{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T19:07:45Z","timestamp":1769713665671,"version":"3.49.0"},"reference-count":45,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,11,4]]},"abstract":"<jats:p>This article has been retracted. A retraction notice can be found at https:\/\/doi.org\/10.3233\/JIFS-219433.<\/jats:p>","DOI":"10.3233\/jifs-234311","type":"journal-article","created":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T11:50:10Z","timestamp":1693914610000},"page":"8637-8649","source":"Crossref","is-referenced-by-count":0,"title":["RETRACTED: Intrusion detection in big data environment using hybrid deep learning algorithm (VAE-CNN)"],"prefix":"10.1177","volume":"45","author":[{"given":"R.G.","family":"Gokila","sequence":"first","affiliation":[{"name":"Department of Information Technology, E.G.S. Pillay Engineering College, Nagapattinam, India"}]},{"given":"S.","family":"Kannan","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Kings College of Engineering, Pudukkottai, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-234311_ref1","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/ACCESS.2022.3232526","article-title":"A comprehensive review on big data for industries: challenges and opportunities","volume":"11","author":"Sarker","year":"2023","journal-title":"IEEE Access"},{"issue":"3","key":"10.3233\/JIFS-234311_ref2","doi-asserted-by":"crossref","first-page":"2443","DOI":"10.1109\/JIOT.2021.3096637","article-title":"An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques","volume":"9","author":"Yu","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-234311_ref3","doi-asserted-by":"crossref","first-page":"52883","DOI":"10.1109\/ACCESS.2021.3070737","article-title":"Big data platform for educational analytics","volume":"9","author":"Munshi","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-234311_ref4","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1016\/j.procs.2022.12.072","article-title":"Deep learning models for multiple face mask detection under a complex big data environment","volume":"215","author":"Rekha","year":"2022","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-234311_ref5","doi-asserted-by":"crossref","first-page":"2937","DOI":"10.1166\/jmihi.2021.3878","article-title":"Security for the Networked Robot Operating System for Biomedical Applications","volume":"11","author":"Rajakumaran","year":"2021","journal-title":"Journal of Medical Imaging and Health Informatics"},{"issue":"6","key":"10.3233\/JIFS-234311_ref6","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.1109\/TSC.2019.2907247","article-title":"Cybersecurity in big data era: from securing big data to data-driven security","volume":"14","author":"Rawat","year":"2021","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.3233\/JIFS-234311_ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.procs.2018.01.091","article-title":"Performance evaluation of intrusion detection based on machine learning using Apache Spark","volume":"127","author":"Belouch","year":"2018","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-234311_ref8","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.procs.2018.05.169","article-title":"Network intrusion detection in big dataset using Spark","volume":"132","author":"Dahiya","year":"2018","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-234311_ref9","doi-asserted-by":"crossref","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","article-title":"Clustering approach based on mini batch Kmeans for intrusion detection system over Big Data","volume":"6","author":"Peng","year":"2018","journal-title":"IEEE Access"},{"issue":"1","key":"10.3233\/JIFS-234311_ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18100\/ijamec.2018138629","article-title":"Big Data: controlling fraud by using machine learning libraries on Spark","volume":"6","author":"Karatas","year":"2018","journal-title":"International Journal of Applied Mathematics Electronics and Computers"},{"key":"10.3233\/JIFS-234311_ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/4680867","article-title":"Intrusion detection system based on decision tree over Big Data in fog environment","volume":"2018","author":"Peng","year":"2018","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"5","key":"10.3233\/JIFS-234311_ref12","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1007\/s10766-016-0456-z","article-title":"Hadoop based parallel binary bat algorithm for network intrusion detection","volume":"45","author":"Natesan","year":"2017","journal-title":"International Journal of Parallel Programming"},{"issue":"2","key":"10.3233\/JIFS-234311_ref13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.26599\/BDMA.2021.9020028","article-title":"A mini-review of machine learning in big data analytics: Applications, challenges, and prospects","volume":"5","author":"Nti","year":"2022","journal-title":"Big Data Mining and Analytics"},{"issue":"3","key":"10.3233\/JIFS-234311_ref14","doi-asserted-by":"crossref","first-page":"2899","DOI":"10.32604\/csse.2023.036657","article-title":"Intelligent intrusion detection for industrial internet of things using clustering techniques","volume":"46","author":"Alenezi","year":"2023","journal-title":"Computer Systems Science and Engineering"},{"issue":"3","key":"10.3233\/JIFS-234311_ref15","doi-asserted-by":"crossref","first-page":"181","DOI":"10.26599\/BDMA.2020.9020003","article-title":"Applying big data based deep learning system to intrusion detection","volume":"3","author":"Zhong","year":"2020","journal-title":"Big Data Mining and Analytics"},{"issue":"3","key":"10.3233\/JIFS-234311_ref16","first-page":"3339","article-title":"Feature selection with deep reinforcement learning for intrusion detection system","volume":"46","author":"Pradeep","year":"2022","journal-title":"Computer Systems Science and Engineering"},{"issue":"6","key":"10.3233\/JIFS-234311_ref17","doi-asserted-by":"crossref","first-page":"4298","DOI":"10.1109\/TII.2020.3007419","article-title":"Fuzzy and real-coded chemical reaction optimization for intrusion detection in industrial big data environment","volume":"17","author":"Ding","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"9","key":"10.3233\/JIFS-234311_ref18","doi-asserted-by":"crossref","first-page":"3460","DOI":"10.1109\/TFUZZ.2021.3117441","article-title":"Network intrusion detection based on dynamic intuitionistic fuzzy sets","volume":"30","author":"Xie","year":"2022","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"10.3233\/JIFS-234311_ref19","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.procs.2022.12.003","article-title":"A dynamic fuzzy engine for adaptive control towards improvement of network performance in big data environment","volume":"215","author":"Saravanan","year":"2022","journal-title":"Procedia Computer Science"},{"key":"10.3233\/JIFS-234311_ref20","doi-asserted-by":"crossref","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","article-title":"Clustering approach based on mini batch kmeans for intrusion detection system over big data","volume":"6","author":"Peng","year":"2018","journal-title":"IEEE Access"},{"issue":"2","key":"10.3233\/JIFS-234311_ref21","doi-asserted-by":"crossref","first-page":"1747","DOI":"10.1109\/TII.2022.3204034","article-title":"A regularized cross-layer ladder network for intrusion detection in industrial internet of things","volume":"19","author":"Long","year":"2023","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.3233\/JIFS-234311_ref22","doi-asserted-by":"crossref","first-page":"13546","DOI":"10.1109\/ACCESS.2019.2893871","article-title":"Introducing deep learning self-adaptive misuse network intrusion detection systems","volume":"7","author":"Papamartzivanos","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"10.3233\/JIFS-234311_ref23","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1109\/JSYST.2019.2945555","article-title":"Autonomic intrusion detection and response using big data","volume":"14","author":"Vieira","year":"2020","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"10.3233\/JIFS-234311_ref24","doi-asserted-by":"crossref","first-page":"181","DOI":"10.26599\/BDMA.2020.9020003","article-title":"Applying big data based deep learning system to intrusion detection","volume":"3","author":"Zhong","year":"2020","journal-title":"Big Data Mining and Analytics"},{"issue":"5","key":"10.3233\/JIFS-234311_ref25","doi-asserted-by":"crossref","first-page":"3469","DOI":"10.1109\/TII.2020.3022432","article-title":"Variational LSTM enhanced anomaly detection for industrial big data","volume":"17","author":"Zhou","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"10","key":"10.3233\/JIFS-234311_ref26","doi-asserted-by":"crossref","first-page":"2704","DOI":"10.1109\/TSMC.2017.2698457","article-title":"An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning","volume":"47","author":"Huang","year":"2017","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"10.3233\/JIFS-234311_ref27","doi-asserted-by":"crossref","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","article-title":"An improved intrusion detection algorithm based on GA and SVM","volume":"6","author":"Tao","year":"2018","journal-title":"IEEE Access"},{"issue":"6","key":"10.3233\/JIFS-234311_ref28","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/TDSC.2018.2867595","article-title":"Pagoda: a hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments","volume":"17","author":"Xie","year":"2020","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"12","key":"10.3233\/JIFS-234311_ref29","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical adversarial attacks against graph-neural-network-based iot network intrusion detection system","volume":"9","author":"Zhou","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-234311_ref30","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep learning approach for intelligent intrusion detection system","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-234311_ref31","doi-asserted-by":"crossref","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","article-title":"BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset","volume":"8","author":"Su","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-234311_ref32","doi-asserted-by":"crossref","first-page":"123448","DOI":"10.1109\/ACCESS.2021.3109081","article-title":"IoT intrusion detection system using deep learning and enhanced transient search optimization","volume":"9","author":"Fatani","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-234311_ref33","doi-asserted-by":"crossref","first-page":"92931","DOI":"10.1109\/ACCESS.2022.3202807","article-title":"STLGBM-DDS: An efficient data balanced DoS detection system for wireless sensor networks on big data environment","volume":"10","author":"Dener","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-234311_ref34","doi-asserted-by":"crossref","first-page":"52724","DOI":"10.1109\/ACCESS.2022.3174482","article-title":"An ameliorated multiattack network anomaly detection in distributed big data system-based enhanced stacking multiple binary classifiers","volume":"10","author":"Alhabshy","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-234311_ref35","doi-asserted-by":"crossref","first-page":"59657","DOI":"10.1109\/ACCESS.2018.2875045","article-title":"Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark","volume":"6","author":"Marir","year":"2018","journal-title":"IEEE Access"},{"issue":"4","key":"10.3233\/JIFS-234311_ref36","doi-asserted-by":"crossref","first-page":"484","DOI":"10.26599\/TST.2020.9010022","article-title":"Intrusion detection system using voting-based neural network","volume":"26","author":"Haghighat","year":"2021","journal-title":"Tsinghua Science and Technology"},{"issue":"4","key":"10.3233\/JIFS-234311_ref37","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","article-title":"Federated-learning-based anomaly detection for IoT security attacks","volume":"9","author":"Mothukuri","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-234311_ref38","doi-asserted-by":"crossref","first-page":"71414","DOI":"10.1109\/ACCESS.2022.3186975","article-title":"A hybrid intrusion detection system based on feature selection and weighted stacking classifier","volume":"10","author":"Zhao","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-234311_ref39","doi-asserted-by":"crossref","first-page":"154560","DOI":"10.1109\/ACCESS.2019.2948382","article-title":"A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"},{"issue":"3","key":"10.3233\/JIFS-234311_ref40","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","article-title":"An ensemble learning based intrusion detection model for industrial IoT security","volume":"6","author":"Mohy-Eddine","year":"2023","journal-title":"Big Data Mining and Analytics"},{"issue":"16","key":"10.3233\/JIFS-234311_ref41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s22165986","article-title":"A hybrid intrusion detection model using EGA-PSO and improved random forest method","volume":"22","author":"Balyan","year":"2022","journal-title":"Sensors"},{"issue":"3","key":"10.3233\/JIFS-234311_ref42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/sym15030568","article-title":"Hybrid intrusion detection system based on combination of random forest and autoencoder","volume":"15","author":"Wang","year":"2023","journal-title":"Symmetry"},{"key":"10.3233\/JIFS-234311_ref43","doi-asserted-by":"crossref","unstructured":"Kanna P. Rajesh and Santhi P. , Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks, Expert Systems with Applications 194(116545) (2022).","DOI":"10.1016\/j.eswa.2022.116545"},{"issue":"1","key":"10.3233\/JIFS-234311_ref44","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1080\/09540091.2021.2024509","article-title":"A hybrid parallel deep learning model for efficient intrusion detection based on metric learning","volume":"34","author":"Cai","year":"2022","journal-title":"Connection Science"},{"issue":"4","key":"10.3233\/JIFS-234311_ref45","first-page":"1276","article-title":"A metaheuristic approach towards enhancement of network lifetime in wireless sensor networks","volume":"17","author":"Manoharan","year":"2023","journal-title":"KSII Transactions on Internet and Information Systems"}],"updated-by":[{"DOI":"10.3233\/jifs-219433","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T00:00:00Z","timestamp":1724371200000},"record-id":"63583"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-234311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:27:45Z","timestamp":1769675265000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-234311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-234311","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,4]]}}}