{"id":"https://openalex.org/W3046138161","doi":"https://doi.org/10.1109/icc40277.2020.9149384","title":"A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM","display_name":"A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3046138161","doi":"https://doi.org/10.1109/icc40277.2020.9149384","mag":"3046138161"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9149384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101501976","display_name":"Yu Yan","orcid":"https://orcid.org/0000-0002-2271-961X"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Yan","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100326346","display_name":"Lin Qi","orcid":"https://orcid.org/0000-0002-3322-8189"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Qi","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101891532","display_name":"Jie Wang","orcid":"https://orcid.org/0000-0001-8846-398X"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Wang","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038594863","display_name":"Yun Lin","orcid":"https://orcid.org/0000-0003-1379-9301"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yun Lin","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R.China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333516","display_name":"Lei Chen","orcid":"https://orcid.org/0000-0002-8257-5806"},"institutions":[{"id":"https://openalex.org/I39815113","display_name":"Georgia Southern University","ror":"https://ror.org/04agmb972","country_code":"US","type":"education","lineage":["https://openalex.org/I39815113"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lei Chen","raw_affiliation_strings":["Department of Information Technology, Georgia Southern University, Georgia, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Georgia Southern University, Georgia, U.S.A","institution_ids":["https://openalex.org/I39815113"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101501976"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":5.7046,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.96278828,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8832907676696777},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8378043174743652},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7057808637619019},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.6467154026031494},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6296730041503906},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5685091614723206},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5545076727867126},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.5491056442260742},{"id":"https://openalex.org/keywords/long-short-term-memory","display_name":"Long short term memory","score":0.48470067977905273},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4808800518512726},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46351301670074463},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44931334257125854},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.39527004957199097},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3705999255180359},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.2840522527694702},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09983408451080322}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8832907676696777},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8378043174743652},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7057808637619019},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.6467154026031494},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6296730041503906},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5685091614723206},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5545076727867126},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.5491056442260742},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.48470067977905273},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4808800518512726},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46351301670074463},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44931334257125854},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.39527004957199097},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3705999255180359},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.2840522527694702},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09983408451080322},{"id":"https://openalex.org/C21880701","wikidata":"https://www.wikidata.org/wiki/Q2144042","display_name":"Process engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9149384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W341626899","https://openalex.org/W1966809779","https://openalex.org/W2006112056","https://openalex.org/W2076063813","https://openalex.org/W2125194875","https://openalex.org/W2278186031","https://openalex.org/W2279785795","https://openalex.org/W2326324325","https://openalex.org/W2334853001","https://openalex.org/W2342408547","https://openalex.org/W2460037574","https://openalex.org/W2490447569","https://openalex.org/W2527737216","https://openalex.org/W2729006349","https://openalex.org/W2799308006","https://openalex.org/W2883554196","https://openalex.org/W2913330314","https://openalex.org/W2924353071","https://openalex.org/W4234474034","https://openalex.org/W6695404774"],"related_works":["https://openalex.org/W2983142544","https://openalex.org/W2891059443","https://openalex.org/W4281663961","https://openalex.org/W3208888551","https://openalex.org/W4313561566","https://openalex.org/W3208386644","https://openalex.org/W4389832810","https://openalex.org/W4220682630","https://openalex.org/W3181622257","https://openalex.org/W3163146846"],"abstract_inverted_index":{"Nowadays,":[0],"network":[1,35],"intrusions":[2],"have":[3,15,100],"brought":[4],"greater":[5],"impact":[6],"in":[7],"a":[8,17,84,87],"large":[9],"scale.":[10],"Intrusion":[11],"Detection":[12],"Systems":[13],"(IDS)":[14],"been":[16,101],"recent":[18],"research":[19],"hotspot":[20],"for":[21],"both":[22],"the":[23,26,31,46,79,96,108,130],"industry":[24],"and":[25,44,69,89,103,122,146],"academic.":[27],"However,":[28],"due":[29],"to":[30,40,57,128],"dynamic":[32],"characteristics":[33],"of":[34,78,95,116,149],"traffic,":[36],"it":[37],"is":[38,64],"challenging":[39],"extract":[41],"significant":[42],"features":[43],"identify":[45],"traffic":[47],"types.":[48],"This":[49],"paper":[50],"focuses":[51],"on":[52,67,107],"applying":[53],"deep":[54],"learning":[55,144],"methods":[56,145],"feature":[58,85,97],"extraction.":[59],"Specifically,":[60],"an":[61,90],"IDS":[62],"model":[63,82,99,138],"proposed":[65],"based":[66],"autoencoder":[68],"long":[70],"short-term":[71],"memory":[72],"(LSTM)":[73],"cell.":[74],"The":[75],"overall":[76],"architecture":[77],"intrusion":[80],"detection":[81,131],"includes":[83],"extractor,":[86],"classifier,":[88],"evaluation":[91],"block.":[92],"Different":[93],"structures":[94],"extraction":[98],"discussed":[102],"researched.":[104],"Experiments":[105],"conducted":[106],"UNSW-NB15":[109],"dataset":[110],"produce":[111],"satisfactory":[112],"result.":[113],"A":[114],"number":[115],"selected":[117],"metrics":[118],"such":[119],"as":[120],"accuracy":[121,148],"false":[123],"alarm":[124],"rate":[125],"are":[126],"adopted":[127],"evaluate":[129],"performance.":[132],"Simulation":[133],"results":[134],"indicate":[135],"that":[136],"our":[137],"works":[139],"better":[140],"than":[141],"competing":[142],"machine":[143],"achieves":[147],"over":[150],"92%.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
