{"id":"https://openalex.org/W7147262674","doi":"https://doi.org/10.1109/cnml68938.2026.11453115","title":"A Network Intrusion Detection Method Based on Parameter Optimization and Transformer","display_name":"A Network Intrusion Detection Method Based on Parameter Optimization and Transformer","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147262674","doi":"https://doi.org/10.1109/cnml68938.2026.11453115"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11453115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11453115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102730412","display_name":"Yuyi Wang","orcid":"https://orcid.org/0000-0001-7273-9873"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]},{"id":"https://openalex.org/I4210100715","display_name":"Zhongzhu Healthcare (China)","ror":"https://ror.org/018df9d45","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210100715"]},{"id":"https://openalex.org/I4210112295","display_name":"Qianjiang Central Hospital","ror":"https://ror.org/0238gcb09","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210112295"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Wang","raw_affiliation_strings":["China Mobile Group Hubei Co., Ltd.,Qianjiang Branch,Qianjiang,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Group Hubei Co., Ltd.,Qianjiang Branch,Qianjiang,China","institution_ids":["https://openalex.org/I4210100715","https://openalex.org/I4210112295","https://openalex.org/I180662265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102730412"],"corresponding_institution_ids":["https://openalex.org/I180662265","https://openalex.org/I4210100715","https://openalex.org/I4210112295"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.94408338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"56","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7854999899864197,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7854999899864197,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.026100000366568565,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13324","display_name":"Scientific and Engineering Research Topics","score":0.014600000344216824,"subfield":{"id":"https://openalex.org/subfields/3506","display_name":"Periodontics"},"field":{"id":"https://openalex.org/fields/35","display_name":"Dentistry"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.6323999762535095},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6205000281333923},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5809000134468079},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.5641999840736389},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.37770000100135803},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3716000020503998},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.37040001153945923},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.36090001463890076}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6474999785423279},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.6323999762535095},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6205000281333923},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5809000134468079},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.5641999840736389},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4690000116825104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4487999975681305},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4034999907016754},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.37770000100135803},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.37040001153945923},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.36090001463890076},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.35510000586509705},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3312999904155731},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C126980161","wikidata":"https://www.wikidata.org/wiki/Q863783","display_name":"Simulated annealing","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.29019999504089355},{"id":"https://openalex.org/C40506919","wikidata":"https://www.wikidata.org/wiki/Q7452469","display_name":"Sequence learning","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.28600001335144043},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C178009071","wikidata":"https://www.wikidata.org/wiki/Q93344","display_name":"Trigonometric functions","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11453115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11453115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4281485378742218,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2924689635","https://openalex.org/W2991507433","https://openalex.org/W3126814579","https://openalex.org/W4387986975","https://openalex.org/W4400266772","https://openalex.org/W4406012094","https://openalex.org/W4409474640","https://openalex.org/W4412567383","https://openalex.org/W4414538544"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,33,49],"high-performance":[4],"network":[5,28,150],"intrusion":[6,151],"detection":[7,152],"method":[8,84],"based":[9],"on":[10,66,95],"parameter":[11],"optimization":[12],"and":[13,52,78,92,104,118,126,136,145],"Transformer.":[14],"To":[15],"fully":[16],"exploit":[17],"the":[18,24,67,82,96,122,130],"powerful":[19],"sequence":[20],"modeling":[21],"capability":[22],"of":[23,129],"Transformer":[25,35],"architecture":[26],"in":[27],"traffic":[29,45],"analysis,":[30],"we":[31],"design":[32],"lightweight":[34],"encoder":[36],"with":[37],"carefully":[38],"tuned":[39],"hyperparameters.":[40],"The":[41,132],"model":[42],"projects":[43],"each":[44],"flow":[46],"record":[47],"into":[48],"hidden":[50],"space":[51],"performs":[53],"multi-head":[54],"self-attention":[55],"to":[56],"capture":[57],"complex":[58],"dependencies":[59],"among":[60],"features.":[61],"Extensive":[62],"experiments":[63],"are":[64,140],"conducted":[65],"NSL-KDD":[68,97],"datasets.":[69],"By":[70],"adopting":[71],"AdamW":[72],"optimizer,":[73],"cosine":[74],"annealing":[75],"learning":[76,103,107],"rate,":[77],"balanced":[79],"sampling":[80],"strategy,":[81],"proposed":[83],"achieves":[85],"99.0574%":[86],"accuracy,":[87],"98.9862%":[88],"precision,":[89],"99.0555%":[90],"recall,":[91],"99.0208%":[93],"F1-score":[94],"dataset,":[98],"significantly":[99],"outperforming":[100],"traditional":[101],"machine":[102],"ordinary":[105],"deep":[106],"baselines.":[108],"Comprehensive":[109],"visualization":[110],"results\u2014including":[111],"confusion":[112],"matrix,":[113],"probability":[114],"distribution,":[115],"t-SNE":[116],"projection,":[117],"attention":[119],"heatmap\u2014fully":[120],"demonstrate":[121],"superior":[123],"classification":[124],"performance":[125],"excellent":[127],"interpretability":[128],"model.":[131],"complete,":[133],"reproducible":[134],"code":[135],"all":[137],"experimental":[138],"figures":[139],"provided,":[141],"offering":[142],"an":[143],"efficient":[144],"reliable":[146],"solution":[147],"for":[148],"real-world":[149],"tasks.":[153]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
