{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:30:58Z","timestamp":1763343058043,"version":"3.45.0"},"reference-count":32,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063311","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:13:06Z","timestamp":1745208786000},"page":"5373-5391","source":"Crossref","is-referenced-by-count":0,"title":["LP-CRI: Label Propagation Immune Generation Algorithm Based on Clustering and Rebound Mechanism"],"prefix":"10.32604","volume":"83","author":[{"given":"Hao","family":"Huang","sequence":"first","affiliation":[]},{"given":"Kongyu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)","first-page":"237","article-title":"An improved artificial immune negative selection algorithm","author":"Zhou","year":"2022"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"100477","DOI":"10.1016\/j.swevo.2018.12.003","article-title":"A multi-objective immune algorithm with dynamic population strategy","volume":"50","author":"Lin","year":"2019","journal-title":"Swarm Evol Comput"},{"key":"ref3","first-page":"334","article-title":"Anomaly detection based on improved negative selection algorithm","volume":"25","author":"Wang","year":"2008","journal-title":"Comput Simulat"},{"journal-title":"Theory and application of immune evolution","year":"2008","author":"Yang","key":"ref4"},{"key":"ref5","first-page":"34","article-title":"Detection distribution method of v-detector based on grey wolf optimization","volume":"12","author":"Zheng","year":"2022","journal-title":"Intell Comput Applicat"},{"key":"ref6","first-page":"159","article-title":"Review of negative selection algorithms","volume":"34","author":"Jin","year":"2013","journal-title":"J Communicat"},{"key":"ref7","series-title":"Proceedings of 2016 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016)","first-page":"690","article-title":"An improved v-detector algorithm for wireless sensor network intrusion detection technology based on immune system principle","author":"Hao","year":"2016"},{"key":"ref8","series-title":"Proceedings of the 34th China Process Control Conference","first-page":"419","article-title":"Confidence learning based object detection label denoising","author":"Wu","year":"2023","journal-title":"State Key Laboratory of Industrial Control Technology, School of Control Science and Engineering"},{"key":"ref9","series-title":"Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy","first-page":"202","article-title":"Self-nonself discrimination in a computer","author":"Forrest","year":"1994"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/978-3-540-45192-1_25","article-title":"A randomized real-valued negative selection algorithm","volume":"2787","author":"Gonz\u00e1lez","year":"2003","journal-title":"Artif Immune Syst"},{"key":"ref11","first-page":"120","article-title":"Overview of immune algorithms","volume":"3","author":"Ge","year":"2002","journal-title":"J South China Normal Univ (Nat Sci Med Edit)"},{"key":"ref12","first-page":"22","article-title":"Comparison between immune algorithm and genetic algorithm","volume":"24","author":"Ge","year":"2003","journal-title":"J Jinan Univ (Nat Sci Med Edit)"},{"key":"ref13","unstructured":"Wang J. Research and implementation of intrusion detection technology based on artificial immune algorithm and neural network [master\u2019s thesis]. Lanzhou, China: Lanzhou Jiaotong University; 2022."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"100557","DOI":"10.1016\/j.cosrev.2023.100557","article-title":"Negative selection in anomaly detection\u2014a survey","volume":"48","author":"Praneet","year":"2023","journal-title":"Comput Sci Rev"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"456","DOI":"10.12720\/jait.13.5.456-461","article-title":"Gaainet: a generative adversarial artificial immune network model for intrusion detection in industrial IoT systems","volume":"13","author":"Sithungu","year":"2022","journal-title":"JAIT"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.engappai.2013.12.001","article-title":"Hybrid email spam detection model with negative selection algorithm and differential evolution","volume":"28","author":"Idris","year":"2014","journal-title":"Eng Appl Artif Intell"},{"key":"ref17","unstructured":"Kim J, Greensmith J, Twycross J, Aickelin U. Malicious code execution detection and response immune system inspired by the danger theory. 2010. doi:10.48550\/arXiv.1003.4142."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/11536444_12","article-title":"Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection","volume":"3627","author":"Greensmith","year":"2005","journal-title":"Artif Immune Syst"},{"key":"ref19","series-title":"Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation(GECCO \u201906)","first-page":"119","article-title":"Immune anomaly detection enhanced with evolutionary paradigms","author":"Ostaszewski","year":"2006"},{"key":"ref20","article-title":"An introduction to confident learning: finding and learning with label errors in datasets","author":"Northcutt","year":"2021","journal-title":"J Artif Intell Res (JAIR)"},{"key":"ref21","first-page":"31","article-title":"Transfer learning for selecting confidence pseudo labels","volume":"48","author":"Teng","year":"2024","journal-title":"J Jiangxi Normal Univ (Nat Sci Edit)"},{"key":"ref22","unstructured":"Ying D. Research on label propagation algorithm based on confidence evaluation and rollback mechanism and its application in network intrusion detection [master\u2019s thesis]. China: Sichuan University; 2021."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"11040","DOI":"10.3390\/app142311040","article-title":"Negative selection algorithm for unsupervised anomaly detection","volume":"14","author":"Bereta","year":"2024","journal-title":"Appl Sci"},{"key":"ref24","series-title":"2022 IEEE 5th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE)","first-page":"378","article-title":"Improved self-adaptive negative selection algorithm with double clustering for infrared target extraction","author":"Sun","year":"2022"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"3406","DOI":"10.1080\/03772063.2020.1768158","article-title":"An improved negative selection algorithm-based fault detection method","volume":"68","author":"Abid","year":"2022","journal-title":"IETE J Res"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"421","DOI":"10.35833\/MPCE.2021.000318","article-title":"Sampled value attack detection for busbar differential protection based on a negative selection immune system","volume":"11","author":"Mo","year":"2023","journal-title":"J Mod Power Syst Clean Energy"},{"key":"ref27","first-page":"1","article-title":"A survey of intrusion detection systems leveraging host data","volume":"52","author":"Bridges","year":"2019 Nov","journal-title":"Associat Comput Mach"},{"key":"ref28","first-page":"1996","article-title":"Intrusion detection based on improved triple network and k-nearest neighbor algorithm","volume":"41","author":"Wang","year":"2021","journal-title":"Comput Applicat"},{"key":"ref29","first-page":"46","article-title":"A review of the application of artificial immunity in intrusion detection","author":"Liang","year":"2023","journal-title":"Netw Secur Technol Applicat"},{"key":"ref30","first-page":"19","article-title":"Research and optimization of intrusion detection based on improved v-detector algorithm","volume":"20","author":"Jingsha","year":"2020","journal-title":"Inform Netw Secur"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"19821","DOI":"10.1007\/s00521-023-08783-8","article-title":"Fuzzy optimized v-detector algorithm on apache spark for class imbalance issue of intrusion detection in big data","volume":"35","author":"Ahlam","year":"2023","journal-title":"Neural Comput Appl"},{"key":"ref32","first-page":"3200","volume":"44","author":"Yang","year":"2011","journal-title":"Frontiers of manufacturing and design science, applied mechanics and materials"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63311\/TSP_CMC_63311.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:01Z","timestamp":1763342941000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063311","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}