{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:14:12Z","timestamp":1774556052557,"version":"3.50.1"},"reference-count":31,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFC0407901"],"award-info":[{"award-number":["2018YFC0407901"]}]},{"name":"National Key R&D Program of China","award":["B200202177"],"award-info":[{"award-number":["B200202177"]}]},{"name":"National Key R&D Program of China","award":["61702160"],"award-info":[{"award-number":["61702160"]}]},{"name":"National Key R&D Program of China","award":["BK20170892"],"award-info":[{"award-number":["BK20170892"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2018YFC0407901"],"award-info":[{"award-number":["2018YFC0407901"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["B200202177"],"award-info":[{"award-number":["B200202177"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61702160"],"award-info":[{"award-number":["61702160"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["BK20170892"],"award-info":[{"award-number":["BK20170892"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFC0407901"],"award-info":[{"award-number":["2018YFC0407901"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["B200202177"],"award-info":[{"award-number":["B200202177"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702160"],"award-info":[{"award-number":["61702160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["BK20170892"],"award-info":[{"award-number":["BK20170892"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["2018YFC0407901"],"award-info":[{"award-number":["2018YFC0407901"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["B200202177"],"award-info":[{"award-number":["B200202177"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["61702160"],"award-info":[{"award-number":["61702160"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20170892"],"award-info":[{"award-number":["BK20170892"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,8,28]]},"abstract":"<jats:p>With the development of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have emerged to wireless communication system, especially in cybersecurity. In this paper, we offer a review on attack detection methods involving strength of deep learning techniques. Specifically, we firstly summarize fundamental problems of network security and attack detection and introduce several successful related applications using deep learning structure. On the basis of categorization on deep learning methods, we pay special attention to attack detection methods built on different kinds of architectures, such as autoencoders, generative adversarial network, recurrent neural network, and convolutional neural network. Afterwards, we present some benchmark datasets with descriptions and compare the performance of representing approaches to show the current working state of attack detection methods with deep learning structures. Finally, we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.<\/jats:p>","DOI":"10.1155\/2020\/8872923","type":"journal-article","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T01:18:37Z","timestamp":1598663917000},"page":"1-17","source":"Crossref","is-referenced-by-count":101,"title":["Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3022-3718","authenticated-orcid":true,"given":"Yirui","family":"Wu","sequence":"first","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"given":"Dabao","family":"Wei","sequence":"additional","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2627-5403","authenticated-orcid":true,"given":"Jun","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1038\/547030a"},{"key":"3","first-page":"1","year":"2019"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2836950"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2944007"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2019.2909137"},{"key":"11","volume":"7","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"12","year":"2019"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.06.041"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.01.007"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tetci.2017.2772792"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2895334"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1017\/atsip.2014.4"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4184196"},{"key":"30","year":"2019"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2020.1003099"},{"issue":"1","key":"38","first-page":"2","volume":"5","year":"2018","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2917299"},{"key":"49","first-page":"1","year":"2020"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v56i1.248"},{"issue":"4","key":"51","first-page":"23157","volume":"8","year":"2016","journal-title":"International Journal of Pharmaceutical Technology and Biotechnology"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2762418"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.5.21"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.08.036"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2905041"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(00)00139-0"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2863036"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1038\/505146a"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2936869"},{"key":"70","volume":"16","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8872923.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8872923.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8872923.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T01:18:44Z","timestamp":1598663924000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8872923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"references-count":31,"alternative-id":["8872923","8872923"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8872923","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]}}}