{"id":"https://openalex.org/W4390693632","doi":"https://doi.org/10.1109/iccais59597.2023.10382282","title":"Particle Swarm Optimization of Deep Auto-Encoder Network Architectures for Anomaly-based Intrusion Detection Systems","display_name":"Particle Swarm Optimization of Deep Auto-Encoder Network Architectures for Anomaly-based Intrusion Detection Systems","publication_year":2023,"publication_date":"2023-11-27","ids":{"openalex":"https://openalex.org/W4390693632","doi":"https://doi.org/10.1109/iccais59597.2023.10382282"},"language":"en","primary_location":{"id":"doi:10.1109/iccais59597.2023.10382282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccais59597.2023.10382282","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 12th International Conference on Control, Automation and Information Sciences (ICCAIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004778510","display_name":"Qu\u1ed1c Trung Tr\u1ea7n","orcid":"https://orcid.org/0000-0003-1953-0434"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Quoc Trung Tran","raw_affiliation_strings":["Le Quy Don Technical University"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100769132","display_name":"Van Quan Nguyen","orcid":"https://orcid.org/0000-0001-9703-0692"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van Quan Nguyen","raw_affiliation_strings":["Le Quy Don Technical University"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026840731","display_name":"Thanh Long Ngo","orcid":"https://orcid.org/0000-0002-6027-106X"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Thanh Long Ngo","raw_affiliation_strings":["Le Quy Don Technical University"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University","institution_ids":["https://openalex.org/I131359167"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004778510"],"corresponding_institution_ids":["https://openalex.org/I131359167"],"apc_list":null,"apc_paid":null,"fwci":0.4018,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64111692,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"553","last_page":"559"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7673506736755371},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7454984188079834},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7137491106987},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.7006856203079224},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.49327224493026733},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.47629132866859436},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47033509612083435},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4540291130542755},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4431282877922058},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.43345585465431213},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3460456132888794}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7673506736755371},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7454984188079834},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7137491106987},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.7006856203079224},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.49327224493026733},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.47629132866859436},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47033509612083435},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4540291130542755},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4431282877922058},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43345585465431213},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3460456132888794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccais59597.2023.10382282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccais59597.2023.10382282","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 12th International Conference on Control, Automation and Information Sciences (ICCAIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1502922572","https://openalex.org/W2077488147","https://openalex.org/W2097998348","https://openalex.org/W2099940443","https://openalex.org/W2106732331","https://openalex.org/W2110798204","https://openalex.org/W2122646361","https://openalex.org/W2296509296","https://openalex.org/W2775524044","https://openalex.org/W2789828921","https://openalex.org/W2799758613","https://openalex.org/W2807998075","https://openalex.org/W2808472075","https://openalex.org/W2947137917","https://openalex.org/W3093410479","https://openalex.org/W3109825968","https://openalex.org/W3122864121","https://openalex.org/W3132109934","https://openalex.org/W3137004866","https://openalex.org/W3138815252","https://openalex.org/W3153872861","https://openalex.org/W3160339107","https://openalex.org/W3166688525","https://openalex.org/W3203072121","https://openalex.org/W3205985117","https://openalex.org/W4211203352","https://openalex.org/W4224211479","https://openalex.org/W4253572110","https://openalex.org/W4295185264","https://openalex.org/W4309679717","https://openalex.org/W6674385629","https://openalex.org/W6729972426","https://openalex.org/W6730267373","https://openalex.org/W7016021835"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Deep":[0],"Auto-Encoder":[1],"(DAE)":[2],"is":[3,9],"a":[4,37,64],"neural":[5],"network":[6,15,82,116,124,167,172],"model":[7,90],"that":[8],"commonly":[10],"used":[11],"to":[12,52,169],"develop":[13,170],"anomaly-based":[14,81],"intrusion":[16,83,173],"detection":[17,84,174],"systems.":[18,175],"However,":[19],"the":[20,54,75,93,99,105,121,148],"architecture":[21,77,150,168],"of":[22,78,96,102,123,151,163],"existing":[23],"models":[24,153],"are":[25],"all":[26],"arbitrary":[27],"designs":[28],"with":[29],"no":[30],"theoretical":[31],"basis":[32],"or":[33],"empirical":[34],"formula.":[35],"As":[36],"result,":[38],"it":[39],"will":[40],"cost":[41],"computational":[42],"and":[43,137],"storage":[44],"resources":[45],"as":[46,48],"well":[47],"not":[49],"being":[50],"able":[51],"learn":[53],"best":[55],"data":[56],"representation":[57,110],"space.":[58],"In":[59],"this":[60],"paper,":[61],"we":[62],"propose":[63],"novel":[65],"method":[66],"based":[67],"on":[68,98,154],"particle":[69],"swarm":[70],"optimization":[71],"(PSO)":[72],"for":[73,80],"searching":[74],"optimal":[76,94,149],"DAE":[79,152],"systems,":[85],"named":[86],"PSODAE.":[87],"Our":[88],"proposed":[89],"can":[91,112],"find":[92],"number":[95],"neurons":[97],"hidden":[100],"layers":[101],"DAE.":[103],"Therefore,":[104],"meaningful,":[106],"prominent,":[107],"concise":[108],"latent":[109],"space":[111],"be":[113],"learned":[114],"from":[115],"data,":[117],"which":[118],"better":[119],"supports":[120],"performance":[122],"anomaly":[125],"detectors.":[126],"We":[127],"conduct":[128],"experiments":[129],"using":[130],"standard":[131],"datasets":[132],"including":[133],"NSLKDD,":[134],"UNSW-NB15,":[135],"CICIDS-2017,":[136],"five":[138],"scenarios":[139],"in":[140],"dataset":[141],"CTU13.":[142],"The":[143],"experimental":[144],"results":[145],"have":[146],"generated":[147],"each":[155],"dataset.":[156],"This":[157],"study":[158],"proposes":[159],"an":[160],"effective":[161],"way":[162],"designing":[164],"deep":[165],"learning":[166],"modern":[171]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
