{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:59:27Z","timestamp":1763348367808,"version":"3.41.2"},"reference-count":62,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"vor","delay-in-days":245,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802094"],"award-info":[{"award-number":["61802094"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LQ19F020008","LY20F020012"],"award-info":[{"award-number":["LQ19F020008","LY20F020012"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The Internet of Things (IoT) contains a large amount of data, which attracts various types of network attacks that lead to privacy leaks. With the upgrading of network attacks and the increase in network security data, traditional machine learning methods are no longer suitable for network threat detection. At the same time, data analysis techniques and deep learning algorithms have developed rapidly and have been successfully applied to a variety of tasks for privacy protection. Convolutional neural networks (CNNs) are typical deep learning models that can learn and reconstruct features accurately and efficiently. Therefore, in this paper, we propose a group CNN models that is based on feature correlations to learn features and reconstruct security data. First, feature correlation coefficients are computed to measure the relationships among the features. Then, we sort the correlation coefficients in descending order and group the data by columns. Second, a 1D group CNN model with multiple 1D convolution kernels and 1D pooling filters is built to address the grouped data for feature learning and reconstruction. Third, the reconstructed features are input to shadow machine learning models for network threat prediction. The experimental results show that features reconstructed by the group CNN can reduce the dimensions and achieve the best performance compared to the other present dimension reduction algorithms. At the same time, the group CNN can decrease the floating point of operations (FLOP), parameters, and running time compared to the basic 1D CNN.<\/jats:p>","DOI":"10.1155\/2021\/3697536","type":"journal-article","created":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T02:35:21Z","timestamp":1630722921000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Network Threat Detection Based on Group CNN for Privacy Protection"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3506-6352","authenticated-orcid":false,"given":"Yanping","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xia","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9969-481X","authenticated-orcid":false,"given":"Chengdan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhenliang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Chunfang","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Yuping","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,9,3]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3064952"},{"key":"e_1_2_9_2_2","doi-asserted-by":"crossref","unstructured":"CaiZ.andHeZ. Trading private range counting over big IoT data The 39th IEEE International Conference on Distributed Computing Systems 2019 Dallas TX USA 144\u2013153 https:\/\/doi.org\/10.1109\/ICDCS.2019.00023.","DOI":"10.1109\/ICDCS.2019.00023"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3012157"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2975227"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2613521"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3005610"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5556"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2953033"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3057771"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2976697"},{"key":"e_1_2_9_13_2","article-title":"Machine learning and deep learning methods for intrusion detection systems: a survey","volume":"20","author":"Liu H.","year":"2019","journal-title":"Applied Sciences"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22310"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2977886"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09825-6"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3061419"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.015"},{"key":"e_1_2_9_22_2","doi-asserted-by":"crossref","unstructured":"VigneswaranR. K. VinayakumarR. SomanK. P. andPoornachandranP. Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security 2018 9th International Conference on Computing Communication and Networking Technologies 2018 Bengaluru India https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494096 2-s2.0-85056904819.","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.070"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077449"},{"key":"e_1_2_9_25_2","article-title":"Multiscale convolutional CNN model for network intrusion detection","volume":"55","author":"Liu Y.","year":"2019","journal-title":"Computer Engineering and Applications"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-1263-0"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2020.2994780"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3055762"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3047675"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2019.2940583"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2762418"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2020.103199"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2020.107398"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22302"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2020.01.004"},{"key":"e_1_2_9_37_2","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","volume":"25","author":"Krizhevsky A.","year":"2012","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_9_38_2","article-title":"Interleaved group convolutions for deep neural networks","volume":"1707","author":"Zhang T.","year":"2017","journal-title":"ICCV"},{"key":"e_1_2_9_39_2","first-page":"1","article-title":"SRGC-nets: sparse repeated group convolutional neural networks","volume":"99","author":"Lu Y.","year":"2019","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_2_9_41_2","doi-asserted-by":"crossref","unstructured":"KruczkowskiM.andSzynkiewiczE. N. Support vector machine for malware analysis and classification 2014 IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies 2014 Warsaw Poland 415\u2013420 https:\/\/doi.org\/10.1109\/WI-IAT.2014.127 2-s2.0-84912522489.","DOI":"10.1109\/WI-IAT.2014.127"},{"key":"e_1_2_9_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_2_9_43_2","doi-asserted-by":"crossref","unstructured":"AungY. Y.andMinM. M. Hybrid intrusion detection system usingK-means and classification and regression trees algorithms 2018 IEEE 16th International Conference on Software Engineering Research Management and Applications 2018 Kunming China 195\u2013199 https:\/\/doi.org\/10.1109\/SERA.2018.8477203 2-s2.0-85055798079.","DOI":"10.1109\/SERA.2018.8477203"},{"key":"e_1_2_9_44_2","first-page":"6551","article-title":"Comparative analysis of clustering techniques in network traffic faults classification","volume":"5","author":"Mo A.","year":"2017","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"e_1_2_9_45_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-019-2823-4"},{"key":"e_1_2_9_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904620"},{"key":"e_1_2_9_47_2","doi-asserted-by":"crossref","unstructured":"WangY. AnJ. andHuangW. Using CNN-based representation learning method for malicious traffic identification 2018 IEEE\/ACIS 17th International Conference on Computer and Information Science 2018 Singapore Singapore 400\u2013404.","DOI":"10.1109\/ICIS.2018.8466404"},{"key":"e_1_2_9_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.005"},{"key":"e_1_2_9_49_2","doi-asserted-by":"crossref","unstructured":"ZhangJ. QinZ. YinH. OuL. XiaoS. andHuY. Malware variant detection using opcode image recognition with small training sets 2016 25th International Conference on Computer Communication and Networks 2016 Waikoloa HI USA https:\/\/doi.org\/10.1109\/ICCCN.2016.7568542 2-s2.0-84991778570.","DOI":"10.1109\/ICCCN.2016.7568542"},{"key":"e_1_2_9_50_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7247095"},{"key":"e_1_2_9_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946708"},{"key":"e_1_2_9_52_2","doi-asserted-by":"crossref","unstructured":"AzizjonM. JumabekA. andKimW. 1D CNN based network intrusion detection with normalization on imbalanced data 2020 International Conference on Artificial Intelligence in Information and Communication 2020 Fukuoka Japan 218\u2013224 https:\/\/doi.org\/10.1109\/ICAIIC48513.2020.9064976.","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"key":"e_1_2_9_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107275"},{"key":"e_1_2_9_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107315"},{"key":"e_1_2_9_55_2","doi-asserted-by":"crossref","unstructured":"XieS.andGirshickR. Aggregated residual transformations for deep neural networks 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016 Honolulu USA.","DOI":"10.1109\/CVPR.2017.634"},{"volume-title":"Visualizing and Understanding Convolutional Neural Networks","year":"2013","author":"Zeiler M. D.","key":"e_1_2_9_56_2"},{"key":"e_1_2_9_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2815841"},{"key":"e_1_2_9_58_2","first-page":"5938","article-title":"FLOP-reduction through memory allocations within CNN for hyperspectral image classification","volume":"1109","author":"Paoletti M. E.","year":"2020","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"e_1_2_9_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3022432"},{"key":"e_1_2_9_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3075626"},{"volume-title":"KDD Cup 1999 Data","year":"1999","author":"Hettich S.","key":"e_1_2_9_61_2"},{"key":"e_1_2_9_62_2","doi-asserted-by":"crossref","unstructured":"MahdavifarS. KadirA. FatemiR. AlhadidiD. andGhorbaniA. A. Dynamic android malware category classification using semi-supervised deep learning 2020 IEEE Int\u2019l. Conf. on Dependable Autonomic and Secure Computing Int\u2019l. Conf. on Pervasive Intelligence and Computing Int\u2019l. Conf. on Cloud and Big Data Computing Int\u2019l. Conf. on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech) 2020 Calgary AB Canada 515\u2013522.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/3697536.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/3697536.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/3697536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:36:20Z","timestamp":1723030580000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/3697536"}},"subtitle":[],"editor":[{"given":"Yaguang","family":"Lin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/3697536"],"URL":"https:\/\/doi.org\/10.1155\/2021\/3697536","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-06-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3697536"}}