{"id":"https://openalex.org/W4378373487","doi":"https://doi.org/10.1109/access.2023.3280421","title":"AEC_GAN: Unbalanced Data Processing Decision-Making in Network Attacks Based on ACGAN and Machine Learning","display_name":"AEC_GAN: Unbalanced Data Processing Decision-Making in Network Attacks Based on ACGAN and Machine Learning","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4378373487","doi":"https://doi.org/10.1109/access.2023.3280421"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3280421","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3280421","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10136726.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10136726.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001550899","display_name":"Naibo Zhu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Naibo Zhu","raw_affiliation_strings":["Unit 32801 of the Chinese People&#x2019;s Liberation Army, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Unit 32801 of the Chinese People&#x2019;s Liberation Army, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024092438","display_name":"Guangyu Zhao","orcid":"https://orcid.org/0000-0001-9892-5316"},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangyu Zhao","raw_affiliation_strings":["School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun, China","institution_ids":["https://openalex.org/I106645853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100397650","display_name":"Yang Yang","orcid":"https://orcid.org/0000-0002-6511-3079"},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Yang","raw_affiliation_strings":["School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun, China","institution_ids":["https://openalex.org/I106645853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101540636","display_name":"Han Yang","orcid":"https://orcid.org/0000-0002-3263-6498"},"institutions":[{"id":"https://openalex.org/I4210103679","display_name":"Beijing Emergency Medical Center","ror":"https://ror.org/018zkg706","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210103679"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Yang","raw_affiliation_strings":["Beijing Engineering Research Center of Emergency Survival Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Engineering Research Center of Emergency Survival Security, Beijing, China","institution_ids":["https://openalex.org/I4210103679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100382302","display_name":"Zhi Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Liu","raw_affiliation_strings":["School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun, China","National and Local Joint Engineering Research Center for Space Optoelectronics Technology, Changchun, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun, China","institution_ids":["https://openalex.org/I106645853"]},{"raw_affiliation_string":"National and Local Joint Engineering Research Center for Space Optoelectronics Technology, Changchun, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001550899"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.4004,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.81884311,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8101507425308228},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6223362684249878},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6038392186164856},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5730224251747131},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.5528138875961304},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5451412200927734},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5356826782226562},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.512992799282074},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.47232478857040405},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45296525955200195},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.445418119430542},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.4254075586795807},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2929791808128357},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.2369047999382019},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09608924388885498},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.08769825100898743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8101507425308228},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6223362684249878},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6038392186164856},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5730224251747131},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.5528138875961304},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5451412200927734},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5356826782226562},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.512992799282074},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.47232478857040405},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45296525955200195},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.445418119430542},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.4254075586795807},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2929791808128357},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2369047999382019},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09608924388885498},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.08769825100898743},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3280421","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3280421","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10136726.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a8e0ad0697254366a9a0b32d4548ac53","is_oa":true,"landing_page_url":"https://doaj.org/article/a8e0ad0697254366a9a0b32d4548ac53","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 52452-52465 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3280421","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3280421","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10136726.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1376607251","display_name":null,"funder_award_id":"U2141231","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322174","display_name":"People's Government of Jilin Province","ror":"https://ror.org/02fzqav45"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4378373487.pdf","grobid_xml":"https://content.openalex.org/works/W4378373487.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W2099940443","https://openalex.org/W2527999453","https://openalex.org/W2762776925","https://openalex.org/W2783741806","https://openalex.org/W2789420469","https://openalex.org/W2793241948","https://openalex.org/W2887670553","https://openalex.org/W2889165715","https://openalex.org/W2891214000","https://openalex.org/W2921453769","https://openalex.org/W2950776302","https://openalex.org/W2959392253","https://openalex.org/W2961396908","https://openalex.org/W2963684088","https://openalex.org/W2965481252","https://openalex.org/W2979563069","https://openalex.org/W3131088496","https://openalex.org/W3156522613","https://openalex.org/W3214373139","https://openalex.org/W4298289240","https://openalex.org/W6631190155","https://openalex.org/W6637568146","https://openalex.org/W6685352114","https://openalex.org/W6729482032"],"related_works":["https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Using":[0],"deep":[1],"learning":[2,5],"and":[3,54,64,77,83,142,196,199,212,230],"machine":[4],"techniques":[6],"for":[7,15,105,160],"network":[8,21,80,111,162],"intrusion":[9,81,112,130],"detection":[10,65,113,131],"is":[11,200],"of":[12,20,27,36,60,71,74,86,92,156,186,202,207],"great":[13],"significance":[14],"enhancing":[16],"the":[17,25,33,40,58,69,87,90,129,144,154,157,166,184],"defense":[18,231],"capability":[19],"security":[22],"systems.":[23],"Given":[24],"characteristics":[26],"generative":[28,119],"adversarial":[29,120],"networks,":[30],"such":[31],"as":[32,223],"approximate":[34],"consistency":[35],"generated":[37,158],"samples":[38,159,211],"with":[39,45,128],"input":[41],"data":[42,75,100,123,135,164,215],"distribution":[43,48,216],"but":[44],"a":[46,50,110,204,224],"random":[47],"within":[49],"certain":[51],"bounded":[52],"interval,":[53],"in":[55,79,84,191],"response":[56],"to":[57],"problem":[59],"insufficient":[61],"classification":[62,94,148,173],"performance":[63,174],"omission":[66],"caused":[67],"by":[68,146],"imbalance":[70],"different":[72],"degrees":[73],"categories":[76,140],"quantities":[78],"traffic,":[82],"light":[85],"fact":[88],"that":[89,153,183],"effectiveness":[91],"existing":[93],"algorithms":[95],"based":[96,115,217],"on":[97,116,218],"unbalanced":[98,161],"traffic":[99,163],"still":[101],"has":[102,226],"some":[103],"room":[104],"improvement,":[106],"this":[107,187],"paper":[108,188],"proposes":[109],"strategy":[114,185],"auxiliary":[117],"classifier":[118],"networks.":[121],"The":[122,134,150,180,221],"expansion":[124,145,155],"experiments":[125,177],"are":[126,136,178],"conducted":[127],"dataset":[132],"NSL-KDD.":[133],"classified":[137],"into":[138],"twenty-three":[139],"before":[141],"after":[143],"binary":[147],"validation.":[149],"results":[151,181],"show":[152],"improve":[165],"subsequent":[167],"recognition":[168],"effect":[169],"significantly.":[170],"Finally,":[171],"five":[172],"index":[175],"verification":[176],"conducted.":[179],"prove":[182],"performs":[189],"better":[190],"accuracy,":[192],"precision,":[193],"recall":[194],"rate":[195],"F-value":[197],"indexes,":[198],"capable":[201],"obtaining":[203],"large":[205],"number":[206],"features":[208],"from":[209],"limited":[210],"inferring":[213],"complete":[214],"fewer":[219],"features.":[220],"model":[222],"whole":[225],"stronger":[227],"generalization":[228],"ability":[229],"effect.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
