{"id":"https://openalex.org/W3161369593","doi":"https://doi.org/10.1109/wcnc49053.2021.9417568","title":"A Novel Approach based on Lightweight Deep Neural Network for Network Intrusion Detection","display_name":"A Novel Approach based on Lightweight Deep Neural Network for Network Intrusion Detection","publication_year":2021,"publication_date":"2021-03-29","ids":{"openalex":"https://openalex.org/W3161369593","doi":"https://doi.org/10.1109/wcnc49053.2021.9417568","mag":"3161369593"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc49053.2021.9417568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc49053.2021.9417568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070155692","display_name":"Ruijie Zhao","orcid":"https://orcid.org/0000-0001-6168-8687"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruijie Zhao","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,Shanghai,China","School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,Shanghai,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101758076","display_name":"Zhaojie Li","orcid":"https://orcid.org/0009-0008-7280-4645"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaojie Li","raw_affiliation_strings":["College of Telecommunications and Information Engineering, NJUPT,Nanjing,China","College of Telecommunications and Information Engineering, NJUPT, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, NJUPT,Nanjing,China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"College of Telecommunications and Information Engineering, NJUPT, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062829885","display_name":"Zhi Xue","orcid":"https://orcid.org/0000-0003-2875-304X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Xue","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,Shanghai,China","School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,Shanghai,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016337773","display_name":"Tomoaki Ohtsuki","orcid":"https://orcid.org/0000-0003-3961-1426"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomoaki Ohtsuki","raw_affiliation_strings":["Keio University,Department of Information and Computer Science,Yokohama,Japan","Keio University, Yokohama, Japan"],"affiliations":[{"raw_affiliation_string":"Keio University,Department of Information and Computer Science,Yokohama,Japan","institution_ids":["https://openalex.org/I203951103"]},{"raw_affiliation_string":"Keio University, Yokohama, Japan","institution_ids":["https://openalex.org/I203951103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027367677","display_name":"Guan Gui","orcid":"https://orcid.org/0000-0003-3888-2881"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guan Gui","raw_affiliation_strings":["College of Telecommunications and Information Engineering, NJUPT,Nanjing,China","College of Telecommunications and Information Engineering, NJUPT, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, NJUPT,Nanjing,China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"College of Telecommunications and Information Engineering, NJUPT, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070155692"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":2.445,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.89106381,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8439086675643921},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7532945871353149},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6492183804512024},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5289732813835144},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5233803987503052},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5130552053451538},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.4773419201374054},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.47389712929725647},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.44640350341796875},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.44247204065322876},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4257395267486572},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4036681056022644},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35374099016189575},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3226155936717987},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21659612655639648},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0991969108581543}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8439086675643921},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7532945871353149},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6492183804512024},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5289732813835144},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5233803987503052},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5130552053451538},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.4773419201374054},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.47389712929725647},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.44640350341796875},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.44247204065322876},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4257395267486572},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4036681056022644},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35374099016189575},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3226155936717987},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21659612655639648},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0991969108581543},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc49053.2021.9417568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc49053.2021.9417568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322999","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2000226507","https://openalex.org/W2101109743","https://openalex.org/W2114563811","https://openalex.org/W2163967648","https://openalex.org/W2403762311","https://openalex.org/W2526518335","https://openalex.org/W2531409750","https://openalex.org/W2625602624","https://openalex.org/W2751399725","https://openalex.org/W2762776925","https://openalex.org/W2883780447","https://openalex.org/W2892556724","https://openalex.org/W2900713154","https://openalex.org/W2921453769","https://openalex.org/W2962851801","https://openalex.org/W2963163009","https://openalex.org/W2981598692","https://openalex.org/W2987656958","https://openalex.org/W2993809815","https://openalex.org/W2996900869","https://openalex.org/W3003174479","https://openalex.org/W3006541201","https://openalex.org/W3008695648","https://openalex.org/W3022413490","https://openalex.org/W3023365694","https://openalex.org/W3040552057","https://openalex.org/W3049287738","https://openalex.org/W6753767121"],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2987774938","https://openalex.org/W2566006169","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W4229499248","https://openalex.org/W4378874356","https://openalex.org/W2055733372","https://openalex.org/W2369811061"],"abstract_inverted_index":{"With":[0],"the":[1,6,21,49,55,64,101,139,145],"ubiquitous":[2],"network":[3,10,84],"applications":[4],"and":[5,36,106,117,144,155],"continuous":[7],"development":[8],"of":[9,51,67],"attack":[11],"technology,":[12],"all":[13],"social":[14],"circles":[15],"have":[16],"paid":[17],"close":[18],"attention":[19],"to":[20,121],"cyberspace":[22],"security.":[23,39],"Intrusion":[24],"detection":[25,135,156],"systems":[26,38],"(IDS)":[27],"plays":[28],"a":[29,45,60,75,80,90],"very":[30],"important":[31],"role":[32],"in":[33,48],"ensuring":[34],"computer":[35],"communication":[37],"Recently,":[40],"deep":[41,82],"learning":[42],"has":[43],"achieved":[44],"great":[46],"success":[47],"field":[50],"intrusion":[52,134],"detection.":[53],"However,":[54],"high":[56],"computational":[57,102,140],"complexity":[58],"poses":[59],"major":[61],"hurdle":[62],"for":[63,86,133],"practical":[65],"deployment":[66],"DL-based":[68],"models.":[69],"In":[70,110],"this":[71],"paper,":[72],"we":[73,112],"propose":[74],"novel":[76],"approach":[77],"based":[78],"on":[79],"lightweight":[81,91],"neural":[83],"(LNN)":[85],"IDS.":[87],"We":[88],"design":[89],"unit":[92],"that":[93,129],"can":[94],"fully":[95],"extract":[96],"data":[97],"features":[98],"while":[99],"reducing":[100],"burden":[103],"by":[104,142,148],"expanding":[105],"compressing":[107],"feature":[108],"maps.":[109],"addition,":[111],"use":[113],"inverse":[114],"residual":[115],"structure":[116],"channel":[118],"shuffle":[119],"operation":[120],"achieve":[122],"more":[123],"effective":[124],"training.":[125],"Experiment":[126],"results":[127],"show":[128],"our":[130],"proposed":[131],"model":[132,146],"not":[136],"only":[137],"reduces":[138],"cost":[141],"61.99%":[143],"size":[147],"58.84%,":[149],"but":[150],"also":[151],"achieves":[152],"satisfactory":[153],"accuracy":[154],"rate.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
