{"id":"https://openalex.org/W4407466336","doi":"https://doi.org/10.1109/iccvit63928.2024.10872453","title":"Semi-supervised Balanced Distribution Adaptation Model for Intrusion Detection","display_name":"Semi-supervised Balanced Distribution Adaptation Model for Intrusion Detection","publication_year":2024,"publication_date":"2024-11-24","ids":{"openalex":"https://openalex.org/W4407466336","doi":"https://doi.org/10.1109/iccvit63928.2024.10872453"},"language":"en","primary_location":{"id":"doi:10.1109/iccvit63928.2024.10872453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccvit63928.2024.10872453","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100737529","display_name":"Jianying Wang","orcid":"https://orcid.org/0000-0001-9612-7257"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianying Wang","raw_affiliation_strings":["Huzhou University,Huzhou University Library,Huzhou,China"],"affiliations":[{"raw_affiliation_string":"Huzhou University,Huzhou University Library,Huzhou,China","institution_ids":["https://openalex.org/I3018263800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100734556","display_name":"Rongrong Chen","orcid":"https://orcid.org/0000-0002-4489-4179"},"institutions":[{"id":"https://openalex.org/I4210092944","display_name":"Dalian University","ror":"https://ror.org/00g2ypp58","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092944"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongrong Chen","raw_affiliation_strings":["Dalian University,School of Software Engineering,Dalian,China"],"affiliations":[{"raw_affiliation_string":"Dalian University,School of Software Engineering,Dalian,China","institution_ids":["https://openalex.org/I4210092944"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100419847","display_name":"Yong Zhang","orcid":"https://orcid.org/0000-0003-1024-5741"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Zhang","raw_affiliation_strings":["Huzhou University,School of Information Engineering,Huzhou,China"],"affiliations":[{"raw_affiliation_string":"Huzhou University,School of Information Engineering,Huzhou,China","institution_ids":["https://openalex.org/I3018263800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100737529"],"corresponding_institution_ids":["https://openalex.org/I3018263800"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31866772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.7170022130012512},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7134582996368408},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7060588598251343},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4253140687942505},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41792789101600647},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3459019064903259},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.05392351746559143}],"concepts":[{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.7170022130012512},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7134582996368408},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7060588598251343},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4253140687942505},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41792789101600647},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3459019064903259},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.05392351746559143},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccvit63928.2024.10872453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccvit63928.2024.10872453","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5799999833106995,"display_name":"Climate action"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2017588182","https://openalex.org/W2096943734","https://openalex.org/W2108118522","https://openalex.org/W2115403315","https://openalex.org/W2133556223","https://openalex.org/W2140095548","https://openalex.org/W2140389641","https://openalex.org/W2346714907","https://openalex.org/W2527999453","https://openalex.org/W2760017128","https://openalex.org/W2884771968","https://openalex.org/W2963693396","https://openalex.org/W3109487422","https://openalex.org/W3118808706","https://openalex.org/W3203878893","https://openalex.org/W4214699222","https://openalex.org/W4221041882","https://openalex.org/W4285127639","https://openalex.org/W4288070309","https://openalex.org/W4293370949","https://openalex.org/W4312494597","https://openalex.org/W4360993985","https://openalex.org/W6675747103","https://openalex.org/W6676215431","https://openalex.org/W6771190517"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDS)":[3],"are":[4],"essential":[5],"for":[6,36,68],"safeguarding":[7],"modern":[8],"network":[9,51,72],"infrastructures":[10],"against":[11],"a":[12,59,156],"wide":[13],"range":[14],"of":[15,21,33,43,105,188],"cyber":[16],"threats.":[17],"However,":[18],"the":[19,30,41,92,97,100,107,121,128,134,144,149,170,183],"development":[20],"highly":[22],"effective":[23],"IDS":[24],"models":[25,48,168,185],"is":[26,116,140,152,161],"often":[27],"constrained":[28],"by":[29],"limited":[31,77],"availability":[32],"labeled":[34,78],"data":[35,79,83,151,174],"training,":[37],"as":[38,40],"well":[39],"issue":[42],"distribution":[44,62],"shift":[45],"when":[46],"applying":[47],"across":[49],"different":[50,85],"environments.":[52],"To":[53,131],"overcome":[54],"these":[55],"challenges,":[56],"we":[57],"present":[58],"semi-supervised":[60],"balanced":[61],"adaptation":[63],"(SSBDA)":[64],"transfer":[65,166],"learning":[66],"method":[67,89],"detecting":[69],"and":[70,80,102,109,125,172,190],"preventing":[71],"intrusion,":[73],"which":[74],"learns":[75],"from":[76],"predicts":[81],"unlabeled":[82],"with":[84,163],"distributions.":[86],"The":[87,112,159,176],"proposed":[88],"first":[90],"employs":[91],"maximum":[93],"mean":[94],"discrepancy":[95],"measure":[96],"differences":[98],"between":[99,123],"marginal":[101],"conditional":[103],"distributions":[104],"both":[106],"source":[108,129],"target":[110],"domains.":[111],"Hilbert-Schmidt":[113],"independence":[114],"criterion":[115],"then":[117],"utilized":[118],"to":[119,142,154],"estimate":[120],"dependence":[122],"labels":[124],"features":[126],"within":[127],"domain.":[130],"further":[132],"enhance":[133],"model\u2019s":[135],"generalization":[136],"ability,":[137],"manifold":[138],"regularization":[139],"applied":[141],"preserve":[143],"data\u2019s":[145],"locality":[146],"structure.":[147],"Finally,":[148],"processed":[150],"used":[153],"train":[155],"tri-training":[157],"classifier.":[158],"SSBDA":[160,181],"compared":[162],"several":[164],"well-known":[165],"learning-based":[167],"using":[169],"KDDCup99":[171],"NSL-KDD":[173],"sets.":[175],"experimental":[177],"results":[178],"demonstrate":[179],"that":[180],"outperforms":[182],"comparison":[184],"in":[186,196],"terms":[187],"accuracy":[189],"F-score,":[191],"highlighting":[192],"its":[193],"superior":[194],"performance":[195],"intrusion":[197],"detection":[198],"tasks.":[199]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
