{"id":"https://openalex.org/W3197410585","doi":"https://doi.org/10.1109/icccn52240.2021.9522215","title":"Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection","display_name":"Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection","publication_year":2021,"publication_date":"2021-07-01","ids":{"openalex":"https://openalex.org/W3197410585","doi":"https://doi.org/10.1109/icccn52240.2021.9522215","mag":"3197410585"},"language":"en","primary_location":{"id":"doi:10.1109/icccn52240.2021.9522215","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn52240.2021.9522215","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115597626","display_name":"Jianyu Wang","orcid":"https://orcid.org/0009-0000-3617-8562"},"institutions":[{"id":"https://openalex.org/I208333798","display_name":"University of Missouri\u2013St. Louis","ror":"https://ror.org/037cnag11","country_code":"US","type":"education","lineage":["https://openalex.org/I208333798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jianyu Wang","raw_affiliation_strings":["Department of Computer Science, University of Missouri-St. Louis, St. Louis, Missouri, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Missouri-St. Louis, St. Louis, Missouri, USA","institution_ids":["https://openalex.org/I208333798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101469265","display_name":"Jianli Pan","orcid":"https://orcid.org/0000-0003-4881-5711"},"institutions":[{"id":"https://openalex.org/I208333798","display_name":"University of Missouri\u2013St. Louis","ror":"https://ror.org/037cnag11","country_code":"US","type":"education","lineage":["https://openalex.org/I208333798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jianli Pan","raw_affiliation_strings":["Department of Computer Science, University of Missouri-St. Louis, St. Louis, Missouri, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Missouri-St. Louis, St. Louis, Missouri, USA","institution_ids":["https://openalex.org/I208333798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020423758","display_name":"Ismail AlQerm","orcid":"https://orcid.org/0000-0002-5960-0663"},"institutions":[{"id":"https://openalex.org/I208333798","display_name":"University of Missouri\u2013St. Louis","ror":"https://ror.org/037cnag11","country_code":"US","type":"education","lineage":["https://openalex.org/I208333798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ismail AlQerm","raw_affiliation_strings":["Department of Computer Science, University of Missouri-St. Louis, St. Louis, Missouri, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Missouri-St. Louis, St. Louis, Missouri, USA","institution_ids":["https://openalex.org/I208333798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021396791","display_name":"Yuanni Liu","orcid":"https://orcid.org/0000-0002-9305-3405"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanni Liu","raw_affiliation_strings":["Institute of Future Network Technologies, Chongqing University of Posts and Telecommunications, Chong Qing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Future Network Technologies, Chongqing University of Posts and Telecommunications, Chong Qing, China","institution_ids":["https://openalex.org/I10535382"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115597626"],"corresponding_institution_ids":["https://openalex.org/I208333798"],"apc_list":null,"apc_paid":null,"fwci":3.6714,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.94170413,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8378828763961792},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7321134805679321},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.634364128112793},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.618049681186676},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5531420707702637},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5134871602058411},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4742357134819031},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4425501525402069},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42433348298072815},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4165588319301605},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39702460169792175}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8378828763961792},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7321134805679321},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.634364128112793},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.618049681186676},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5531420707702637},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5134871602058411},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4742357134819031},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4425501525402069},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42433348298072815},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4165588319301605},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39702460169792175},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn52240.2021.9522215","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn52240.2021.9522215","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.699999988079071}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2408141691","https://openalex.org/W2412510955","https://openalex.org/W2460937040","https://openalex.org/W2548275288","https://openalex.org/W2735607295","https://openalex.org/W2746600820","https://openalex.org/W2765424254","https://openalex.org/W2786075294","https://openalex.org/W2809895662","https://openalex.org/W2853623529","https://openalex.org/W2889645991","https://openalex.org/W2889836475","https://openalex.org/W2908403421","https://openalex.org/W2913497771","https://openalex.org/W2950776302","https://openalex.org/W2951105308","https://openalex.org/W2963070423","https://openalex.org/W2963178695","https://openalex.org/W2963207607","https://openalex.org/W2963391384","https://openalex.org/W2963857521","https://openalex.org/W2969468102","https://openalex.org/W3009195050","https://openalex.org/W3017217726","https://openalex.org/W3103557498","https://openalex.org/W3106412272","https://openalex.org/W4300511536","https://openalex.org/W4320013936","https://openalex.org/W4394663350","https://openalex.org/W6640425456","https://openalex.org/W6714069269","https://openalex.org/W6715189028","https://openalex.org/W6719080892","https://openalex.org/W6729482032","https://openalex.org/W6746608116","https://openalex.org/W6754600771","https://openalex.org/W6864274290"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Network":[0],"intrusion":[1,37,88],"detection":[2,45,89,146],"plays":[3],"an":[4,109],"important":[5],"role":[6],"in":[7,74],"the":[8,22,75,145,155,165],"Internet":[9],"of":[10,21,26],"Things":[11],"systems":[12,90],"for":[13,39,115],"protecting":[14],"devices":[15],"from":[16],"security":[17],"breaches.":[18],"Facing":[19],"challenges":[20],"rapidly":[23],"increasing":[24],"amount":[25],"diverse":[27],"network":[28,87],"traffic,":[29],"recent":[30],"research":[31],"has":[32,50],"employed":[33],"end-to-end":[34],"deep":[35,48],"learning-based":[36],"detectors":[38],"automatic":[40],"feature":[41],"extraction":[42],"and":[43,92,120,136,160,188],"high":[44],"accuracy.":[46,189],"However,":[47],"learning":[49],"been":[51],"proved":[52],"vulnerable":[53],"to":[54,102,140,177],"adversarial":[55,122,134,138,180],"attacks":[56,181],"that":[57,130,173],"may":[58],"cause":[59],"misclassification":[60],"by":[61,106],"imposing":[62],"imperceptible":[63],"perturbation":[64],"on":[65,148],"input":[66],"samples.":[67],"Though":[68],"such":[69],"vulnerability":[70],"is":[71,125,151,175],"widely":[72],"discussed":[73],"image":[76],"processing":[77],"domain,":[78],"very":[79],"few":[80],"studies":[81],"have":[82],"investigated":[83],"its":[84,162],"perniciousness":[85],"against":[86,117],"(NIDS)":[91],"proposed":[93],"corresponding":[94],"defense":[95,111,168],"strategies.":[96],"In":[97],"this":[98,104],"paper,":[99],"we":[100],"try":[101],"fill":[103],"gap":[105],"proposing":[107],"Def-IDS,":[108],"ensemble":[110],"mechanism":[112,156],"specially":[113],"designed":[114],"NIDS,":[116],"both":[118],"known":[119],"unknown":[121],"attacks.":[123],"It":[124],"a":[126],"two-module":[127],"training":[128],"framework":[129],"integrates":[131],"multi-class":[132],"generative":[133],"networks":[135],"multi-source":[137],"retraining":[139],"improve":[141],"model":[142],"robustness,":[143],"while":[144],"accuracy":[147],"unperturbed":[149],"samples":[150],"maintained.":[152],"We":[153],"evaluate":[154],"over":[157],"CSE-CIC-IDS2018":[158],"dataset":[159],"compare":[161],"performance":[163],"with":[164,182],"other":[166],"three":[167],"methods.":[169],"The":[170],"results":[171],"demonstrate":[172],"Def-IDS":[174],"able":[176],"detect":[178],"various":[179],"better":[183],"precision,":[184],"recall,":[185],"F1":[186],"score,":[187]},"counts_by_year":[{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":4}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
