{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T00:03:40Z","timestamp":1752192220161,"version":"3.41.2"},"reference-count":35,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T00:00:00Z","timestamp":1740700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems: Applications in Engineering and Technology"],"published-print":{"date-parts":[[2025,2,28]]},"DOI":"10.3233\/jifs-241805","type":"journal-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T10:19:42Z","timestamp":1744885182000},"page":"569-583","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["SGAN-RL: Fusion classification method for network intrusion detection based on data augmentation"],"prefix":"10.1177","volume":"48","author":[{"given":"Lining","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, P.R. China"}]},{"given":"Shuai","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, P.R. China"}]},{"given":"Rong","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, P.R. China"},{"name":"The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao, P.R. China"}]},{"given":"Lianhai","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, P.R. China"}]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, P.R. China"}]},{"given":"Bing","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, P.R. China"},{"name":"The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2025,2,28]]},"reference":[{"key":"e_1_3_2_2_2","article-title":"Computer security threat monitoring and surveillance","author":"Anderson J.P.","year":"1980","unstructured":"AndersonJ.P., Computer security threat monitoring and surveillance, in Technical Report, James P. Anderson Company, 1980.","journal-title":"Technical Report"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2016.7530231"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13453-2_12"},{"key":"e_1_3_2_6_2","first-page":"89","article-title":"An introduction to intrusion detection & assessment","author":"Rebecca B.","year":"1998","unstructured":"RebeccaB., An introduction to intrusion detection & assessment, in Proc. International Conference on Software Architecture(ICSA), 1998:89\u201396.","journal-title":"Proc. International Conference on Software Architecture(ICSA)"},{"issue":"4","key":"e_1_3_2_7_2","first-page":"28","article-title":"Decision tree based algorithm for intrusion detection","volume":"7","author":"Rai K.","year":"2016","unstructured":"RaiK., DeviM.S. and GuleriaA., Decision tree based algorithm for intrusion detection, International Journal of Advanced Networking and Applications 7(4) (2016), 28.","journal-title":"International Journal of Advanced Networking and Applications"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.009"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/978-981-13-6001-5_43","article-title":"Intrusion detection system using random forest on the NSL-KDD dataset","author":"Negandhi P.","year":"2019","unstructured":"NegandhiP., TrivediY. and MangrulkarR., Intrusion detection system using random forest on the NSL-KDD dataset, Emerging Research in Computing, Information, Communication and Applications: ERCICA 2018, Volume 2. Springer Singapore, 2019:519\u2013531.","journal-title":"Emerging Research in Computing, Information, Communication and Applications: ERCICA 2018"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.5120\/758-993"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082147"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05017-0"},{"issue":"08","key":"e_1_3_2_13_2","first-page":"88","article-title":"Network intrusion detection method based on deep learning[J]","volume":"35","author":"Chen X.","year":"2022","unstructured":"ChenX., Network intrusion detection method based on deep learning[J], Telecommunications Engineering Technology and Standardization 35(08) (2022), 88\u201392.","journal-title":"Telecommunications Engineering Technology and Standardization"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8890306","article-title":"DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system","volume":"2020","author":"Sun P.","year":"2020","unstructured":"SunP., LiuP., LiQ., et al, DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system, Security and Communication Networks 2020 (2020), 1\u201311.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00511-X"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00004-7"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.09.017"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.010"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2015.7288736"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108455"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05017-0"},{"issue":"01","key":"e_1_3_2_22_2","first-page":"4","article-title":"Network intrusion detection system based on deep learning","volume":"265","author":"Fu Z.C.","year":"2023","unstructured":"FuZ.C. and LiuJ.H., Network intrusion detection system based on deep learning, Network Security Technology and Application 265(01) (2023), 4\u20137.","journal-title":"Network Security Technology and Application"},{"issue":"23","key":"e_1_3_2_23_2","first-page":"93","article-title":"Remote detection method for network intrusion in smart campus based on CNN-GRU","volume":"45","author":"Li G.","year":"2022","unstructured":"LiG., FuH., ZhaoS.L., et al. Remote detection method for network intrusion in smart campus based on CNN-GRU, Modern Electronic Technology 45(23) (2022), 93\u201396.","journal-title":"Modern Electronic Technology"},{"key":"e_1_3_2_24_2","first-page":"9407","article-title":"SGAN: An alternative training of generative adversarial networks, the institute of electrical and electronics engineers","author":"Chavdarova T.","year":"2018","unstructured":"ChavdarovaT. and FleuretF., SGAN: An alternative training of generative adversarial networks, the institute of electrical and electronics engineers, Inc. (IEEE) Conference Proceedings, 01\/2018:9407\u20139422.","journal-title":"Inc. (IEEE) Conference Proceedings"},{"key":"e_1_3_2_25_2","first-page":"802","article-title":"Convolutional LSTM network: A machine learning approach for precipitation nowcasting","author":"Shi X.","year":"2015","unstructured":"ShiX., ChenZ., WangH., et al, Convolutional LSTM network: A machine learning approach for precipitation nowcasting, Advances in Neural Information Processing Systems 2015:802\u2013810.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_26_2","first-page":"770","article-title":"Deep residual learning for image recognition","author":"Kaiming H.","year":"2016","unstructured":"KaimingH., ZhangX., RenS. and SunJ., Deep residual learning for image recognition, in Proc.2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, 2016:770\u2013778.","journal-title":"Proc.2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg66-16670"},{"key":"e_1_3_2_28_2","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa N.","year":"2015","unstructured":"MoustafaN. and SlayJ., UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), in Proc. 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, 2015:1\u20136.","journal-title":"Proc. 2015 Military Communications and Information Systems Conference (MilCIS)"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.5220\/0010774000003120"},{"key":"e_1_3_2_30_2","unstructured":"Ding.Y.L. Design and implementation of intrusion detection system based on long short-term memory model Nanjing: Southeast University 2019."},{"key":"e_1_3_2_31_2","unstructured":"TangC.F. Research and implementation of network intrusion detection algorithm based on LightGBM and autoencoder Urumqi: Xinjiang University 2021."},{"key":"e_1_3_2_32_2","unstructured":"Bian YuchanY.C. Research on network intrusion detection method based on SVM and Adaboost Shenyang: Shenyang University of Technology 2022."},{"key":"e_1_3_2_33_2","unstructured":"HuF.J. Research on network intrusion detection system based on LightGBM Xi\u2019an: Xidian University 2020."},{"issue":"09","key":"e_1_3_2_34_2","first-page":"21","article-title":"An intrusion detection model based on multiple feature extraction strategies in the Internet of Thing","volume":"2019","author":"Kang J.","year":"2019","unstructured":"KangJ., WangJ. and LiZ.X., An intrusion detection model based on multiple feature extraction strategies in the Internet of Thing, Information Network Security 2019(09) (2019), 21\u201325.","journal-title":"Information Network Security"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24907-6_21"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems: Applications in Engineering and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-241805","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-241805","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-241805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:04:41Z","timestamp":1752138281000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-241805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,28]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,2,28]]}},"alternative-id":["10.3233\/JIFS-241805"],"URL":"https:\/\/doi.org\/10.3233\/jifs-241805","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"type":"print","value":"1064-1246"},{"type":"electronic","value":"1875-8967"}],"subject":[],"published":{"date-parts":[[2025,2,28]]}}}