{"id":"https://openalex.org/W4286579686","doi":"https://doi.org/10.1109/tnsm.2022.3193099","title":"Improving the Stability of Intrusion Detection With Causal Deep Learning","display_name":"Improving the Stability of Intrusion Detection With Causal Deep Learning","publication_year":2022,"publication_date":"2022-07-22","ids":{"openalex":"https://openalex.org/W4286579686","doi":"https://doi.org/10.1109/tnsm.2022.3193099"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3193099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3193099","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028312915","display_name":"Zengri Zeng","orcid":"https://orcid.org/0000-0002-5329-0713"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I257545875","display_name":"Hunan University of Humanities, Science and Technology","ror":"https://ror.org/00s7jmd98","country_code":"CN","type":"education","lineage":["https://openalex.org/I257545875"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zengri Zeng","raw_affiliation_strings":["College of Computers, National University of Defense Technology, Changsha, China","Information Institute, Hunan University of Humanities, Science and Technology, Loudi, China"],"raw_orcid":"https://orcid.org/0000-0002-5329-0713","affiliations":[{"raw_affiliation_string":"College of Computers, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Information Institute, Hunan University of Humanities, Science and Technology, Loudi, China","institution_ids":["https://openalex.org/I257545875"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060299343","display_name":"Wei Peng","orcid":"https://orcid.org/0000-0002-5456-9126"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Peng","raw_affiliation_strings":["College of Computers, National University of Defense Technology, Changsha, China"],"raw_orcid":"https://orcid.org/0000-0002-5456-9126","affiliations":[{"raw_affiliation_string":"College of Computers, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015192898","display_name":"Detian Zeng","orcid":"https://orcid.org/0000-0002-9984-2544"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Detian Zeng","raw_affiliation_strings":["College of Computers, National University of Defense Technology, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computers, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028312915"],"corresponding_institution_ids":["https://openalex.org/I170215575","https://openalex.org/I257545875"],"apc_list":null,"apc_paid":null,"fwci":3.8522,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.93650993,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":"4","first_page":"4750","last_page":"4763"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6880493760108948},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6692571640014648},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6361932754516602},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.6064982414245605},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5706755518913269},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.5567091107368469},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5358712673187256},{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.5107085704803467},{"id":"https://openalex.org/keywords/independent-and-identically-distributed-random-variables","display_name":"Independent and identically distributed random variables","score":0.5085984468460083},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.502427339553833},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.49509039521217346},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.45074397325515747},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4467655420303345},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4401931166648865},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3922179341316223},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.3300771713256836},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2457444965839386},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.23392724990844727},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.0941145122051239}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6880493760108948},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6692571640014648},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6361932754516602},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.6064982414245605},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5706755518913269},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.5567091107368469},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5358712673187256},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.5107085704803467},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.5085984468460083},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.502427339553833},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.49509039521217346},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.45074397325515747},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4467655420303345},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4401931166648865},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3922179341316223},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.3300771713256836},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2457444965839386},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.23392724990844727},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.0941145122051239},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3193099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3193099","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5214302469","display_name":null,"funder_award_id":"2018YFB0204301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G86431414","display_name":null,"funder_award_id":"61972412","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W1593532658","https://openalex.org/W2034368206","https://openalex.org/W2044413922","https://openalex.org/W2094247393","https://openalex.org/W2120708938","https://openalex.org/W2150291618","https://openalex.org/W2168639902","https://openalex.org/W2301895347","https://openalex.org/W2365899926","https://openalex.org/W2549287880","https://openalex.org/W2553902701","https://openalex.org/W2605326574","https://openalex.org/W2791751764","https://openalex.org/W2800017313","https://openalex.org/W2807992610","https://openalex.org/W2883325838","https://openalex.org/W2887788426","https://openalex.org/W2921112192","https://openalex.org/W2946893466","https://openalex.org/W2947802941","https://openalex.org/W2964254462","https://openalex.org/W2971290869","https://openalex.org/W2979434725","https://openalex.org/W2982682021","https://openalex.org/W2990138404","https://openalex.org/W2990225485","https://openalex.org/W2990352665","https://openalex.org/W2991435551","https://openalex.org/W2991507433","https://openalex.org/W2997746169","https://openalex.org/W2999585430","https://openalex.org/W3007182219","https://openalex.org/W3033161486","https://openalex.org/W3048313003","https://openalex.org/W3093410479","https://openalex.org/W3098861849","https://openalex.org/W3101894954","https://openalex.org/W3104279392","https://openalex.org/W3105258945","https://openalex.org/W3109831211","https://openalex.org/W3115396879","https://openalex.org/W3116162237","https://openalex.org/W3118220620","https://openalex.org/W3119693685","https://openalex.org/W3123400100","https://openalex.org/W3123908207","https://openalex.org/W3173345136","https://openalex.org/W3180303049","https://openalex.org/W3191697454","https://openalex.org/W3209432575","https://openalex.org/W3211144245","https://openalex.org/W3211805421","https://openalex.org/W4200461502","https://openalex.org/W4210250501","https://openalex.org/W4288287305","https://openalex.org/W4293192140","https://openalex.org/W4295126650","https://openalex.org/W4313190639","https://openalex.org/W4379653734","https://openalex.org/W6697462184","https://openalex.org/W6721021555","https://openalex.org/W6760368646","https://openalex.org/W6762796984","https://openalex.org/W6765285020","https://openalex.org/W6779587728","https://openalex.org/W6783582129","https://openalex.org/W6785607060","https://openalex.org/W6809981129"],"related_works":["https://openalex.org/W3004218185","https://openalex.org/W4390241083","https://openalex.org/W3162204513","https://openalex.org/W4245457074","https://openalex.org/W2323735050","https://openalex.org/W2347733609","https://openalex.org/W2912990606","https://openalex.org/W1717256175","https://openalex.org/W2951342029","https://openalex.org/W2371138613"],"abstract_inverted_index":{"Due":[0],"to":[1,21,92,109,137,140],"factors":[2],"such":[3],"as":[4],"differing":[5],"distributions":[6],"of":[7,27,29,46,103,117,124,187],"training":[8,161],"data":[9],"and":[10,17,25,44,78,83,120,162,168,178],"test":[11],"data,":[12],"false":[13,87],"associations":[14,19],"between":[15,75,86,112],"features":[16,77,177],"weight":[18],"lead":[20],"unstable":[22],"detection":[23,32,49,126],"performance":[24],"lack":[26],"generalization":[28,45,123],"network":[30,143,157],"intrusion":[31],"systems":[33],"(NIDSs)":[34],"based":[35,51],"on":[36,52],"machine":[37],"learning":[38,55],"(ML).":[39],"To":[40],"improve":[41,93,121],"the":[42,67,73,84,94,98,104,115,122,125,129,160,184,188],"stability":[43,95,154,186],"NIDSs,":[47],"a":[48],"system":[50,150,189],"causal":[53,62,71,76,118,179],"deep":[54],"is":[56],"proposed":[57],"in":[58,155],"this":[59],"paper.":[60],"First,":[61],"weights":[63],"were":[64],"optimized":[65],"by":[66,134,191],"propensity":[68],"score":[69],"through":[70],"effects,":[72],"correlation":[74,85,88],"attack":[79],"labels":[80],"was":[81,90,107,132],"increased,":[82],"variables":[89],"weakened":[91],"performance.":[96],"Second,":[97],"approximate":[99],"numerical":[100],"optimization":[101],"method":[102],"Tammes":[105],"problem":[106],"used":[108],"remove":[110],"correlations":[111],"weights,":[113],"maintain":[114],"independence":[116],"features,":[119,183],"system.":[127],"Last,":[128],"feature":[130],"distribution":[131],"disrupted":[133],"adding":[135],"noise":[136],"four":[138],"datasets":[139,164],"simulate":[141],"different":[142],"environments.":[144],"The":[145],"results":[146],"showed":[147],"that":[148],"our":[149],"can":[151],"achieve":[152],"good":[153],"various":[156],"environments":[158],"where":[159],"testing":[163],"are":[165],"not":[166],"independently":[167],"identically":[169],"distributed.":[170],"In":[171],"particular,":[172],"after":[173],"applying":[174],"binary":[175],"coding":[176],"intervention":[180],"(CIT)":[181],"screening":[182],"average":[185],"improved":[190],"more":[192],"than":[193],"10%.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
