{"id":"https://openalex.org/W7117468852","doi":"https://doi.org/10.1109/access.2025.3649245","title":"AE-CNN Ensemble: A Novel Architecture for Effective Network Intrusion Detection and Classification","display_name":"AE-CNN Ensemble: A Novel Architecture for Effective Network Intrusion Detection and Classification","publication_year":2025,"publication_date":"2025-12-29","ids":{"openalex":"https://openalex.org/W7117468852","doi":"https://doi.org/10.1109/access.2025.3649245"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3649245","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649245","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3649245","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121503535","display_name":"Sresth Khaitan","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sresth Khaitan","raw_affiliation_strings":["School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":null,"display_name":"Islabudeen Mohamed Meerasha","orcid":"https://orcid.org/0000-0002-0811-450X"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Islabudeen Mohamed Meerasha","raw_affiliation_strings":["School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5121503535"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.3909,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88369536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"14","issue":null,"first_page":"1320","last_page":"1340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9539999961853027,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9539999961853027,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.007499999832361937,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.00419999985024333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5849000215530396},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5636000037193298},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5465999841690063},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5394999980926514},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5170999765396118},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.48980000615119934},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.48190000653266907},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45739999413490295},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.42879998683929443}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8508999943733215},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6187000274658203},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5849000215530396},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5636000037193298},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5465999841690063},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5394999980926514},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5317000150680542},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5170999765396118},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.48980000615119934},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.48190000653266907},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45739999413490295},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.42879998683929443},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4237000048160553},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.41909998655319214},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3700999915599823},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36329999566078186},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3564000129699707},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3474999964237213},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.29089999198913574},{"id":"https://openalex.org/C87335442","wikidata":"https://www.wikidata.org/wiki/Q2494345","display_name":"Local binary patterns","level":4,"score":0.28209999203681946},{"id":"https://openalex.org/C153668964","wikidata":"https://www.wikidata.org/wiki/Q27636","display_name":"Majority rule","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.258899986743927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3649245","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649245","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3649245","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649245","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W2076384720","https://openalex.org/W2189456526","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2789828921","https://openalex.org/W2883554196","https://openalex.org/W2892245210","https://openalex.org/W2896412072","https://openalex.org/W2926701059","https://openalex.org/W2955739827","https://openalex.org/W2984419450","https://openalex.org/W3005805195","https://openalex.org/W3006165800","https://openalex.org/W3010704846","https://openalex.org/W3011040471","https://openalex.org/W3168771234","https://openalex.org/W3197983285","https://openalex.org/W3207068952","https://openalex.org/W4200598604","https://openalex.org/W4220744793","https://openalex.org/W4291278258","https://openalex.org/W4295788744","https://openalex.org/W4300718585","https://openalex.org/W4309581904","https://openalex.org/W4313558385","https://openalex.org/W4313591247","https://openalex.org/W4320025779","https://openalex.org/W4378364737","https://openalex.org/W4383502028","https://openalex.org/W4387335033","https://openalex.org/W4387801760","https://openalex.org/W4388097684","https://openalex.org/W4390616416","https://openalex.org/W4390659333","https://openalex.org/W4390969835","https://openalex.org/W4391147310","https://openalex.org/W4396220530","https://openalex.org/W4399710185","https://openalex.org/W4401010346","https://openalex.org/W4401833791","https://openalex.org/W4402541423","https://openalex.org/W4402978866","https://openalex.org/W4412081755","https://openalex.org/W4415800671"],"related_works":[],"abstract_inverted_index":{"The":[0],"escalating":[1],"scale":[2],"and":[3,55,68,84,94,107,125,138,150,172,178,185,202],"sophistication":[4],"of":[5,60,154,187,192],"cyberattacks":[6],"pose":[7],"a":[8,29,44,56,207],"formidable":[9],"challenge":[10],"to":[11,22,24,51,87,205,222],"conventional":[12,146],"intrusion":[13,212],"detection":[14,213],"systems":[15],"(IDS)":[16],"because":[17],"they":[18],"lack":[19],"the":[20,132,152,190],"flexibility":[21],"adapt":[23],"evolving":[25],"threats.":[26],"We":[27,71,195],"propose":[28],"composite":[30],"deep":[31,156],"learning":[32,148,158],"architecture":[33],"that":[34,165,214],"integrates":[35],"an":[36],"autoencoder":[37],"(AE)":[38],"for":[39,113,210],"unsupervised":[40],"feature":[41,157],"compression":[42],"alongside":[43],"one-dimensional":[45],"(1D)":[46],"convolutional":[47,170],"neural":[48],"network":[49],"(CNN)":[50],"extract":[52],"local":[53],"patterns":[54],"soft":[57],"voting":[58],"ensemble":[59,160,173],"Support":[61],"Vector":[62],"Machine":[63],"(SVM),":[64],"Random":[65],"Forest":[66],"(RF),":[67],"XGBoost":[69],"classifiers.":[70],"test":[72],"our":[73,197],"approach":[74,99],"on":[75,104,110,199],"three":[76],"standard":[77],"benchmarks":[78,204],"\u2013":[79,86,168,174],"UNSW":[80,117],"NB15,":[81,118],"NSL":[82,114],"KDD,":[83],"CICIDS2017":[85],"illustrate":[88],"its":[89],"robustness":[90],"across":[91],"both":[92,200],"legacy":[93],"modern":[95,203],"attack":[96,224],"scenarios.":[97],"Our":[98],"achieves":[100],"99.81":[101],"%":[102,109,122,127,136,140],"accuracy":[103,124],"binary":[105,123,137],"classification":[106,112],"99.90":[108],"multi-class":[111,128,141],"KDD.":[115],"On":[116],"it":[119],"delivers":[120,215],"99.19":[121],"98.41":[126],"accuracy.":[129,142],"For":[130],"CICIDS2017,":[131],"model":[133,198],"attains":[134],"99.59":[135],"99.76":[139],"These":[143],"results":[144],"outperform":[145],"machine":[147],"baselines":[149],"confirm":[151],"benefit":[153],"combining":[155],"with":[159],"methods.":[161],"Ablation":[162],"studies":[163],"show":[164],"each":[166],"component":[167],"autoencoder,":[169],"network,":[171],"contributes":[175],"meaningful":[176],"gains,":[177],"statistical":[179],"tests,":[180],"including":[181],"paired":[182],"t":[183],"tests":[184],"analysis":[186],"variance,":[188],"validate":[189],"significance":[191],"these":[193],"improvements.":[194],"evaluate":[196],"classic":[201],"demonstrate":[206],"versatile":[208],"framework":[209],"real\u2011time":[211],"consistently":[216],"high":[217],"precision":[218],"while":[219],"adapting":[220],"smoothly":[221],"new":[223],"patterns.":[225]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-12-29T00:00:00"}
