless sensor networks using deep neural network. Soft Comput. 26 (November 2021) 13059\u201313067. https:\/\/doi.org\/10.1007\/s00500-021-06473-y","DOI":"10.1007\/s00500-021-06473-y"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6723-7_40"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers12020034"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2023602"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3122370"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.09.023"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100977"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3295438"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.03.005"}],"event":{"name":"BDE 2024: 2024 6th International Conference on Big Data Engineering","location":"Xining China","acronym":"BDE 2024"},"container-title":["Proceedings of the 2024 6th International Conference on Big Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688578","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688574.3688578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:14:33Z","timestamp":1755915273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,24]]},"references-count":40,"alternative-id":["10.1145\/3688574.3688578","10.1145\/3688574"],"URL":"https:\/\/doi.org\/10.1145\/3688574.3688578","relation":{},"subject":[],"published":{"date-parts":[[2024,7,24]]},"assertion":[{"value":"2024-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}