{"id":"https://openalex.org/W4312831819","doi":"https://doi.org/10.1109/ijcnn55064.2022.9892744","title":"Using EBGAN for Anomaly Intrusion Detection","display_name":"Using EBGAN for Anomaly Intrusion Detection","publication_year":2022,"publication_date":"2022-07-18","ids":{"openalex":"https://openalex.org/W4312831819","doi":"https://doi.org/10.1109/ijcnn55064.2022.9892744"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn55064.2022.9892744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn55064.2022.9892744","pdf_url":null,"source":{"id":"https://openalex.org/S4363607707","display_name":"2022 International Joint Conference on Neural Networks (IJCNN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101738280","display_name":"Yi Cui","orcid":"https://orcid.org/0009-0007-7434-469X"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Cui","raw_affiliation_strings":["School of Computer Engineering and Science, Shanghai University,Shanghai,China","School of Computer Engineering and Science, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University,Shanghai,China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005814445","display_name":"Wenfeng Shen","orcid":"https://orcid.org/0000-0003-1366-9195"},"institutions":[{"id":"https://openalex.org/I4210102412","display_name":"Yan'an University","ror":"https://ror.org/01dyr7034","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210102412"]},{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenfeng Shen","raw_affiliation_strings":["School of Computer Engineering and Science, Shanghai University,Shanghai,China","School of Computer Engineering and Science, Shanghai University, Shanghai, China","Xi'an Innovation College, Yan'an University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University,Shanghai,China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"Xi'an Innovation College, Yan'an University, Shaanxi, China","institution_ids":["https://openalex.org/I4210102412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100410108","display_name":"Jian Zhang","orcid":"https://orcid.org/0009-0004-4418-6094"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Zhang","raw_affiliation_strings":["School of Computer Engineering and Science, Shanghai University,Shanghai,China","School of Computer Engineering and Science, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University,Shanghai,China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057819415","display_name":"Weijia L\u00fc","orcid":"https://orcid.org/0000-0002-7899-6034"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weijia Lu","raw_affiliation_strings":["United Automotive Electronic Systems Co.,AI Lab,Shanghai,China","AI Lab, United Automotive Electronic Systems Co., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"United Automotive Electronic Systems Co.,AI Lab,Shanghai,China","institution_ids":[]},{"raw_affiliation_string":"AI Lab, United Automotive Electronic Systems Co., Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100326615","display_name":"Chuang Liu","orcid":"https://orcid.org/0000-0002-9749-1592"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chuang Liu","raw_affiliation_strings":["United Automotive Electronic Systems Co.,AI Lab,Shanghai,China","AI Lab, United Automotive Electronic Systems Co., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"United Automotive Electronic Systems Co.,AI Lab,Shanghai,China","institution_ids":[]},{"raw_affiliation_string":"AI Lab, United Automotive Electronic Systems Co., Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100699934","display_name":"Lin Sun","orcid":"https://orcid.org/0000-0002-8911-1596"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin Sun","raw_affiliation_strings":["United Automotive Electronic Systems Co.,AI Lab,Shanghai,China","AI Lab, United Automotive Electronic Systems Co., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"United Automotive Electronic Systems Co.,AI Lab,Shanghai,China","institution_ids":[]},{"raw_affiliation_string":"AI Lab, United Automotive Electronic Systems Co., Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100366205","display_name":"Si Chen","orcid":"https://orcid.org/0000-0002-8202-8634"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Si Chen","raw_affiliation_strings":["School of Medicine, Shanghai University,Shanghai,China","School of Medicine, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Medicine, Shanghai University,Shanghai,China","institution_ids":["https://openalex.org/I113940042"]},{"raw_affiliation_string":"School of Medicine, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101738280"],"corresponding_institution_ids":["https://openalex.org/I141962983"],"apc_list":null,"apc_paid":null,"fwci":0.6486,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61415462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.8745321035385132},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7983719706535339},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7928833365440369},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7083027958869934},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6748074293136597},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.6034113764762878},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4564201831817627},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4502998888492584},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4399726986885071},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4375385642051697},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.4260454773902893},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4164181351661682},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3285551071166992},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32345855236053467},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.09911149740219116},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.0727321207523346}],"concepts":[{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.8745321035385132},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7983719706535339},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7928833365440369},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7083027958869934},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6748074293136597},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.6034113764762878},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4564201831817627},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4502998888492584},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4399726986885071},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4375385642051697},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.4260454773902893},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4164181351661682},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3285551071166992},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32345855236053467},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.09911149740219116},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0727321207523346},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn55064.2022.9892744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn55064.2022.9892744","pdf_url":null,"source":{"id":"https://openalex.org/S4363607707","display_name":"2022 International Joint Conference on Neural Networks (IJCNN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6700000166893005,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W6091113","https://openalex.org/W1945616565","https://openalex.org/W1965334909","https://openalex.org/W2001107211","https://openalex.org/W2115627867","https://openalex.org/W2115940646","https://openalex.org/W2240944347","https://openalex.org/W2362505794","https://openalex.org/W2521028896","https://openalex.org/W2599354622","https://openalex.org/W2728426605","https://openalex.org/W2762776925","https://openalex.org/W2785678896","https://openalex.org/W2787947370","https://openalex.org/W2800547013","https://openalex.org/W2887679736","https://openalex.org/W2902758299","https://openalex.org/W2909444216","https://openalex.org/W2914170343","https://openalex.org/W2955045650","https://openalex.org/W2963045681","https://openalex.org/W2963391384","https://openalex.org/W2963470893","https://openalex.org/W2963564844","https://openalex.org/W4294568686","https://openalex.org/W4320013936","https://openalex.org/W4383466480","https://openalex.org/W6600247753","https://openalex.org/W6640425456","https://openalex.org/W6690419059","https://openalex.org/W6715501732","https://openalex.org/W6727501944","https://openalex.org/W6737043114","https://openalex.org/W6748495906","https://openalex.org/W6748582592","https://openalex.org/W6750945596","https://openalex.org/W6751917112","https://openalex.org/W6765297118"],"related_works":["https://openalex.org/W2995777218","https://openalex.org/W2435146791","https://openalex.org/W2742053845","https://openalex.org/W2363068348","https://openalex.org/W2183239701","https://openalex.org/W2901647851","https://openalex.org/W2368329025","https://openalex.org/W2355532322","https://openalex.org/W2061466315","https://openalex.org/W3157271777"],"abstract_inverted_index":{"As":[0],"an":[1,30,50,90],"active":[2],"network":[3,17,24,57,98,117],"security":[4],"protection":[5],"scheme,":[6],"intrusion":[7,45,52,92],"detection":[8,27,46,53,93],"system":[9],"(IDS)":[10],"undertakes":[11],"the":[12,20,114,120,138,147,150],"important":[13,31],"responsibility":[14],"of":[15,22,33,140,161],"detecting":[16],"attacks":[18],"in":[19,108,119],"form":[21],"malicious":[23,104,116,125,144],"traffic.":[25,105,145],"Intrusion":[26],"technology":[28],"is":[29,60,110,128],"part":[32],"IDS.":[34],"At":[35,146],"present,":[36],"many":[37],"scholars":[38],"have":[39,68],"carried":[40],"out":[41],"extensive":[42],"research":[43],"on":[44],"technology.":[47],"However,":[48],"developing":[49],"efficient":[51],"method":[54],"for":[55,72,80,112],"massive":[56],"traffic":[58,102,118,165],"data":[59],"still":[61],"difficult.":[62],"Since":[63],"Generative":[64],"Adversarial":[65],"Networks":[66],"(GANs)":[67],"powerful":[69],"modeling":[70],"capabilities":[71],"complex":[73],"high-dimensional":[74],"data,":[75],"they":[76],"provide":[77],"new":[78],"ideas":[79],"addressing":[81],"this":[82,85],"problem.":[83],"In":[84],"paper,":[86],"we":[87,130],"put":[88],"forward":[89],"EBGAN-based":[91],"method,":[94],"IDS-EBGAN,":[95],"that":[96],"classifies":[97],"records":[99],"as":[100],"normal":[101],"or":[103],"The":[106],"generator":[107],"IDS-EBGAN":[109,157],"responsible":[111],"converting":[113],"original":[115],"training":[121],"set":[122],"into":[123],"adversarial":[124,134],"examples.":[126],"This":[127],"because":[129],"want":[131],"to":[132,136,142,163],"use":[133],"learning":[135],"improve":[137],"ability":[139],"discriminator":[141,151,162],"detect":[143],"same":[148],"time,":[149],"adopts":[152],"Autoencoder":[153],"model.":[154],"During":[155],"testing,":[156],"uses":[158],"reconstruction":[159],"error":[160],"classify":[164],"records.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
