{"id":"https://openalex.org/W3124180391","doi":"https://doi.org/10.1007/978-981-33-4922-3_10","title":"An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation","display_name":"An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3124180391","doi":"https://doi.org/10.1007/978-981-33-4922-3_10","mag":"3124180391"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-33-4922-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-33-4922-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_10.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_10.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101954688","display_name":"Jie Gu","orcid":"https://orcid.org/0000-0002-9753-269X"},"institutions":[{"id":"https://openalex.org/I187380120","display_name":"Agricultural Bank of China","ror":"https://ror.org/015g9sa94","country_code":"CN","type":"other","lineage":["https://openalex.org/I187380120"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Gu","raw_affiliation_strings":["Postdoctoral Research Station, Agricultural Bank of China, Beijing, 100005, China","School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871, China"],"affiliations":[{"raw_affiliation_string":"Postdoctoral Research Station, Agricultural Bank of China, Beijing, 100005, China","institution_ids":["https://openalex.org/I187380120"]},{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101954688"],"corresponding_institution_ids":["https://openalex.org/I187380120","https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.5731,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71531414,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"133","last_page":"140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8170374631881714},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.783509373664856},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5906641483306885},{"id":"https://openalex.org/keywords/logistic-regression","display_name":"Logistic regression","score":0.5827844142913818},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.560076892375946},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.548697829246521},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5062486529350281},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.4974072277545929},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49572527408599854},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4010716676712036},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08928513526916504}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8170374631881714},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.783509373664856},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5906641483306885},{"id":"https://openalex.org/C151956035","wikidata":"https://www.wikidata.org/wiki/Q1132755","display_name":"Logistic regression","level":2,"score":0.5827844142913818},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.560076892375946},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.548697829246521},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5062486529350281},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.4974072277545929},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49572527408599854},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4010716676712036},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08928513526916504},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-33-4922-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-33-4922-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_10.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-981-33-4922-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-33-4922-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_10.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2702356746","display_name":null,"funder_award_id":"61702","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4253300795","display_name":null,"funder_award_id":"61832001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4890695131","display_name":null,"funder_award_id":"61702016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8567895391","display_name":null,"funder_award_id":"72001222","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3124180391.pdf","grobid_xml":"https://content.openalex.org/works/W3124180391.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1591480890","https://openalex.org/W1963509088","https://openalex.org/W1985987493","https://openalex.org/W1993895874","https://openalex.org/W2006138711","https://openalex.org/W2028912451","https://openalex.org/W2042495914","https://openalex.org/W2043585727","https://openalex.org/W2067032582","https://openalex.org/W2077442291","https://openalex.org/W2099940443","https://openalex.org/W2101109743","https://openalex.org/W2341871820","https://openalex.org/W2552899443","https://openalex.org/W2904539465","https://openalex.org/W3006333400"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W4390569940","https://openalex.org/W2888392564","https://openalex.org/W4361193272","https://openalex.org/W4310278675","https://openalex.org/W4388422664","https://openalex.org/W2806259446","https://openalex.org/W2963326959","https://openalex.org/W4312407344","https://openalex.org/W2894289927"],"abstract_inverted_index":{"Abstract":[0],"Computer":[1],"network":[2,19],"is":[3,57,99,130,147,165],"playing":[4],"a":[5],"significantly":[6],"important":[7],"role":[8],"in":[9,107,185],"our":[10,178],"society,":[11],"including":[12],"commerce,":[13],"communication,":[14],"consumption":[15],"and":[16,67,86,94,143,158,172,191],"entertainment.":[17],"Therefore,":[18,106],"security":[20],"has":[21],"become":[22],"increasingly":[23],"important.":[24],"Intrusion":[25],"detection":[26,77,104,115,159,189],"systems":[27,78],"have":[28,68],"received":[29],"considerable":[30],"attention,":[31],"which":[32,62],"not":[33],"only":[34],"can":[35,43,63,181],"detect":[36,44],"known":[37],"attacks":[38],"or":[39],"intrusions,":[40],"but":[41],"also":[42],"unknown":[45],"attacks.":[46],"Among":[47],"the":[48,58,72,92,96,103,126,133,150,169,173],"various":[49],"methods":[50],"applied":[51,148],"to":[52,90,101,154,167],"intrusion":[53,76,114],"detection,":[54],"logistic":[55],"regression":[56,120,146],"most":[59],"widely":[60],"used,":[61],"achieve":[64,182],"good":[65,69,183],"performances":[66,184],"interpretability":[70],"at":[71],"same":[73],"time.":[74],"However,":[75],"usually":[79],"confront":[80],"with":[81,121,136],"data":[82,97,153],"of":[83,138,187],"large":[84],"scale":[85],"high":[87],"dimension.":[88],"How":[89],"reduce":[91],"dimension":[93,156],"improve":[95,102],"quality":[98],"significant":[100],"performances.":[105],"this":[108],"paper,":[109],"we":[110],"propose":[111],"an":[112],"effective":[113],"model":[116,160],"based":[117],"on":[118,132,149],"pls-logistic":[119,145],"feature":[122,127],"augmentation.":[123],"More":[124],"specifically,":[125],"augmentation":[128],"technique":[129],"implemented":[131],"original":[134],"features":[135],"goal":[137],"obtaining":[139],"high-qualified":[140],"training":[141],"data;":[142],"then,":[144],"newly":[151],"transformed":[152],"perform":[155],"reduction":[157],"building.":[161],"The":[162],"NSL-KDD":[163],"dataset":[164],"used":[166],"evaluate":[168],"proposed":[170,179],"method,":[171],"empirical":[174],"results":[175],"show":[176],"that":[177],"method":[180],"terms":[186],"accuracy,":[188],"rate":[190],"false":[192],"alarm":[193],"rate.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
