{"id":"https://openalex.org/W2734718015","doi":"https://doi.org/10.1109/ijcnn.2017.7966342","title":"Autoencoder-based feature learning for cyber security applications","display_name":"Autoencoder-based feature learning for cyber security applications","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2734718015","doi":"https://doi.org/10.1109/ijcnn.2017.7966342","mag":"2734718015"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2017.7966342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2017.7966342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113885484","display_name":"Mahmood Yousefi\u2010Azar","orcid":null},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mahmood Yousefi-Azar","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029458848","display_name":"Vijay Varadharajan","orcid":"https://orcid.org/0000-0002-3621-9114"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Vijay Varadharajan","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039882547","display_name":"Len Hamey","orcid":"https://orcid.org/0000-0001-8594-2176"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Len Hamey","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010613188","display_name":"Udaya Tupakula","orcid":"https://orcid.org/0000-0001-5048-9797"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Uday Tupakula","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113885484"],"corresponding_institution_ids":["https://openalex.org/I99043593"],"apc_list":null,"apc_paid":null,"fwci":25.4382,"has_fulltext":false,"cited_by_count":333,"citation_normalized_percentile":{"value":0.99661581,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"3854","last_page":"3861"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8093308806419373},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8073713779449463},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.7924742698669434},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6425857543945312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5951405763626099},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.580004096031189},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5676718950271606},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.5655077695846558},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5235561728477478},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5075258016586304},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4932693839073181},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4618896543979645},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.44030874967575073},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.43000054359436035},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4211723506450653},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.2998248338699341},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09319856762886047}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8093308806419373},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8073713779449463},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.7924742698669434},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6425857543945312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5951405763626099},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.580004096031189},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5676718950271606},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.5655077695846558},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5235561728477478},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5075258016586304},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4932693839073181},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4618896543979645},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.44030874967575073},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.43000054359436035},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4211723506450653},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2998248338699341},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09319856762886047},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn.2017.7966342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2017.7966342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:rune.une.edu.au:1959.11/57064","is_oa":false,"landing_page_url":"https://hdl.handle.net/1959.11/57064","pdf_url":null,"source":{"id":"https://openalex.org/S7407055448","display_name":"RUNE (Research UNE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7965823","raw_type":"Conference Publication"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W44815768","https://openalex.org/W66838807","https://openalex.org/W86811130","https://openalex.org/W1545528966","https://openalex.org/W1666731339","https://openalex.org/W1806891645","https://openalex.org/W1851403712","https://openalex.org/W1875842236","https://openalex.org/W1982563504","https://openalex.org/W1998177457","https://openalex.org/W2099940443","https://openalex.org/W2100495367","https://openalex.org/W2102017903","https://openalex.org/W2109321353","https://openalex.org/W2116064496","https://openalex.org/W2116065364","https://openalex.org/W2128084896","https://openalex.org/W2136922672","https://openalex.org/W2142889610","https://openalex.org/W2145094598","https://openalex.org/W2164700406","https://openalex.org/W2188333210","https://openalex.org/W2267635142","https://openalex.org/W2290933337","https://openalex.org/W2346714907","https://openalex.org/W2399941526","https://openalex.org/W2468480579","https://openalex.org/W2476429474","https://openalex.org/W2508015754","https://openalex.org/W2516866958","https://openalex.org/W2521362385","https://openalex.org/W2531448500","https://openalex.org/W2531967557","https://openalex.org/W2532612352","https://openalex.org/W2535642622","https://openalex.org/W2549585799","https://openalex.org/W2745604838","https://openalex.org/W2913932916","https://openalex.org/W2997574889","https://openalex.org/W3118608800","https://openalex.org/W3153872861","https://openalex.org/W6601785968","https://openalex.org/W6675112735","https://openalex.org/W6676204089","https://openalex.org/W6681096077","https://openalex.org/W6704896304","https://openalex.org/W6720814093","https://openalex.org/W6728780648"],"related_works":["https://openalex.org/W2983142544","https://openalex.org/W2891059443","https://openalex.org/W4281663961","https://openalex.org/W3208888551","https://openalex.org/W4313561566","https://openalex.org/W3208386644","https://openalex.org/W4220682630","https://openalex.org/W4389832810","https://openalex.org/W3181622257","https://openalex.org/W3163146846"],"abstract_inverted_index":{"This":[0,76],"paper":[1],"presents":[2],"a":[3,19,41,54,64],"novel":[4],"feature":[5,28,55,74,104,123],"learning":[6,40],"model":[7],"for":[8,169],"cyber":[9,59,146],"security":[10,60,147],"tasks.":[11],"We":[12,30,142,156],"propose":[13],"to":[14,22,121,184],"use":[15],"Auto-encoders":[16],"(AEs),":[17],"as":[18],"generative":[20],"model,":[21],"learn":[23],"latent":[24,83],"representation":[25],"of":[26,38,44,97,133],"different":[27,145],"sets.":[29],"show":[31,181],"how":[32],"well":[33],"the":[34,51,69,73,86,94,127,131,134,139,159],"AE":[35,52,87],"is":[36,78,88,107],"capable":[37],"automatically":[39],"reasonable":[42],"notion":[43],"semantic":[45,70],"similarity":[46,71,77],"among":[47],"input":[48],"features.":[49],"Specifically,":[50],"accepts":[53],"vector,":[56],"obtained":[57],"from":[58,101],"phenomena,":[61],"and":[62,153,174],"extracts":[63],"code":[65],"vector":[66],"that":[67,106],"captures":[68],"between":[72],"vectors.":[75],"embedded":[79],"in":[80,90,109,119],"an":[81,91],"abstract":[82],"representation.":[84],"Because":[85],"trained":[89],"unsupervised":[92],"fashion,":[93],"main":[95],"part":[96],"this":[98,110],"success":[99],"comes":[100],"appropriate":[102,178],"original":[103],"set":[105],"used":[108],"paper.":[111],"It":[112],"can":[113,129],"also":[114],"provide":[115],"more":[116],"discriminative":[117],"features":[118,135],"contrast":[120],"other":[122],"engineering":[124],"approaches.":[125],"Furthermore,":[126],"scheme":[128,161],"reduce":[130],"dimensionality":[132],"thereby":[136],"signicantly":[137],"minimising":[138],"memory":[140],"requirements.":[141],"selected":[143],"two":[144],"tasks:":[148],"networkbased":[149],"anomaly":[150,171],"intrusion":[151,172],"detection":[152,173],"Malware":[154],"classication.":[155],"have":[157],"analysed":[158],"proposed":[160],"with":[162],"various":[163],"classifiers":[164],"using":[165],"publicly":[166],"available":[167],"datasets":[168],"network":[170],"malware":[175],"classifications.":[176],"Several":[177],"evaluation":[179],"metrics":[180],"improvement":[182],"compared":[183],"prior":[185],"results.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":44},{"year":2022,"cited_by_count":59},{"year":2021,"cited_by_count":64},{"year":2020,"cited_by_count":60},{"year":2019,"cited_by_count":40},{"year":2018,"cited_by_count":16}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
