{"id":"https://openalex.org/W4376478409","doi":"https://doi.org/10.1109/wcnc55385.2023.10118898","title":"Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method","display_name":"Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method","publication_year":2023,"publication_date":"2023-03-01","ids":{"openalex":"https://openalex.org/W4376478409","doi":"https://doi.org/10.1109/wcnc55385.2023.10118898"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc55385.2023.10118898","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc55385.2023.10118898","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108660469","display_name":"Zhixin Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhixin Shi","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008048057","display_name":"Mengyan Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengyan Xing","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100345524","display_name":"Jing Zhang","orcid":"https://orcid.org/0009-0008-1485-6025"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072179387","display_name":"Bingchao Wu","orcid":"https://orcid.org/0000-0002-8164-4240"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"B Hao Wu","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,Beijing,China,100049","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108660469"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":3.0137,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91648237,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8194919228553772},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.730506181716919},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.6817330121994019},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.57421875},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49025896191596985},{"id":"https://openalex.org/keywords/economic-shortage","display_name":"Economic shortage","score":0.44821494817733765},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.44591617584228516},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4272422194480896},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39349520206451416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3328521251678467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8194919228553772},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.730506181716919},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.6817330121994019},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.57421875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49025896191596985},{"id":"https://openalex.org/C194051981","wikidata":"https://www.wikidata.org/wiki/Q1337691","display_name":"Economic shortage","level":3,"score":0.44821494817733765},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.44591617584228516},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4272422194480896},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39349520206451416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3328521251678467},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc55385.2023.10118898","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc55385.2023.10118898","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2789828921","https://openalex.org/W2890840584","https://openalex.org/W2900293028","https://openalex.org/W2917792613","https://openalex.org/W2959003478","https://openalex.org/W2964105864","https://openalex.org/W3021740526","https://openalex.org/W3032021129","https://openalex.org/W3034354010","https://openalex.org/W3034942609","https://openalex.org/W3111160948","https://openalex.org/W3116271006","https://openalex.org/W3119207006","https://openalex.org/W3126814579","https://openalex.org/W3138725786","https://openalex.org/W3179719546","https://openalex.org/W3197914403","https://openalex.org/W4205088899","https://openalex.org/W4206490792","https://openalex.org/W4308088478"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Network":[0],"Intrusion":[1],"Detection":[2],"(NID)":[3],"plays":[4],"an":[5,107],"important":[6],"role":[7],"in":[8,73,119,180],"identifying":[9],"network":[10,102],"threats":[11],"and":[12,18,97,104,139,183],"ensuring":[13],"the":[14,22,36,58,66,90,111,120,124,129,140,145,152,162,171,185],"security":[15],"of":[16,38,173,189],"computer":[17],"communication":[19],"systems.":[20],"However,":[21],"existing":[23],"NID":[24,75,86,112],"methods":[25,31,51,63],"face":[26],"two":[27],"shortages:":[28],"1)":[29],"Most":[30],"are":[32],"data-hungry":[33],"without":[34],"considering":[35],"difficulty":[37],"collecting":[39],"anomaly":[40],"traffic":[41,103],"data,":[42],"such":[43],"as":[44],"zero-day":[45],"attacks.":[46],"2)":[47],"Few-shot":[48],"Learning":[49],"(FSL)-based":[50],"have":[52],"been":[53],"proposed":[54],"recently":[55],"to":[56,88,135,142,144,155,159,169],"relieve":[57],"first":[59],"problem.":[60],"Whereas":[61],"these":[62],"rely":[64],"on":[65,176],"specific":[67],"model,":[68],"leading":[69,134],"their":[70],"universality":[71],"unsatisfactory":[72],"different":[74],"application":[76],"scenarios.":[77],"Then,":[78],"we":[79,150],"propose":[80],"a":[81],"few-shot":[82,125,177],"Model-Agnostic":[83],"Meta-Learning":[84],"(MAML)":[85],"framework":[87],"tackle":[89],"above":[91],"challenges.":[92],"We":[93,165],"extract":[94],"both":[95],"statistical":[96],"sequence":[98],"features":[99],"from":[100],"raw":[101],"explicitly":[105],"find":[106],"optimal":[108,146],"solution":[109],"for":[110],"model":[113],"by":[114],"constructing":[115],"intrusion":[116],"detection":[117,187],"tasks":[118,138,179],"2-way":[121],"K-shot":[122],"under":[123],"learning":[126],"settings.":[127],"Unfortunately,":[128],"MAML":[130],"forcibly":[131],"shares":[132],"initialization,":[133],"conflicts":[136],"among":[137],"inability":[141],"converge":[143],"position":[147],"quickly.":[148],"Therefore,":[149],"introduce":[151],"L2F":[153],"(Learn":[154],"Forget)":[156],"attenuation":[157],"mechanism":[158],"dynamically":[160],"control":[161],"conflicts\u2019":[163],"influence.":[164],"conduct":[166],"sufficient":[167],"experiments":[168],"validate":[170],"suitability":[172],"our":[174],"method":[175],"new":[178],"various":[181],"models":[182],"achieve":[184],"highest":[186],"rate":[188],"98.68%":[190],"with":[191],"2K":[192],"(K=5,10,15)":[193],"training":[194],"samples.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
