{"id":"https://openalex.org/W2766882809","doi":"https://doi.org/10.1093/comjnl/bxx101","title":"An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection","display_name":"An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection","publication_year":2017,"publication_date":"2017-10-10","ids":{"openalex":"https://openalex.org/W2766882809","doi":"https://doi.org/10.1093/comjnl/bxx101","mag":"2766882809"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxx101","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx101","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103128220","display_name":"Yanping Shen","orcid":"https://orcid.org/0000-0001-7581-9203"},"institutions":[{"id":"https://openalex.org/I4210098369","display_name":"Institute of Disaster Prevention","ror":"https://ror.org/00pyv1r78","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210098369","https://openalex.org/I90149893"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanping Shen","raw_affiliation_strings":["Department of Disaster Information Engineering, Institute of Disaster Prevention, Beijing, China","School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Disaster Information Engineering, Institute of Disaster Prevention, Beijing, China","institution_ids":["https://openalex.org/I4210098369"]},{"raw_affiliation_string":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101644259","display_name":"Kangfeng Zheng","orcid":"https://orcid.org/0000-0001-8405-1726"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kangfeng Zheng","raw_affiliation_strings":["School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047996469","display_name":"Chunhua Wu","orcid":"https://orcid.org/0000-0003-0535-6236"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunhua Wu","raw_affiliation_strings":["School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077290356","display_name":"Mingwu Zhang","orcid":"https://orcid.org/0000-0001-8551-8826"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwu Zhang","raw_affiliation_strings":["School of Computers, Hubei University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computers, Hubei University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103099146","display_name":"Xinxin Niu","orcid":"https://orcid.org/0000-0002-8143-0189"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinxin Niu","raw_affiliation_strings":["School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071134614","display_name":"Yixian Yang","orcid":"https://orcid.org/0000-0001-8067-4774"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixian Yang","raw_affiliation_strings":["School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103128220"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4210098369"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":1.9502,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.89722901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"61","issue":"4","first_page":"526","last_page":"538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12676","display_name":"Machine Learning and ELM","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12676","display_name":"Machine Learning and ELM","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10773","display_name":"Extracellular vesicles in disease","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7983036637306213},{"id":"https://openalex.org/keywords/extreme-learning-machine","display_name":"Extreme learning machine","score":0.6572303771972656},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.6414741277694702},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.6139232516288757},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6128343343734741},{"id":"https://openalex.org/keywords/random-subspace-method","display_name":"Random subspace method","score":0.5948494076728821},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5891836881637573},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5683175325393677},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5132400989532471},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5020482540130615},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5003511905670166},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4815521538257599},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3863258957862854},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3718150854110718},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.12897679209709167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7983036637306213},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.6572303771972656},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.6414741277694702},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.6139232516288757},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6128343343734741},{"id":"https://openalex.org/C106135958","wikidata":"https://www.wikidata.org/wiki/Q7291993","display_name":"Random subspace method","level":3,"score":0.5948494076728821},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5891836881637573},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5683175325393677},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5132400989532471},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5020482540130615},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5003511905670166},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4815521538257599},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3863258957862854},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3718150854110718},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.12897679209709167},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxx101","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx101","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1823320334","https://openalex.org/W1974102697","https://openalex.org/W1996799478","https://openalex.org/W2024518622","https://openalex.org/W2038705219","https://openalex.org/W2056243682","https://openalex.org/W2073678701","https://openalex.org/W2074553104","https://openalex.org/W2076384720","https://openalex.org/W2084496302","https://openalex.org/W2100128988","https://openalex.org/W2100537916","https://openalex.org/W2101112476","https://openalex.org/W2108142795","https://openalex.org/W2111072639","https://openalex.org/W2113242816","https://openalex.org/W2138260443","https://openalex.org/W2150757437","https://openalex.org/W2190312883","https://openalex.org/W2191006491","https://openalex.org/W2279833412","https://openalex.org/W2326324325","https://openalex.org/W2432038293","https://openalex.org/W2592503505","https://openalex.org/W3105346980","https://openalex.org/W6701537683"],"related_works":["https://openalex.org/W2007593166","https://openalex.org/W1603777065","https://openalex.org/W2143234973","https://openalex.org/W2397292208","https://openalex.org/W4221136059","https://openalex.org/W1548677759","https://openalex.org/W1981866886","https://openalex.org/W109131529","https://openalex.org/W2052615004","https://openalex.org/W2595439317"],"abstract_inverted_index":{"Machine":[0],"learning":[1,60],"plays":[2],"an":[3,16,50,58,74,97,106,150,187],"important":[4],"role":[5],"in":[6,24,42,56,101,166,186],"constructing":[7],"intrusion":[8,188],"detection":[9,189],"models.":[10],"However,":[11],"the":[12,21,28,33,66,71,80,92,102,113,123,126,133,142,147,162,167,169],"information":[13],"era":[14,17],"is":[15,39,63,84,99],"of":[18,30,35,96,125,149],"data.":[19],"With":[20],"continuous":[22],"increase":[23],"data":[25,31],"size":[26],"and":[27,94,116,144],"growth":[29],"dimensions,":[32],"ability":[34],"a":[36,87],"single":[37],"classifier":[38,108],"becoming":[40],"limited":[41],"predicting":[43],"samples.":[44],"In":[45],"this":[46],"paper,":[47],"we":[48],"present":[49],"ensemble":[51,72,75,98,134],"method":[52,77,135],"using":[53],"random":[54,138],"subspace":[55,139],"which":[57],"extreme":[59],"machine":[61],"(ELM)":[62],"chosen":[64],"as":[65],"base":[67],"classifier.":[68],"To":[69],"optimize":[70],"model,":[73],"pruning":[76,170],"based":[78,90,136],"on":[79,91,137],"bat":[81],"algorithm":[82],"(BA)":[83],"proposed.":[85],"Meanwhile,":[86],"fitness":[88],"function":[89],"accuracy":[93,143],"diversity":[95],"defined":[100],"BA":[103],"to":[104,121],"obtain":[105],"improved":[107],"subset.":[109],"Three":[110],"public":[111],"datasets,":[112,118],"KDD99,":[114],"NSL":[115],"Kyoto":[117],"are":[119,164],"adopted":[120],"assess":[122],"robustness":[124,145],"method.":[127],"The":[128,153],"empirical":[129],"results":[130,154],"indicate":[131],"that":[132,157],"can":[140,172],"improve":[141],"over":[146],"use":[148],"individual":[151],"ELM.":[152],"also":[155,181],"show":[156],"compared":[158],"with":[159],"when":[160],"all":[161],"sub-classifiers":[163],"used":[165],"ensemble,":[168],"framework":[171],"not":[173],"only":[174],"achieve":[175],"comparable":[176],"or":[177],"better":[178],"performance":[179],"but":[180],"save":[182],"substantial":[183],"computing":[184],"resources":[185],"system":[190],"(IDS).":[191]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
