{"id":"https://openalex.org/W2902805725","doi":"https://doi.org/10.1109/icpr.2018.8546162","title":"An Effective Deep Learning Based Scheme for Network Intrusion Detection","display_name":"An Effective Deep Learning Based Scheme for Network Intrusion Detection","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2902805725","doi":"https://doi.org/10.1109/icpr.2018.8546162","mag":"2902805725"},"language":"en","primary_location":{"id":"doi:10.1109/icpr.2018.8546162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr.2018.8546162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 24th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047508877","display_name":"Hongpo Zhang","orcid":"https://orcid.org/0000-0003-3485-8470"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hongpo Zhang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054307870","display_name":"Chase Q. Wu","orcid":"https://orcid.org/0000-0002-8218-1209"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chase Q. Wu","raw_affiliation_strings":["Department of Computer Science, New Jersey Institute of Technology, Newark, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, New Jersey Institute of Technology, Newark, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666836","display_name":"Shan Gao","orcid":"https://orcid.org/0000-0002-3427-5825"},"institutions":[{"id":"https://openalex.org/I4210113254","display_name":"Second Affiliated Hospital of Zhengzhou University","ror":"https://ror.org/026bqfq17","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210113254"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shan Gao","raw_affiliation_strings":["Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I4210113254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039105930","display_name":"Zongmin Wang","orcid":"https://orcid.org/0000-0001-9204-5414"},"institutions":[{"id":"https://openalex.org/I4210113254","display_name":"Second Affiliated Hospital of Zhengzhou University","ror":"https://ror.org/026bqfq17","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210113254"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongmin Wang","raw_affiliation_strings":["Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I4210113254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068243886","display_name":"Yuxiao Xu","orcid":"https://orcid.org/0000-0002-0802-845X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuxiao Xu","raw_affiliation_strings":["Department of Research and Development, Hangzhou DPtech Technologies Co., Ltd., Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Research and Development, Hangzhou DPtech Technologies Co., Ltd., Hangzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016276126","display_name":"Yongpeng Liu","orcid":"https://orcid.org/0000-0002-4544-4217"},"institutions":[{"id":"https://openalex.org/I4210113254","display_name":"Second Affiliated Hospital of Zhengzhou University","ror":"https://ror.org/026bqfq17","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210113254"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongpeng Liu","raw_affiliation_strings":["Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Cooperative Innovation Center of Internet Healthcare, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I4210113254"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5047508877"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.7205,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.96486317,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"682","last_page":"687"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7926120758056641},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7922598123550415},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6877612471580505},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6117949485778809},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.5430909395217896},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5340771675109863},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5335273146629333},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5270788073539734},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.5069034695625305},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4625202417373657},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.4427325129508972},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.43535593152046204},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.41678646206855774},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4101322889328003},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.401592493057251},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39554134011268616},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.36977922916412354},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06581234931945801}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7926120758056641},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7922598123550415},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6877612471580505},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6117949485778809},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.5430909395217896},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5340771675109863},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5335273146629333},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5270788073539734},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.5069034695625305},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4625202417373657},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.4427325129508972},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.43535593152046204},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.41678646206855774},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4101322889328003},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.401592493057251},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39554134011268616},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.36977922916412354},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06581234931945801},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpr.2018.8546162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr.2018.8546162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 24th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W433644524","https://openalex.org/W1536395052","https://openalex.org/W1544101352","https://openalex.org/W1560130852","https://openalex.org/W1827212170","https://openalex.org/W1984438447","https://openalex.org/W2009501510","https://openalex.org/W2016258134","https://openalex.org/W2020651442","https://openalex.org/W2066664409","https://openalex.org/W2078197322","https://openalex.org/W2099940443","https://openalex.org/W2118978333","https://openalex.org/W2279785795","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2399941526","https://openalex.org/W2409097990","https://openalex.org/W2529525882","https://openalex.org/W2614634292","https://openalex.org/W2734718015","https://openalex.org/W2736937187","https://openalex.org/W2740755977","https://openalex.org/W2755146079","https://openalex.org/W2756489700","https://openalex.org/W2762776925","https://openalex.org/W2766944320","https://openalex.org/W2767626694","https://openalex.org/W2963366538","https://openalex.org/W2963683434","https://openalex.org/W3007103623","https://openalex.org/W4245460974","https://openalex.org/W4293843697","https://openalex.org/W6632020558","https://openalex.org/W6638484148","https://openalex.org/W6638623425","https://openalex.org/W6652451885","https://openalex.org/W6695404774","https://openalex.org/W6744671649"],"related_works":["https://openalex.org/W4310873165","https://openalex.org/W2355395139","https://openalex.org/W2002563186","https://openalex.org/W2983142544","https://openalex.org/W2891059443","https://openalex.org/W4281663961","https://openalex.org/W3208888551","https://openalex.org/W4313561566","https://openalex.org/W3208386644","https://openalex.org/W4220682630"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,25,58,130,148],"systems":[2],"(IDS)":[3],"play":[4],"an":[5,21],"important":[6,54],"role":[7],"in":[8,113,149],"the":[9,83,88,91,102,140],"protection":[10],"of":[11,53,90,100,115,122,126],"network":[12,23],"operations":[13],"and":[14,135],"services.":[15],"In":[16],"this":[17],"paper,":[18],"we":[19],"propose":[20],"effective":[22],"intrusion":[24,57,76,147],"scheme":[26,34,104,142],"based":[27],"on":[28,82],"deep":[29],"learning":[30],"techniques.":[31],"The":[32,63,119],"proposed":[33,92,103,141],"employs":[35],"a":[36,41,50,70,95,110,123,143],"denoising":[37],"autoencoder":[38],"(DAE)":[39],"with":[40,132],"weighted":[42],"loss":[43],"function":[44],"for":[45,56,75],"feature":[46,61,97],"selection,":[47],"which":[48],"determines":[49],"limited":[51],"number":[52],"features":[55,127],"to":[59,86,108,146],"reduce":[60],"dimensionality.":[62],"selected":[64],"data":[65],"is":[66,105],"then":[67],"classified":[68],"by":[69],"compact":[71],"multilayer":[72],"perceptron":[73],"(MLP)":[74],"identification.":[77],"Extensive":[78],"experiments":[79],"are":[80],"conducted":[81],"UNSW-NB":[84],"dataset":[85],"demonstrate":[87],"effectiveness":[89],"scheme.":[93],"With":[94],"small":[96],"selection":[98,121],"ratio":[99],"5.9%,":[101],"still":[106],"able":[107],"achieve":[109],"superior":[111],"performance":[112,131],"terms":[114],"different":[116],"evaluation":[117],"criteria.":[118],"strategic":[120],"reduced":[124],"set":[125],"yields":[128],"satisfactory":[129],"low":[133],"memory":[134],"computing":[136],"power":[137],"requirements,":[138],"making":[139],"promising":[144],"solution":[145],"high-speed":[150],"networks.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
