{"id":"https://openalex.org/W4226076258","doi":"https://doi.org/10.1109/tr.2022.3164877","title":"Intrusion Detection System After Data Augmentation Schemes Based on the VAE and CVAE","display_name":"Intrusion Detection System After Data Augmentation Schemes Based on the VAE and CVAE","publication_year":2022,"publication_date":"2022-04-22","ids":{"openalex":"https://openalex.org/W4226076258","doi":"https://doi.org/10.1109/tr.2022.3164877"},"language":"en","primary_location":{"id":"doi:10.1109/tr.2022.3164877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2022.3164877","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042017541","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0003-2485-1339"},"institutions":[{"id":"https://openalex.org/I79223203","display_name":"Guangdong Ocean University","ror":"https://ror.org/0462wa640","country_code":"CN","type":"education","lineage":["https://openalex.org/I79223203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chang Liu","raw_affiliation_strings":["Institute of Electronics and Information Engineering, Guangdong Ocean University, Zhanjiang, China"],"raw_orcid":"https://orcid.org/0000-0003-2485-1339","affiliations":[{"raw_affiliation_string":"Institute of Electronics and Information Engineering, Guangdong Ocean University, Zhanjiang, China","institution_ids":["https://openalex.org/I79223203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066666464","display_name":"Ruslan Antypenko","orcid":"https://orcid.org/0000-0002-8931-1977"},"institutions":[{"id":"https://openalex.org/I202483615","display_name":"National Technical University of Ukraine \u201cIgor Sikorsky Kyiv Polytechnic Institute\u201d","ror":"https://ror.org/00syn5v21","country_code":"UA","type":"education","lineage":["https://openalex.org/I202483615"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Ruslan Antypenko","raw_affiliation_strings":["Radio Engineering Faculty, National Technical University of Ukraine &#x201C;Igor Sikorsky Kyiv Polytechnic Institute,&#x201D;, Kyiv, Ukraine"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Radio Engineering Faculty, National Technical University of Ukraine &#x201C;Igor Sikorsky Kyiv Polytechnic Institute,&#x201D;, Kyiv, Ukraine","institution_ids":["https://openalex.org/I202483615"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085576419","display_name":"Iryna Sushko","orcid":"https://orcid.org/0000-0001-5879-0699"},"institutions":[{"id":"https://openalex.org/I202483615","display_name":"National Technical University of Ukraine \u201cIgor Sikorsky Kyiv Polytechnic Institute\u201d","ror":"https://ror.org/00syn5v21","country_code":"UA","type":"education","lineage":["https://openalex.org/I202483615"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Iryna Sushko","raw_affiliation_strings":["Radio Engineering Faculty, National Technical University of Ukraine &#x201C;Igor Sikorsky Kyiv Polytechnic Institute,&#x201D;, Kyiv, Ukraine"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Radio Engineering Faculty, National Technical University of Ukraine &#x201C;Igor Sikorsky Kyiv Polytechnic Institute,&#x201D;, Kyiv, Ukraine","institution_ids":["https://openalex.org/I202483615"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103177792","display_name":"Oksana Zakharchenko","orcid":"https://orcid.org/0000-0002-1604-0416"},"institutions":[{"id":"https://openalex.org/I202483615","display_name":"National Technical University of Ukraine \u201cIgor Sikorsky Kyiv Polytechnic Institute\u201d","ror":"https://ror.org/00syn5v21","country_code":"UA","type":"education","lineage":["https://openalex.org/I202483615"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oksana Zakharchenko","raw_affiliation_strings":["Radio Engineering Faculty, National Technical University of Ukraine &#x201C;Igor Sikorsky Kyiv Polytechnic Institute,&#x201D;, Kyiv, Ukraine"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Radio Engineering Faculty, National Technical University of Ukraine &#x201C;Igor Sikorsky Kyiv Polytechnic Institute,&#x201D;, Kyiv, Ukraine","institution_ids":["https://openalex.org/I202483615"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5042017541"],"corresponding_institution_ids":["https://openalex.org/I79223203"],"apc_list":null,"apc_paid":null,"fwci":14.3923,"has_fulltext":false,"cited_by_count":117,"citation_normalized_percentile":{"value":0.99309883,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"71","issue":"2","first_page":"1000","last_page":"1010"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8079587817192078},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6331637501716614},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5784337520599365},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5726074576377869},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5457148551940918},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5324170589447021},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5238276124000549},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47146469354629517},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.46868470311164856},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41818612813949585},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09821245074272156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0876496434211731}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8079587817192078},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6331637501716614},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5784337520599365},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5726074576377869},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5457148551940918},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5324170589447021},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5238276124000549},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47146469354629517},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.46868470311164856},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41818612813949585},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09821245074272156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0876496434211731}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tr.2022.3164877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2022.3164877","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320324202","display_name":"Guangdong Science and Technology Department","ror":"https://ror.org/00tjzgn92"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1959608418","https://openalex.org/W1998205777","https://openalex.org/W2091917851","https://openalex.org/W2188365844","https://openalex.org/W2296509296","https://openalex.org/W2416799949","https://openalex.org/W2523077978","https://openalex.org/W2588585573","https://openalex.org/W2783190965","https://openalex.org/W2789828921","https://openalex.org/W2792614546","https://openalex.org/W2886509629","https://openalex.org/W2944210580","https://openalex.org/W2982853004","https://openalex.org/W2986055611","https://openalex.org/W2998722477","https://openalex.org/W3005805195","https://openalex.org/W3021740526","https://openalex.org/W3024905798","https://openalex.org/W3045473945","https://openalex.org/W3046138161","https://openalex.org/W3086419524","https://openalex.org/W3116162736","https://openalex.org/W3120448233","https://openalex.org/W3125540236","https://openalex.org/W3146023480","https://openalex.org/W3176980536","https://openalex.org/W3202080502","https://openalex.org/W3205971195","https://openalex.org/W3208232872","https://openalex.org/W3212620483","https://openalex.org/W6640963894","https://openalex.org/W6687045409","https://openalex.org/W6788271880"],"related_works":["https://openalex.org/W3013693939","https://openalex.org/W2159052453","https://openalex.org/W2566616303","https://openalex.org/W3131327266","https://openalex.org/W2734887215","https://openalex.org/W4297051394","https://openalex.org/W2669956259","https://openalex.org/W4249005693","https://openalex.org/W4392946183","https://openalex.org/W3088732000"],"abstract_inverted_index":{"Industrial":[0],"Internet":[1],"of":[2,24,83,169,183,194],"Things":[3],"(IoT)":[4],"is":[5,75],"the":[6,12,17,25,68,76,81,84,92,121,130,151,162,167,178,181,184,192,195],"most":[7],"rapidly":[8],"developing":[9],"industry":[10],"in":[11,67,110],"current":[13],"IoT":[14,30,71],"industry,":[15],"and":[16,42,52,56,133,141,191],"intrusion":[18,94],"detection":[19,95],"system":[20],"(IDS)":[21],"remains":[22],"one":[23],"key":[26,60],"technologies":[27],"for":[28],"industrial":[29,70],"security":[31],"protection.":[32],"Researchers":[33],"have":[34],"considered":[35],"applying":[36],"algorithms":[37],"such":[38],"as":[39],"machine":[40],"learning":[41,44],"deep":[43],"to":[45,48,57,165],"network":[46,54,93],"IDSs":[47],"cope":[49],"with":[50,150],"complex":[51],"changing":[53],"environments":[55],"automatically":[58],"extract":[59],"features":[61],"from":[62],"high-dimensional":[63],"feature":[64],"data.":[65],"However,":[66],"real":[69],"environment,":[72],"data":[73,99,116,171,175],"imbalance":[74],"main":[77],"factor":[78],"that":[79],"affects":[80],"performance":[82],"deep-learning-based":[85,152],"IDS.":[86,153],"In":[87,154],"this":[88,111,155],"article,":[89,112,156],"we":[90,157],"study":[91],"model":[96,187,198],"based":[97,119,128,137,160],"on":[98,120,129,138,161],"level.":[100],"Three":[101],"data-based":[102],"research":[103],"schemes":[104,147],"are":[105,114,148],"constructed":[106],"step":[107,109],"by":[108,189,200],"which":[113],"a":[115,125,134],"augmentation":[117],"scheme":[118,127,136],"variational":[122],"autoencoder":[123],"(VAE),":[124],"data-balancing":[126,135],"conditional":[131,142],"VAE,":[132],"random":[139],"undersampling":[140],"VAE.":[143],"The":[144],"three":[145,170],"data-level-based":[146],"combined":[149],"build":[158],"experiments":[159],"CSE-CIC-IDS2018":[163],"dataset":[164],"verify":[166],"effectiveness":[168],"processing":[172],"schemes.":[173],"After":[174],"enhancement":[176],"through":[177],"third":[179],"scheme,":[180],"Macro-F1-score":[182,193],"convolutional-neural-network-based":[185],"IDS":[186,197],"improved":[188,199],"3.75%":[190],"gated-recurrent-unit-based":[196],"5.32%.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":16},{"year":2025,"cited_by_count":52},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-11T08:15:01.531666","created_date":"2025-10-10T00:00:00"}
