{"id":"https://openalex.org/W4206534607","doi":"https://doi.org/10.1109/uemcon53757.2021.9666607","title":"Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid","display_name":"Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4206534607","doi":"https://doi.org/10.1109/uemcon53757.2021.9666607"},"language":"en","primary_location":{"id":"doi:10.1109/uemcon53757.2021.9666607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon53757.2021.9666607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019676675","display_name":"Tala Talaei Khoei","orcid":"https://orcid.org/0000-0002-7630-9034"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tala Talaei Khoei","raw_affiliation_strings":["School of Electrical Engineering and Computer Science University of North Dakota, Grand Forks, ND, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science University of North Dakota, Grand Forks, ND, USA","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029165876","display_name":"Shereen Ismail","orcid":"https://orcid.org/0000-0001-8580-1648"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shereen Ismail","raw_affiliation_strings":["School of Electrical Engineering and Computer Science University of North Dakota, Grand Forks, ND, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science University of North Dakota, Grand Forks, ND, USA","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071211423","display_name":"Naima Kaabouch","orcid":null},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naima Kaabouch","raw_affiliation_strings":["School of Electrical Engineering and Computer Science University of North Dakota, Grand Forks, ND, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science University of North Dakota, Grand Forks, ND, USA","institution_ids":["https://openalex.org/I24571045"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019676675"],"corresponding_institution_ids":["https://openalex.org/I24571045"],"apc_list":null,"apc_paid":null,"fwci":2.7507,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.90826717,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"0165","last_page":"0170"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.7870841026306152},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7806739211082458},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6460688710212708},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6289526224136353},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6032682657241821},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5246655941009521},{"id":"https://openalex.org/keywords/gradient-boosting","display_name":"Gradient boosting","score":0.5043367147445679},{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.5022034645080566},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.48250865936279297},{"id":"https://openalex.org/keywords/hyperparameter-optimization","display_name":"Hyperparameter optimization","score":0.4622402489185333},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4564618170261383},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.44897475838661194},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4372757077217102},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.4198690950870514},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4185028672218323},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.3270597457885742}],"concepts":[{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.7870841026306152},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7806739211082458},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6460688710212708},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6289526224136353},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6032682657241821},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5246655941009521},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.5043367147445679},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.5022034645080566},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.48250865936279297},{"id":"https://openalex.org/C10485038","wikidata":"https://www.wikidata.org/wiki/Q48996162","display_name":"Hyperparameter optimization","level":3,"score":0.4622402489185333},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4564618170261383},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.44897475838661194},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4372757077217102},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.4198690950870514},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4185028672218323},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.3270597457885742}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/uemcon53757.2021.9666607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon53757.2021.9666607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2106411961","https://openalex.org/W2141019052","https://openalex.org/W2343828539","https://openalex.org/W2918639172","https://openalex.org/W2945020349","https://openalex.org/W2948755796","https://openalex.org/W2955014922","https://openalex.org/W2972618277","https://openalex.org/W2998420555","https://openalex.org/W3013132172","https://openalex.org/W3081710839","https://openalex.org/W3091379954","https://openalex.org/W3102142968","https://openalex.org/W3164105561","https://openalex.org/W3186003301","https://openalex.org/W3199447623","https://openalex.org/W3209101438","https://openalex.org/W6676179485"],"related_works":["https://openalex.org/W4382315444","https://openalex.org/W4233259193","https://openalex.org/W4385447970","https://openalex.org/W2600353413","https://openalex.org/W4390916549","https://openalex.org/W2915435096","https://openalex.org/W3208169454","https://openalex.org/W4298012357","https://openalex.org/W3210229324","https://openalex.org/W4381298925"],"abstract_inverted_index":{"Smart":[0],"grid":[1,95],"is":[2,22,33,100,148,163],"an":[3],"emerging":[4],"technology":[5],"that":[6,199],"transfers":[7],"power":[8],"to":[9,24,29,45,165,184],"users":[10],"intelligently":[11],"through":[12],"two-way":[13],"communication.":[14],"Despite":[15],"the":[16,34,47,72,77,119,167,173,178,186,200,204,209,214,220],"benefits":[17],"of":[18,36,49,79,106,109,113,118,125,145,219],"this":[19,31],"network,":[20],"it":[21],"prone":[23],"different":[25],"cyber-attacks.":[26],"One":[27],"solution":[28],"address":[30,67],"issue":[32],"use":[35],"intrusion":[37],"detection":[38,55],"systems.":[39],"Several":[40],"studies":[41,63],"have":[42],"been":[43],"conducted":[44,101],"investigate":[46,76],"shortcomings":[48],"such":[50],"system,":[51],"which":[52],"include":[53],"low":[54],"rates":[56],"and":[57,87,111,139,156,192,208],"high":[58],"false":[59,114],"alarms;":[60],"however,":[61],"these":[62,68],"did":[64],"not":[65],"completely":[66],"issues.":[69],"Motivated":[70],"by":[71],"existing":[73],"gaps,":[74],"we":[75],"performance":[78,98],"boosting-based":[80,201],"models,":[81,132,207],"namely":[82,133],"Adaptive":[83],"Boosting,":[84,86,89],"Gradient":[85],"Categorical":[88,210],"in":[90,217],"detecting":[91],"cyber-attacks":[92],"on":[93,103],"smart":[94],"networks.":[96],"The":[97,116,143,158,196],"evaluation":[99],"based":[102],"accuracy,":[104],"probability":[105,108,112],"detection,":[107],"misdetection,":[110],"alarm.":[115],"results":[117,197,216],"models":[120,202],"were":[121],"compared":[122],"with":[123],"those":[124],"three":[126,205],"widely":[127],"used":[128,164,177],"traditional":[129,206],"machine":[130],"learning":[131],"support":[134],"vector":[135],"machine,":[136],"na\u00efve":[137],"Bayes,":[138],"K":[140],"nearest":[141],"neighbor.":[142],"benchmark":[144],"CICDDoS":[146],"2019":[147],"selected":[149],"as":[150],"a":[151],"dataset":[152],"for":[153,171,189],"training,":[154],"validation,":[155],"testing.":[157],"ReliefF":[159],"feature":[160],"selection":[161],"technique":[162,183],"identify":[166],"most":[168],"important":[169],"features":[170],"training":[172],"models.":[174],"We":[175],"also":[176],"Tree-structured":[179],"Parzen":[180],"Estimator":[181],"optimization":[182],"find":[185],"best":[187,215],"hyperparameters":[188],"each":[190],"model":[191],"ensure":[193],"optimal":[194],"performance.":[195],"show":[198],"outperform":[203],"Boosting":[211],"classifier":[212],"has":[213],"terms":[218],"four-evaluation":[221],"metrics.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
