{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:09:25Z","timestamp":1771700965332,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2020YFB1807805"],"award-info":[{"award-number":["2020YFB1807805"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071067,61771068,61872310"],"award-info":[{"award-number":["62071067,61771068,61872310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.23919\/ifipnetworking52078.2021.9472814","type":"proceedings-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:09:00Z","timestamp":1625861340000},"page":"1-9","source":"Crossref","is-referenced-by-count":22,"title":["Few-Shot Class-Adaptive Anomaly Detection with Model-Agnostic Meta-Learning"],"prefix":"10.23919","author":[{"given":"Tongtong","family":"Feng","sequence":"first","affiliation":[]},{"given":"Qi","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Jingyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"7115","article-title":"Tapnet: Neural network augmented with task-adaptive projection for few-shot learning","author":"yoon","year":"2019","journal-title":"ICML"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01002"},{"key":"ref31","first-page":"1842","article-title":"Meta-Learning with Memory-Augmented Neural Networks","author":"santoro","year":"2016","journal-title":"ICML"},{"key":"ref30","first-page":"2554","article-title":"Meta Networks","author":"munkhdalai","year":"2017","journal-title":"ICML"},{"key":"ref37","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585560"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-030-24907-6_21","article-title":"Effectiveness of Machine Learning Based Intrusion Detection Systems","author":"alrowaily","year":"2019","journal-title":"Security Privacy and Anonymity in Computation Communication and Storage"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","article-title":"Least squares support vector machine classifiers","volume":"9","author":"suykens","year":"1999","journal-title":"Neural Processing Letters"},{"key":"ref12","first-page":"1","article-title":"XGBoosted Misuse Detection in LAN-Internal Traffic Dataset","author":"zhang","year":"0","journal-title":"IEEE International Conference on Intelligence and Security Informatics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01091"},{"key":"ref15","author":"rusu","year":"2018","journal-title":"Meta-learning with latent embedding optimization"},{"key":"ref16","first-page":"4077","article-title":"Prototypical Networks for Few-shot Learning","author":"snell","year":"2017","journal-title":"NIPS"},{"key":"ref17","author":"wang","year":"2019","journal-title":"Sim-pleshot Revisiting nearest-neighbor classification for few-shot learning"},{"key":"ref18","first-page":"1842","article-title":"Meta-Learning with Memory-Augmented Neural Networks","author":"santoro","year":"0","journal-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning"},{"key":"ref19","first-page":"7352","article-title":"TADAM: Task dependent adaptive metric for improved few-shot learning","author":"oreshkin","year":"2018","journal-title":"NIPS"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref27","first-page":"3630","article-title":"Matching Networks for One Shot Learning","author":"vinyals","year":"2016","journal-title":"NIPS"},{"key":"ref3","first-page":"322","article-title":"SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection","author":"min","year":"0","journal-title":"International Conference on Cloud Computing and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4184196"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00177"},{"key":"ref5","first-page":"523","article-title":"Unsupervised traffic flow classification using a neural autoencoder","author":"h\u00f6chst","year":"2017","journal-title":"LCN"},{"key":"ref8","first-page":"1","article-title":"TrafficAV: An Effective and Explainable Detection of Mobile Malware Behavior using Network Traffic","author":"wang","year":"2016","journal-title":"IWQoS"},{"key":"ref7","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","author":"finn","year":"2017","journal-title":"ICML"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047340"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4943509"},{"key":"ref20","article-title":"Subspace Networks for Few-shot Classification","author":"devos","year":"2019","journal-title":"CoRR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00671"},{"key":"ref21","first-page":"522","article-title":"Tafssl: Task-adaptive feature sub-space learning for few-shot classification","author":"lichtenstein","year":"0","journal-title":"European Conference on Computer Vision"},{"key":"ref24","author":"schwartz","year":"2018","journal-title":"Delta-encoder an effective sample synthesis method for few-shot object recognition"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.328"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00429"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2910052"}],"event":{"name":"2021 IFIP Networking Conference (IFIP Networking)","location":"Espoo and Helsinki, Finland","start":{"date-parts":[[2021,6,21]]},"end":{"date-parts":[[2021,6,24]]}},"container-title":["2021 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9472750\/9472195\/09472814.pdf?arnumber=9472814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:51:52Z","timestamp":1643226712000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9472814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":37,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking52078.2021.9472814","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]}}}