{"id":"https://openalex.org/W4415174396","doi":"https://doi.org/10.1002/spy2.70117","title":"Intrusion Detection Model Based on Multi\u2010Kernel Approximation and Deep Neural Network","display_name":"Intrusion Detection Model Based on Multi\u2010Kernel Approximation and Deep Neural Network","publication_year":2025,"publication_date":"2025-10-13","ids":{"openalex":"https://openalex.org/W4415174396","doi":"https://doi.org/10.1002/spy2.70117"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70117","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70117","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082666522","display_name":"Yukun Wu","orcid":"https://orcid.org/0000-0003-1846-8616"},"institutions":[{"id":"https://openalex.org/I4210125098","display_name":"Hangzhou Vocational and Technical College","ror":"https://ror.org/03jjm4b17","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125098"]},{"id":"https://openalex.org/I4210163926","display_name":"Zhejiang Medicine (China)","ror":"https://ror.org/05h86nk22","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210163926"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yukun Wu","raw_affiliation_strings":["Hangzhou Vocational &amp; Technical College  Hangzhou China","Zhejiang Anteng Information Technology Co., Ltd  Shaoxing China"],"raw_orcid":"https://orcid.org/0000-0003-1846-8616","affiliations":[{"raw_affiliation_string":"Hangzhou Vocational &amp; Technical College  Hangzhou China","institution_ids":["https://openalex.org/I4210125098"]},{"raw_affiliation_string":"Zhejiang Anteng Information Technology Co., Ltd  Shaoxing China","institution_ids":["https://openalex.org/I4210163926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100712362","display_name":"Hui Li","orcid":"https://orcid.org/0000-0002-3800-5435"},"institutions":[{"id":"https://openalex.org/I4210163926","display_name":"Zhejiang Medicine (China)","ror":"https://ror.org/05h86nk22","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210163926"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["Zhejiang Anteng Information Technology Co., Ltd  Shaoxing China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhejiang Anteng Information Technology Co., Ltd  Shaoxing China","institution_ids":["https://openalex.org/I4210163926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028542998","display_name":"Yunzhi Chen","orcid":"https://orcid.org/0000-0002-1590-4796"},"institutions":[{"id":"https://openalex.org/I4210125098","display_name":"Hangzhou Vocational and Technical College","ror":"https://ror.org/03jjm4b17","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125098"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunzhi Chen","raw_affiliation_strings":["Hangzhou Vocational &amp; Technical College  Hangzhou China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Hangzhou Vocational &amp; Technical College  Hangzhou China","institution_ids":["https://openalex.org/I4210125098"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024194639","display_name":"Wei William Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei William Lee","raw_affiliation_strings":["College of Computer Science and Technology Zhejiang University of Technology  Hangzhou China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology Zhejiang University of Technology  Hangzhou China","institution_ids":["https://openalex.org/I55712492"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028542998"],"corresponding_institution_ids":["https://openalex.org/I4210125098"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32793534,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.6804999709129333},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6614999771118164},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6363999843597412},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6345000267028809},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6096000075340271},{"id":"https://openalex.org/keywords/rate-of-convergence","display_name":"Rate of convergence","score":0.4970000088214874},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.4562000036239624},{"id":"https://openalex.org/keywords/stochastic-gradient-descent","display_name":"Stochastic gradient descent","score":0.41499999165534973},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.388700008392334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7111999988555908},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.6804999709129333},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6614999771118164},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6363999843597412},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6345000267028809},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6096000075340271},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5985999703407288},{"id":"https://openalex.org/C57869625","wikidata":"https://www.wikidata.org/wiki/Q1783502","display_name":"Rate of convergence","level":3,"score":0.4970000088214874},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.492000013589859},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.4562000036239624},{"id":"https://openalex.org/C206688291","wikidata":"https://www.wikidata.org/wiki/Q7617819","display_name":"Stochastic gradient descent","level":3,"score":0.41499999165534973},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.388700008392334},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.3869999945163727},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.3772999942302704},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.37139999866485596},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3686999976634979},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.3531999886035919},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.3506999909877777},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.335099995136261},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.32919999957084656},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3149000108242035},{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.29649999737739563},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2847999930381775},{"id":"https://openalex.org/C81184566","wikidata":"https://www.wikidata.org/wiki/Q1191895","display_name":"Conjugate gradient method","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C5465570","wikidata":"https://www.wikidata.org/wiki/Q5326898","display_name":"Early stopping","level":3,"score":0.2653000056743622},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C148764684","wikidata":"https://www.wikidata.org/wiki/Q621751","display_name":"Approximation algorithm","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2554999887943268}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70117","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70117","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W949399104","https://openalex.org/W1945125930","https://openalex.org/W1980775965","https://openalex.org/W1990470142","https://openalex.org/W2019024625","https://openalex.org/W2034855704","https://openalex.org/W2046862341","https://openalex.org/W2078749591","https://openalex.org/W2100537916","https://openalex.org/W2137055149","https://openalex.org/W2144902422","https://openalex.org/W2171855237","https://openalex.org/W2512144135","https://openalex.org/W2534449777","https://openalex.org/W2557729498","https://openalex.org/W2732560875","https://openalex.org/W2743943492","https://openalex.org/W2762776925","https://openalex.org/W2791891314","https://openalex.org/W2902805725","https://openalex.org/W2911264084","https://openalex.org/W2996766209","https://openalex.org/W2996798951","https://openalex.org/W3004387475","https://openalex.org/W3009992816","https://openalex.org/W3020434223","https://openalex.org/W3022218140","https://openalex.org/W3042715689","https://openalex.org/W3087849800","https://openalex.org/W3094686023","https://openalex.org/W3119802848","https://openalex.org/W3136238191","https://openalex.org/W3197213531","https://openalex.org/W3202571956","https://openalex.org/W3216835679","https://openalex.org/W4200094870","https://openalex.org/W4205139417","https://openalex.org/W4211022908","https://openalex.org/W4226462449","https://openalex.org/W4250589301","https://openalex.org/W4292973360","https://openalex.org/W4295916112","https://openalex.org/W4312648203","https://openalex.org/W4313558385","https://openalex.org/W4372311864","https://openalex.org/W4385741175","https://openalex.org/W4388188747","https://openalex.org/W4396841887"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Aiming":[1],"to":[2,50,69,84,100,115,124],"address":[3],"the":[4,59,64,71,78,87,90,111,135,142,146,167,191,205],"problems":[5],"of":[6,66,74,89,145,157,184,190,204],"low":[7],"time":[8,231],"efficiency":[9],"and":[10,41,54,119,162,164,181,222],"poor":[11],"generalization":[12],"ability":[13],"in":[14,139,194],"support":[15],"vector":[16],"machine":[17],"(SVM)":[18],"models":[19,170,183],"when":[20,225],"dealing":[21],"with":[22,166,202],"large\u2010scale":[23,30,106,227],"network":[24,39],"intrusions,":[25],"this":[26,195],"paper":[27,62,196],"suggests":[28],"a":[29],"robust":[31],"intrusion":[32,154,208],"detection":[33,155,209],"model":[34,109,149,192,217],"that":[35,203,215],"combines":[36],"deep":[37],"neural":[38,117],"(DNN)":[40],"multi\u2010kernel":[42,67,93,120],"approximate":[43],"SVM.":[44],"The":[45,61,92,108,126,187,211],"DNN":[46],"conducts":[47],"representation":[48],"learning":[49,68,169],"extract":[51],"intrinsic":[52],"features":[53,76,99],"performs":[55],"dimensionality":[56],"reduction":[57],"on":[58,152],"dataset.":[60],"leverages":[63],"capability":[65],"accommodate":[70],"distinct":[72],"characteristics":[73],"various":[75],"within":[77],"input":[79],"space.":[80],"Additionally,":[81],"it":[82],"aims":[83],"further":[85],"improve":[86],"robustness":[88,224],"model.":[91,147],"approximation":[94,103],"SVM":[95,121,182],"using":[96],"random":[97],"Fourier":[98],"perform":[101],"kernel":[102],"can":[104,130],"handle":[105],"datasets.":[107],"employs":[110],"gradient":[112,127,173],"descent":[113,128],"method":[114],"train":[116],"networks":[118],"from":[122],"start":[123],"finish.":[125],"algorithm":[129],"effectively":[131],"maximize":[132],"convergence":[133],"toward":[134],"global":[136],"minimum.":[137],"This,":[138],"turn,":[140],"enhances":[141],"overall":[143],"accuracy":[144,188],"Our":[148],"was":[150],"tested":[151],"three":[153],"datasets":[156,228],"varying":[158],"scales:":[159],"UNSW\u2010NB15,":[160],"CIC\u2010IDS2017,":[161],"CIC\u2010IDS2018;":[163],"compared":[165,201],"latest":[168],"such":[171],"as":[172],"boosting":[174],"tree,":[175],"CNN,":[176],"LSTM,":[177],"GNN,":[178],"transfer":[179],"learning,":[180],"different":[185],"variants.":[186],"rate":[189],"proposed":[193],"has":[197,218],"increased":[198],"by":[199],"1%\u20134%":[200],"currently":[206],"popular":[207],"models.":[210],"experimental":[212],"findings":[213],"show":[214],"our":[216],"higher":[219],"classification":[220],"performance":[221],"better":[223],"processing":[226],"while":[229],"reducing":[230],"complexity.":[232]},"counts_by_year":[],"updated_date":"2025-11-19T23:35:23.961156","created_date":"2025-10-15T00:00:00"}
