{"id":"https://openalex.org/W7125939705","doi":"https://doi.org/10.1109/smc58881.2025.11343430","title":"Dynamic Feedback-Based Cost-Sensitive Learning for Imbalanced Intrusion Detection","display_name":"Dynamic Feedback-Based Cost-Sensitive Learning for Imbalanced Intrusion Detection","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125939705","doi":"https://doi.org/10.1109/smc58881.2025.11343430"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343430","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343430","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124053392","display_name":"Xiaohang Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I1308199089","display_name":"Harbin University","ror":"https://ror.org/00ey9xa07","country_code":"CN","type":"education","lineage":["https://openalex.org/I1308199089"]},{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaohang Ma","raw_affiliation_strings":["Harbin Engineering University,College of Computer Science,Harbin,China"],"affiliations":[{"raw_affiliation_string":"Harbin Engineering University,College of Computer Science,Harbin,China","institution_ids":["https://openalex.org/I1308199089","https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103160491","display_name":"Lin Yang","orcid":"https://orcid.org/0000-0001-9056-0500"},"institutions":[{"id":"https://openalex.org/I2802541053","display_name":"Academy of Military Medical Sciences","ror":"https://ror.org/02bv3c993","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2802541053"]},{"id":"https://openalex.org/I4210158522","display_name":"PLA Academy of Military Science","ror":"https://ror.org/05ct4s596","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210158522"]},{"id":"https://openalex.org/I4210160531","display_name":"Chinese People's Liberation Army","ror":"https://ror.org/05tf9r976","country_code":"CN","type":"funder","lineage":["https://openalex.org/I4210160531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Yang","raw_affiliation_strings":["Academy of Military Sciences of the People&#x2019;s Liberation Army Institute of Systems Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Academy of Military Sciences of the People&#x2019;s Liberation Army Institute of Systems Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210160531","https://openalex.org/I2802541053","https://openalex.org/I4210158522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101954148","display_name":"Huiqiang Wang","orcid":"https://orcid.org/0000-0001-9177-3516"},"institutions":[{"id":"https://openalex.org/I1308199089","display_name":"Harbin University","ror":"https://ror.org/00ey9xa07","country_code":"CN","type":"education","lineage":["https://openalex.org/I1308199089"]},{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiqiang Wang","raw_affiliation_strings":["Harbin Engineering University,College of Computer Science,Harbin,China"],"affiliations":[{"raw_affiliation_string":"Harbin Engineering University,College of Computer Science,Harbin,China","institution_ids":["https://openalex.org/I1308199089","https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5124053392"],"corresponding_institution_ids":["https://openalex.org/I1308199089","https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74831877,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2135","last_page":"2142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6200000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6200000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.16869999468326569,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.06830000132322311,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7713000178337097},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5968999862670898},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5156000256538391},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4375},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4374000132083893},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.41760000586509705},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.39910000562667847},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.3610999882221222}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7713000178337097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7185999751091003},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5968999862670898},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.557699978351593},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5494999885559082},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5156000256538391},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4717999994754791},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4375},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4374000132083893},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.41760000586509705},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.39910000562667847},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.32910001277923584},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3273000121116638},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.3149000108242035},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.30550000071525574},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C2780735816","wikidata":"https://www.wikidata.org/wiki/Q28324931","display_name":"Incremental learning","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C34872919","wikidata":"https://www.wikidata.org/wiki/Q7092302","display_name":"One-class classification","level":3,"score":0.25360000133514404},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343430","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343430","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8011710047721863,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2971644666","https://openalex.org/W3126752450","https://openalex.org/W3127988644","https://openalex.org/W3157699413","https://openalex.org/W3185843640","https://openalex.org/W3193024002","https://openalex.org/W3205323312","https://openalex.org/W4210743106","https://openalex.org/W4224126807","https://openalex.org/W4226125749","https://openalex.org/W4285236097","https://openalex.org/W4297984369","https://openalex.org/W4308206750","https://openalex.org/W4324291260","https://openalex.org/W4386376682","https://openalex.org/W4388998045","https://openalex.org/W4391092624","https://openalex.org/W4392029839","https://openalex.org/W4392907926","https://openalex.org/W4394731082"],"related_works":[],"abstract_inverted_index":{"In":[0],"network":[1],"intrusion":[2],"detection":[3,13,37,120],"systems,":[4],"the":[5,64,71,98,102,113,119],"persistent":[6],"challenge":[7],"of":[8,73,101,122],"class":[9,124,134],"imbalance":[10],"critically":[11],"undermines":[12],"efficacy":[14],"for":[15,132],"minority":[16,123],"attacks.":[17,48,135],"To":[18],"address":[19],"this,":[20],"we":[21,50],"propose":[22],"a":[23,35,52,79],"Dynamic":[24],"Feedback":[25],"Based":[26],"Cost":[27],"Sensitive":[28],"Learning":[29],"(DFCSL)":[30],"method.":[31],"This":[32],"method":[33,115],"employs":[34],"two-stage":[36],"framework":[38],"to":[39,89],"achieve":[40],"hierarchical":[41],"classification":[42],"between":[43],"normal":[44],"traffic":[45],"and":[46,96,110],"anomalous":[47],"Additionally,":[49],"introduce":[51],"dynamic":[53],"weight":[54,76],"update":[55],"mechanism":[56],"based":[57,83],"on":[58,67,84,106],"recall":[59],"feedback,":[60],"which":[61],"adaptively":[62],"enhances":[63],"model\u2019s":[65],"focus":[66],"hard-to-recognize":[68],"categories,":[69],"mitigating":[70],"limitations":[72],"traditional":[74],"static":[75],"settings.":[77],"Moreover,":[78],"feature":[80],"selection":[81],"strategy":[82],"Shapley":[85],"values":[86],"is":[87],"designed":[88],"identify":[90],"high-discriminative":[91],"features,":[92],"reduce":[93],"input":[94],"dimensionality,":[95],"lower":[97],"computational":[99],"cost":[100],"model.":[103],"Experiments":[104],"conducted":[105],"three":[107],"datasets\u2014CICIDS2017,":[108],"CSE-CIC-IDS2018,":[109],"CIDDS-001":[111],"that":[112],"proposed":[114],"not":[116],"only":[117],"improves":[118],"performance":[121],"attacks":[125],"but":[126],"also":[127],"maintains":[128],"strong":[129],"recognition":[130],"capabilities":[131],"majority":[133]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
