{"id":"https://openalex.org/W3091616039","doi":"https://doi.org/10.1109/ijcnn48605.2020.9207627","title":"An Adversarial Attack Detection Paradigm With Swarm Optimization","display_name":"An Adversarial Attack Detection Paradigm With Swarm Optimization","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3091616039","doi":"https://doi.org/10.1109/ijcnn48605.2020.9207627","mag":"3091616039"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn48605.2020.9207627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9207627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110632746","display_name":"Ayyaz-Ul-Haq Qureshi","orcid":null},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ayyaz-Ul-Haq Qureshi","raw_affiliation_strings":["School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083724607","display_name":"Hadi Larijani","orcid":"https://orcid.org/0000-0002-6826-207X"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hadi Larijani","raw_affiliation_strings":["School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109116245","display_name":"Nhamoinesu Mtetwa","orcid":null},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nhamoinesu Mtetwa","raw_affiliation_strings":["School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101494364","display_name":"Mehdi Yousefi","orcid":"https://orcid.org/0000-0003-2675-7194"},"institutions":[{"id":"https://openalex.org/I195939026","display_name":"Glasgow Caledonian University","ror":"https://ror.org/03dvm1235","country_code":"GB","type":"education","lineage":["https://openalex.org/I195939026"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mehdi Yousefi","raw_affiliation_strings":["School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow, United Kingdom","institution_ids":["https://openalex.org/I195939026"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008938944","display_name":"Abbas Javed","orcid":"https://orcid.org/0000-0001-9243-4364"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Abbas Javed","raw_affiliation_strings":["Department of Electrical and Computer Engineering, COMSATS University Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, COMSATS University Islamabad, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5110632746"],"corresponding_institution_ids":["https://openalex.org/I195939026"],"apc_list":null,"apc_paid":null,"fwci":0.8228,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.79436437,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7985388040542603},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965247631072998},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.7183142900466919},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6362341642379761},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5550678372383118},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5506021976470947},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47628253698349},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.46946799755096436},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4675501883029938},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45880380272865295}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7985388040542603},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965247631072998},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.7183142900466919},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6362341642379761},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5550678372383118},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5506021976470947},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47628253698349},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.46946799755096436},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4675501883029938},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45880380272865295},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn48605.2020.9207627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9207627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:researchonline.gcu.ac.uk:publications/e0e70f5e-1f4e-4bbe-b0b4-0b74ee44553e","is_oa":false,"landing_page_url":"https://researchonline.gcu.ac.uk/en/publications/e0e70f5e-1f4e-4bbe-b0b4-0b74ee44553e","pdf_url":null,"source":{"id":"https://openalex.org/S7407055385","display_name":"ResearchOnline","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Qureshi, A-U-H, Larijani, H, Mtetwa, N, Yousefi, M & Javed, A 2020, An adversarial attack detection paradigm with swarm optimization. in 2020 International Joint Conference on Neural Networks (IJCNN). Institute of Electrical and Electronics Engineers Inc., 2020 International Joint Conference on Neural Networks, 19/07/20. https://doi.org/10.1109/IJCNN48605.2020.9207627","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1686810756","https://openalex.org/W1945616565","https://openalex.org/W2010470943","https://openalex.org/W2143560894","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2762776925","https://openalex.org/W2810611310","https://openalex.org/W2853623529","https://openalex.org/W2886020981","https://openalex.org/W2887859706","https://openalex.org/W2895859872","https://openalex.org/W2913461836","https://openalex.org/W2933912020","https://openalex.org/W2938632398","https://openalex.org/W2949695962","https://openalex.org/W2968414504","https://openalex.org/W2968503817","https://openalex.org/W2971443394","https://openalex.org/W2972094710","https://openalex.org/W2978641491","https://openalex.org/W2980764850","https://openalex.org/W2981822776","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6752931940","https://openalex.org/W6761289918","https://openalex.org/W6768494210"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4283221438","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2930249865"],"abstract_inverted_index":{"The":[0,169],"rise":[1],"of":[2,11,23,54,65,180],"smart":[3],"devices":[4],"and":[5,33,81,141,155,197],"applications":[6],"has":[7,116,186],"increased":[8],"the":[9,24,52,70,87,109,127,130,142,156,173],"dependence":[10],"human":[12],"beings":[13],"on":[14,57],"machine":[15,44],"learning":[16],"(ML)":[17],"based":[18],"code-driven":[19],"systems.":[20,60],"While":[21],"many":[22],"pragmatic":[25],"problems":[26],"such":[27],"as":[28,68],"image":[29],"classification,":[30],"medical":[31],"diagnosis,":[32],"statistical":[34],"arbitrage":[35],"have":[36,122,138],"been":[37,117,123,139],"addressed":[38],"by":[39,125],"extensive":[40],"recent":[41],"research":[42],"in":[43,51,178],"learning,":[45],"it":[46,185],"still":[47],"lacks":[48],"substantial":[49],"work":[50],"field":[53],"adversarial":[55,71,106,153,181],"attacks":[56,84],"safety-critical":[58],"networked":[59],"It":[61],"is":[62,145,158],"a":[63,96],"matter":[64],"significant":[66],"importance,":[67],"using":[69,165],"samples,":[72],"attackers":[73],"are":[74,94],"now":[75],"able":[76],"to":[77],"evade":[78],"pre-trained":[79],"systems":[80],"mount":[82],"black-box":[83],"hence":[85],"increasing":[86],"false":[88],"positives.":[89],"In":[90],"this":[91],"research,":[92],"we":[93],"proposing":[95],"Random":[97],"Neural":[98],"Network-based":[99],"Adversarial":[100],"intrusion":[101],"detection":[102,183],"system":[103,128,144],"(RNN-ADV).":[104],"For":[105],"attack":[107,182],"generation,":[108],"Jacobian":[110],"Saliency":[111],"Map":[112],"Attack":[113],"(JSMA)":[114],"algorithm":[115],"used.":[118],"Swarm":[119],"optimization":[120],"capabilities":[121],"implemented":[124],"training":[126],"with":[129,148,160,194],"Artificial":[131],"Bee":[132],"Colony":[133],"(ABC)":[134],"algorithm.":[135],"Different":[136],"scenarios":[137],"designed":[140],"proposed":[143,174],"then":[146],"evaluated":[147],"benchmark":[149],"benign":[150,189],"NSL-KDD":[151],"dataset,":[152],"data,":[154],"performance":[157,167],"compared":[159],"deep":[161],"neural":[162],"networks":[163],"(DNN)":[164],"several":[166],"metrics.":[168],"results":[170],"suggest":[171],"that":[172],"scheme":[175],"outperforms":[176],"DNN":[177],"terms":[179],"where":[184],"successfully":[187],"classified":[188],"samples":[190,193],"from":[191],"crafted":[192],"better":[195],"accuracy":[196],"high":[198],"F1":[199],"scores.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
