{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T23:12:00Z","timestamp":1777072320950,"version":"3.51.4"},"reference-count":27,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061206","type":"journal-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T04:47:56Z","timestamp":1742359676000},"page":"3335-3350","source":"Crossref","is-referenced-by-count":2,"title":["SA-ResNet: An Intrusion Detection Method Based on Spatial Attention Mechanism and Residual Neural Network Fusion"],"prefix":"10.32604","volume":"83","author":[{"given":"Zengyu","family":"Cai","sequence":"first","affiliation":[]},{"given":"Yuming","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"65611","DOI":"10.1109\/ACCESS.2022.3183213","article-title":"Hybrid optimization enabled robust CNN-LSTM technique for network intrusion detection","volume":"10","author":"Deore","year":"2022","journal-title":"IEEE Access"},{"key":"ref2","article-title":"Computer security threat monitoring and surveillance","author":"Anderson","year":"1980 [cited 2024 Jan 4]","journal-title":"Technical Report, James P. Anderson Company"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","article-title":"An intrusion-detection model","volume":"13","author":"Denning","year":"1987","journal-title":"IEEE Trans Softw Eng"},{"key":"ref4","series-title":"2019 International Conference on Communications, Information System and Computer Engineering (CISCE)","first-page":"431","article-title":"Network intrusion detection based on deep learning","author":"Peng","year":"2019"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"17227","DOI":"10.1038\/s41598-023-43816-1","article-title":"Robust genetic machine learning ensemble model for intrusion detection in network traffic","volume":"13","author":"Akhtar","year":"2023","journal-title":"Sci Rep"},{"key":"ref6","first-page":"508","article-title":"Ae-based network intrusion detection for dnp packet injection attacks","volume":"36","author":"Altaha","year":"2020","journal-title":"Dbpia"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3267","DOI":"10.3390\/electronics12153267","article-title":"Industrial internet intrusion detection based on Res-CNN-SRU","volume":"12","author":"Cai","year":"2023","journal-title":"Electronics"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s42979-021-00991-0","article-title":"Intrusion detection system based on RNN classifier for feature reduction","volume":"3","author":"Deore","year":"2022","journal-title":"SN Comput Sci"},{"key":"ref9","first-page":"3089","article-title":"A novel eccentric intrusion detection model based on recurrent neural networks with leveraging LSTM","volume":"78","author":"Muthunambu","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref10","first-page":"507","article-title":"A method for network intrusion detection based on GAN-CNN-BILSTM","volume":"14","author":"Li","year":"2023","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref11","series-title":"2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS)","first-page":"78","article-title":"SSAE-deepcnn model for network intrusion detection","author":"Lee","year":"2021"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"8645","DOI":"10.1109\/JIOT.2022.3175918","article-title":"Semisupervised federated-learning-based intrusion detection method for internet of things","volume":"10","author":"Zhao","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref13","first-page":"202","article-title":"Network intrusion detection model integrating CNN-BIGRU and attention mechanism","volume":"10","author":"Yang","year":"2024","journal-title":"Inform Secur Res"},{"key":"ref14","first-page":"2315","article-title":"Fusion of spiral convolution-LSTM for intrusion detection modeling","volume":"79","author":"Wang","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref15","first-page":"4319","article-title":"CNN channel attention intrusion detection system using NSL-KDD dataset","volume":"79","author":"Alrayes","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref16","first-page":"309","article-title":"Network intrusion detection method based on attention-BITCN","volume":"24","author":"Sun","year":"2024","journal-title":"Inform Netw Secur"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","article-title":"RTIDS: a robust transformer-based approach for intrusion detection system","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"110072","DOI":"10.1016\/j.comnet.2023.110072","article-title":"TNN-IDS: transformer neural network-based intrusion detection system for MQTT-enabled IoT networks","volume":"237","author":"Ullah","year":"2023","journal-title":"Comput Netw"},{"key":"ref19","first-page":"532","author":"Friji","year":"2023","journal-title":"Applied cryptography and network security"},{"key":"ref20","series-title":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","first-page":"1","article-title":"Gids: gan based intrusion detection system for in-vehicle network","author":"Seo","year":"2018"},{"key":"ref21","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","article-title":"Deep residual learning for image recognition","author":"He","year":"2016 Jun"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"107770","DOI":"10.1016\/j.compbiomed.2023.107770","article-title":"An improved supervised and attention mechanism-based U-Net algorithm for retinal vessel segmentation","volume":"168","author":"Ma","year":"2024","journal-title":"Comput Biol Med"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1186\/s40537-021-00544-5","article-title":"IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism","volume":"8","author":"Laghrissi","year":"2021","journal-title":"J Big Data"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"98734","DOI":"10.1109\/ACCESS.2024.3429420","article-title":"TSSAN: time-space separable attention network for intrusion detection","volume":"12","author":"Xu","year":"2024","journal-title":"IEEE Access"},{"key":"ref25","first-page":"4025","article-title":"Intrusion detection system with customized machine learning techniques for NSL-KDD dataset","volume":"77","author":"Zakariah","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref26","first-page":"411","article-title":"An industrial intrusion detection method based on hybrid convolutional neural networks with improved TCN","volume":"78","author":"Liu","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref27","first-page":"879","article-title":"Network intrusion detection method based on GRU-RNN","volume":"42","author":"Li","year":"2021","journal-title":"J Harbin Eng Univ"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61206\/TSP_CMC_61206.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:06:05Z","timestamp":1763341565000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061206","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}