{"id":"https://openalex.org/W7147139332","doi":"https://doi.org/10.1109/cnml68938.2026.11452400","title":"Intrusion Detection System Based on Tree-Structured Convolutional Neural Networks","display_name":"Intrusion Detection System Based on Tree-Structured Convolutional Neural Networks","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147139332","doi":"https://doi.org/10.1109/cnml68938.2026.11452400"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11452400","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078942219","display_name":"Yuntao Hu","orcid":"https://orcid.org/0000-0002-2409-9821"},"institutions":[{"id":"https://openalex.org/I91125648","display_name":"Wuhan Institute of Technology","ror":"https://ror.org/04jcykh16","country_code":"CN","type":"education","lineage":["https://openalex.org/I91125648"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanqian Hu","raw_affiliation_strings":["Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China","institution_ids":["https://openalex.org/I91125648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101570416","display_name":"Nan Xu","orcid":"https://orcid.org/0000-0001-6739-3468"},"institutions":[{"id":"https://openalex.org/I91125648","display_name":"Wuhan Institute of Technology","ror":"https://ror.org/04jcykh16","country_code":"CN","type":"education","lineage":["https://openalex.org/I91125648"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Xu","raw_affiliation_strings":["Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China","institution_ids":["https://openalex.org/I91125648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132603835","display_name":"Guochen Wen","orcid":null},"institutions":[{"id":"https://openalex.org/I91125648","display_name":"Wuhan Institute of Technology","ror":"https://ror.org/04jcykh16","country_code":"CN","type":"education","lineage":["https://openalex.org/I91125648"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guochen Wen","raw_affiliation_strings":["Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China","institution_ids":["https://openalex.org/I91125648"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109116199","display_name":"Kuang Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I91125648","display_name":"Wuhan Institute of Technology","ror":"https://ror.org/04jcykh16","country_code":"CN","type":"education","lineage":["https://openalex.org/I91125648"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunjie Sun","raw_affiliation_strings":["Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"Wuhan Institute of Technology,School of Electrical and Information,Wuhan,China","institution_ids":["https://openalex.org/I91125648"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078942219"],"corresponding_institution_ids":["https://openalex.org/I91125648"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.93857954,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"314","last_page":"317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8220000267028809,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8220000267028809,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.010099999606609344,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.006599999964237213,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7307000160217285},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.6664000153541565},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5976999998092651},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4796999990940094},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.45489999651908875},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4316999912261963},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4180000126361847},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4146000146865845}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7723000049591064},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7307000160217285},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6664000153541565},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5976999998092651},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5663999915122986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5388000011444092},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4796999990940094},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45489999651908875},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4316999912261963},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4180000126361847},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4146000146865845},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39070001244544983},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.3700000047683716},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3671000003814697},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.3628000020980835},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34450000524520874},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2535000145435333},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11452400","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452400","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4231316149234772,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2335999708","https://openalex.org/W2985572930","https://openalex.org/W3016229946","https://openalex.org/W3082065751","https://openalex.org/W3195575042","https://openalex.org/W4411175473"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,8,61,72,78,92,106,112,128,159],"rapid":[2],"development":[3],"of":[4,10,84,94,108,135,150,161],"internet":[5],"technologies":[6],"and":[7,29,43,81,86,97,138,141,156],"popularization":[9],"network":[11,13,21,55,65,162],"applications,":[12],"security":[14],"issues":[15],"have":[16],"become":[17],"increasingly":[18],"severe.":[19],"Traditional":[20],"attack":[22,45,56,117,122],"detection":[23,31,57,113,136,145],"systems":[24],"rely":[25],"on":[26,60],"feature":[27],"extraction":[28],"rule-based":[30],"mechanisms,":[32],"making":[33],"it":[34,87,142],"difficult":[35],"for":[36,115,147],"them":[37],"to":[38,41],"effectively":[39,104],"respond":[40],"complex":[42,98],"dynamic":[44],"behaviors.":[46],"To":[47],"address":[48],"this":[49,51],"issue,":[50],"study":[52],"proposes":[53],"a":[54],"system":[58,74,129],"based":[59],"Tree-structured":[62],"convolutional":[63],"neural":[64],"(Tree-CNN).":[66],"Integrating":[67],"an":[68],"advanced":[69],"preprocessing":[70],"mechanism,":[71],"proposed":[73],"can":[75,103],"efficiently":[76],"capture":[77],"hierarchical":[79],"relationships":[80],"structural":[82],"features":[83],"data,":[85],"exhibits":[88],"remarkable":[89],"advantages":[90],"in":[91,133,158],"processing":[93],"unstructured":[95],"data":[96],"time-series":[99],"data.":[100],"Meanwhile,":[101],"Tree-CNN":[102],"tackle":[105],"problem":[107],"catastrophic":[109],"forgetting,":[110],"preserving":[111],"capability":[114],"known":[116],"types":[118,149],"while":[119],"learning":[120],"new":[121],"patterns.":[123],"Experimental":[124],"results":[125],"demonstrate":[126],"that":[127],"achieves":[130],"excellent":[131],"performance":[132],"terms":[134],"accuracy":[137],"real-time":[139],"performance,":[140],"yields":[143],"significant":[144],"effects":[146],"various":[148],"attacks,":[151],"which":[152],"verifies":[153],"its":[154],"effectiveness":[155],"applicability":[157],"field":[160],"security.":[163]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
