{"id":"https://openalex.org/W4404178578","doi":"https://doi.org/10.1109/access.2024.3493955","title":"Analysis of Network Intrusion Detection Based on Semi-Supervised and SS-DGM","display_name":"Analysis of Network Intrusion Detection Based on Semi-Supervised and SS-DGM","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404178578","doi":"https://doi.org/10.1109/access.2024.3493955"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3493955","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2024.3493955","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dx.doi.org/10.1109/access.2024.3493955","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103893877","display_name":"Xiao Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiao Yu","raw_affiliation_strings":["State Grid Hubei Electric Power Research Institute, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Grid Hubei Electric Power Research Institute, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353167","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0001-7832-4935"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["State Grid Hubei Electric Power Research Institute, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Grid Hubei Electric Power Research Institute, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002948081","display_name":"Jie Wang","orcid":"https://orcid.org/0000-0001-9524-120X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jie Wang","raw_affiliation_strings":["State Grid Hubei Electric Power Research Institute, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Grid Hubei Electric Power Research Institute, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353167","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0001-7832-4935"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["State Grid Hubei Electric Power Research Institute, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Grid Hubei Electric Power Research Institute, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100345585","display_name":"Tian Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Tian","raw_affiliation_strings":["State Grid Hubei Electric Power Research Institute, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Grid Hubei Electric Power Research Institute, Wuhan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100425202","display_name":"Liang Zhou","orcid":"https://orcid.org/0000-0002-3471-9924"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["State Grid Hubei Electric Power Research Institute, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Grid Hubei Electric Power Research Institute, Wuhan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103893877"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.047,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79417266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"170148","last_page":"170160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9190999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9190999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7046762108802795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6731806993484497},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35715603828430176},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3271164298057556}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7046762108802795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6731806993484497},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35715603828430176},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3271164298057556}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3493955","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2024.3493955","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5748813997e841898f32af449e5ad143","is_oa":true,"landing_page_url":"https://doaj.org/article/5748813997e841898f32af449e5ad143","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 170148-170160 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3493955","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2024.3493955","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5699999928474426,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2033914206","https://openalex.org/W2042327336"],"abstract_inverted_index":{"The":[0,104,153],"rapid":[1],"advancement":[2],"of":[3,12,26,48,59,116,126,130,155,172,195,215],"technology":[4],"has":[5],"made":[6],"network":[7,27,37,42,50,91,127,157,173,216,226],"security":[8,227],"a":[9,89],"hot":[10],"topic":[11],"concern":[13],"for":[14,122,225],"researchers":[15],"worldwide.":[16],"Therefore,":[17],"to":[18,32,67,144],"improve":[19,68],"the":[20,46,55,69,75,109,112,156,163,192,196,205,210],"accuracy":[21,115,214],"and":[22,31,35,54,84,120,148,168,179,182,213,222],"real-time":[23],"response":[24],"capability":[25],"intrusion":[28,51,71,92,99,217],"detection":[29,52,72,93,100,177],"systems,":[30],"effectively":[33,208],"detect":[34,167],"analyze":[36],"attack":[38,57,158],"forms":[39],"in":[40],"complex":[41],"environments,":[43],"starting":[44],"from":[45,135],"drawbacks":[47],"existing":[49],"methods":[53],"vulnerable":[56],"modes":[58],"networks,":[60],"this":[61],"study":[62],"first":[63],"introduces":[64],"variational":[65],"auto-encoder":[66],"semi-supervised":[70,98],"algorithm.":[73,87],"Subsequently,":[74],"labeled":[76],"dataset":[77],"is":[78,102],"expanded":[79],"using":[80],"K-means":[81],"clustering":[82],"algorithm":[83,101],"collaborative":[85],"training":[86],"Finally,":[88],"novel":[90],"model":[94,110,165,198],"based":[95],"on":[96],"multi-level":[97],"proposed.":[103],"experimental":[105],"outcomes":[106],"denoted":[107],"that":[108,162],"achieved":[111],"highest":[113],"classification":[114,180],"93.08%,":[117],"92.12%,":[118],"91.22%,":[119],"96.38%":[121],"four":[123],"common":[124],"types":[125,171],"attacks:":[128],"denial":[129],"service":[131],"attacks,":[132,151,174],"unauthorized":[133,138],"access":[134,139],"remote":[136],"machines,":[137],"attacks":[140],"by":[141],"ordinary":[142],"users":[143],"local":[145],"superuser":[146],"privileges,":[147],"cross-site":[149],"scripting":[150],"respectively.":[152],"results":[154],"confusion":[159],"matrix":[160],"indicated":[161],"proposed":[164,197,206],"could":[166],"classify":[169],"all":[170,186],"with":[175],"excellent":[176],"applicability":[178],"efficiency,":[181],"its":[183],"scores":[184],"were":[185],"above":[187],"60":[188],"points.":[189],"In":[190],"addition,":[191],"running":[193],"time":[194],"was":[199],"only":[200],"25.64":[201],"seconds.":[202],"From":[203],"this,":[204],"method":[207],"improves":[209],"dynamic":[211],"adaptability":[212],"detection,":[218],"providing":[219],"an":[220],"efficient":[221],"accurate":[223],"solution":[224],"defense.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
