{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:02:29Z","timestamp":1771848149803,"version":"3.50.1"},"reference-count":31,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068599","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T07:59:53Z","timestamp":1757318393000},"page":"3457-3484","source":"Crossref","is-referenced-by-count":1,"title":["An Auto Encoder-Enhanced Stacked Ensemble for Intrusion Detection in Healthcare Networks"],"prefix":"10.32604","volume":"85","author":[{"given":"Fatma S.","family":"Alrayes","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Zakariah","sequence":"additional","affiliation":[]},{"given":"Mohammed K.","family":"Alzaylaee","sequence":"additional","affiliation":[]},{"given":"Syed Umar","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Zafar Iqbal","family":"Khan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"102060","DOI":"10.1016\/j.inffus.2023.102060","article-title":"Insights into Internet of Medical Things (IoMT): data fusion, security issues and potential solutions","volume":"102","author":"Ahmed","year":"2024","journal-title":"Inf Fusion"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"4267","DOI":"10.1038\/s41598-025-88243-6","article-title":"Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks","volume":"15","author":"Attack","year":"2025","journal-title":"Sci Rep"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2987","DOI":"10.3390\/s21092987","article-title":"A multi-layer classification approach for intrusion detection in IoT networks based on deep learning","volume":"21","author":"Qaddoura","year":"2021","journal-title":"Sensors"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1111\/coin.12433","article-title":"An adapting soft computing model for intrusion detection system","volume":"38","author":"Alsaadi","year":"2022","journal-title":"Comput Intell"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","article-title":"Anomaly-based intrusion detection system for IoT networks through deep learning model","volume":"99","author":"Saba","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s10922-023-09767-8","article-title":"Deep learning based hybrid intrusion detection systems to protect satellite networks","volume":"31","author":"Azar","year":"2023","journal-title":"J Netw Syst Manag"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s10462-023-10662-6","article-title":"Autoencoders and their applications in machine learning: a survey","volume":"57","author":"Berahmand","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"30360","DOI":"10.1038\/s41598-024-80581-1","article-title":"Enhanced IoMT security framework using group teaching optimized auto-encoder for intrusion detection","volume":"14","author":"Manoharan","year":"2024","journal-title":"Sci Rep"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"9247","DOI":"10.3390\/s23229247","article-title":"An adaptive intrusion detection system in the internet of medical things using fuzzy-based learning","volume":"23","author":"Alalhareth","year":"2023","journal-title":"Sensors"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"5937","DOI":"10.3390\/s24185937","article-title":"Enhancing cybersecurity in healthcare: evaluating ensemble learning models for intrusion detection in the Internet of Medical Things","volume":"24","author":"Alsolami","year":"2024","journal-title":"Sensors"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"Vishwakarma M, Kesswani N. A Transfer Learning based Intrusion detection system for Internet of Things [Internet]. PREPRINT (Version 1). 2023 May 22 [cited 2025 Jul 10]. Available from: 10.21203\/rs.3.rs-2930837\/v1.","DOI":"10.21203\/rs.3.rs-2930837\/v1"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2376983","DOI":"10.1080\/08839514.2024.2376983","article-title":"A generalized and robust nonlinear approach based on machine learning for intrusion detection","volume":"38","author":"Rahman","year":"2024","journal-title":"Appl Artif Intell"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.aej.2024.11.016","article-title":"Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics","volume":"113","author":"Alamro","year":"2025","journal-title":"Alex Eng J"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"5712","DOI":"10.3390\/s24175712","article-title":"Optimized intrusion detection for IoMT networks with tree-based machine learning and filter-based feature selection","volume":"24","author":"Balhareth","year":"2024","journal-title":"Sensors"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"624","DOI":"10.3390\/s25030624","article-title":"Stacking ensemble deep learning for real-time intrusion detection in IoMT environments","volume":"25","author":"Alalwany","year":"2025","journal-title":"Sensors"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"152482","DOI":"10.1109\/ACCESS.2024.3480011","article-title":"Enhanced multigrained scanning-based deep stacking network for intrusion detection in IoMT networks","volume":"12","author":"Musikawan","year":"2024","journal-title":"IEEE Access"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"550","DOI":"10.3390\/a17120550","article-title":"Enhancing intrusion detection systems with dimensionality reduction and multi-stacking ensemble techniques","volume":"17","author":"Alsaffar","year":"2024","journal-title":"Algorithms"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"102659","DOI":"10.1016\/j.rineng.2024.102659","article-title":"An RFE\/Ridge-ML\/DL based anomaly intrusion detection approach for securing IoMT system","volume":"23","author":"Lazrek","year":"2024","journal-title":"Results Eng"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","article-title":"Intrusion detection system for healthcare systems using medical and network data: a comparison study","volume":"8","author":"Hady","year":"2020","journal-title":"IEEE Access"},{"key":"ref20","series-title":"Proceedings of the 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence); 2021 Jan 28\u201329","first-page":"643","article-title":"Stacked autoencoder based intrusion detection system using one-class classification","author":"Gupta"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"149","DOI":"10.2478\/jaiscr-2022-0010","article-title":"An autoencoder-enhanced stacking neural network model for increasing the performance of intrusion detection","volume":"12","author":"Brunner","year":"2021","journal-title":"J Artif Intell Soft Comput Res"},{"key":"ref22","series-title":"Proceedings of the 2020 5th International Conference on Devices, Circuits and Systems (ICDCS); 2020 Mar 5\u20136","first-page":"101","article-title":"Internet of Medical Things (IoMT)\u2014an overview","author":"Vishnu"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10922-022-09698-w","article-title":"Network intrusion detection system based on an adversarial auto-encoder with few labeled training samples","volume":"31","author":"Shiomoto","year":"2023","journal-title":"J Netw Syst Manag"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"102499","DOI":"10.1016\/j.cose.2021.102499","article-title":"CSE-IDS: using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems","volume":"112","author":"Gupta","year":"2022","journal-title":"Comput Secur"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"108156","DOI":"10.1016\/j.compeleceng.2022.108156","article-title":"Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system","volume":"102","author":"Ravi","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1186\/s13634-022-00871-6","article-title":"Intrusion detection system combined enhanced random forest with SMOTE algorithm","volume":"2022","author":"Wu","year":"2022","journal-title":"EURASIP J Adv Signal Process"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.aej.2023.07.063","article-title":"An effective technique for detecting minority attacks in NIDS using deep learning and sampling approach","volume":"78","author":"Harini","year":"2023","journal-title":"Alex Eng J"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","article-title":"A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework","volume":"199","author":"Kasongo","year":"2023","journal-title":"Comput Commun"},{"key":"ref29","first-page":"99","author":"Selvakumar","year":"2021","journal-title":"Deep learning for security and privacy preservation in IoT"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.29130\/dubited.737211","article-title":"A stacking ensemble learning approach for intrusion detection system","volume":"9","author":"U\u00e7ar","year":"2021","journal-title":"D\u00fczce \u00dcniversitesi Bilim Ve Teknol Derg"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"103144","DOI":"10.1016\/j.cose.2023.103144","article-title":"An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model","volume":"128","author":"Zhang","year":"2023","journal-title":"Comput Secur"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_68599\/TSP_CMC_68599.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:44Z","timestamp":1764826544000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068599","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}