{"id":"https://openalex.org/W4385663167","doi":"https://doi.org/10.1142/s1469026823500232","title":"Anomaly Detection Algorithm for Heterogeneous Wireless Networks Based on Cascaded Convolutional Neural Networks","display_name":"Anomaly Detection Algorithm for Heterogeneous Wireless Networks Based on Cascaded Convolutional Neural Networks","publication_year":2023,"publication_date":"2023-08-08","ids":{"openalex":"https://openalex.org/W4385663167","doi":"https://doi.org/10.1142/s1469026823500232"},"language":"en","primary_location":{"id":"doi:10.1142/s1469026823500232","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1142/s1469026823500232","pdf_url":null,"source":{"id":"https://openalex.org/S206936884","display_name":"International Journal of Computational Intelligence and Applications","issn_l":"1469-0268","issn":["1469-0268","1757-5885"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311754","host_organization_name":"Imperial College Press","host_organization_lineage":["https://openalex.org/P4310311754"],"host_organization_lineage_names":["Imperial College Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Intelligence and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063629854","display_name":"Qiang Wu","orcid":"https://orcid.org/0000-0001-5641-2483"},"institutions":[{"id":"https://openalex.org/I4210111163","display_name":"Shanghai Open University","ror":"https://ror.org/027r7gj11","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210111163"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiang Wu","raw_affiliation_strings":["School of Information Technology, Jiangsu Open University, Nanjing 210036, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Jiangsu Open University, Nanjing 210036, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I4210111163"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5063629854"],"corresponding_institution_ids":["https://openalex.org/I4210111163"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10493195,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"04","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8984747529029846},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.761002779006958},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6634381413459778},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.5383345484733582},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5204529762268066},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5108325481414795},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4929392337799072},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.48689475655555725},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46610885858535767},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.45146065950393677},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3374887704849243},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3205510377883911}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8984747529029846},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.761002779006958},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6634381413459778},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.5383345484733582},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5204529762268066},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5108325481414795},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4929392337799072},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.48689475655555725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46610885858535767},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.45146065950393677},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3374887704849243},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3205510377883911},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s1469026823500232","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1142/s1469026823500232","pdf_url":null,"source":{"id":"https://openalex.org/S206936884","display_name":"International Journal of Computational Intelligence and Applications","issn_l":"1469-0268","issn":["1469-0268","1757-5885"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311754","host_organization_name":"Imperial College Press","host_organization_lineage":["https://openalex.org/P4310311754"],"host_organization_lineage_names":["Imperial College Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Intelligence and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8384510131","display_name":null,"funder_award_id":"B-b/2018/01/33","funder_id":"https://openalex.org/F4320306700","funder_display_name":"Foundation to Eradicate Duchenne"}],"funders":[{"id":"https://openalex.org/F4320306700","display_name":"Foundation to Eradicate Duchenne","ror":"https://ror.org/0587jcv93"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2800577101","https://openalex.org/W2803434058","https://openalex.org/W2886020981","https://openalex.org/W2891719020","https://openalex.org/W2907837217","https://openalex.org/W2918408501","https://openalex.org/W2919650678","https://openalex.org/W2922628727","https://openalex.org/W2927613875","https://openalex.org/W2934386458","https://openalex.org/W2939943065","https://openalex.org/W2944992190","https://openalex.org/W2952066300","https://openalex.org/W2961817498","https://openalex.org/W2975932043","https://openalex.org/W2999269122","https://openalex.org/W3000651374","https://openalex.org/W3015076457","https://openalex.org/W3020589325","https://openalex.org/W3122390253"],"related_works":["https://openalex.org/W2953234277","https://openalex.org/W2626256601","https://openalex.org/W2900413183","https://openalex.org/W4390975304","https://openalex.org/W147410782","https://openalex.org/W3022252430","https://openalex.org/W3103989898","https://openalex.org/W2810679507","https://openalex.org/W2964954556","https://openalex.org/W3019910406"],"abstract_inverted_index":{"As":[0],"the":[1,7,23,44,50,54,59,63,67,76,80,84,87,90,96,103,110,117,132,136,148,169,178,187,196,199,214,217,225,229,237,246,254,259,295],"popularity":[2],"of":[3,9,25,42,53,62,83,89,105,191,216,224,236,298],"wireless":[4],"networks":[5],"deepens,":[6],"diversity":[8],"device":[10],"types":[11],"and":[12,58,108,119,135,173,228,262,283],"hardware":[13],"environments":[14],"makes":[15],"network":[16,70,163,278],"data":[17,56,92,98,255],"take":[18],"on":[19],"heterogeneous":[20],"forms":[21],"while":[22],"threat":[24],"malicious":[26],"attacks":[27],"from":[28,34,37],"outside":[29],"can":[30,251],"prevent":[31],"ordinary":[32],"methods":[33],"mining":[35,144],"information":[36,65,143],"abnormal":[38],"data.":[39,286],"In":[40,79],"view":[41],"this,":[43],"research":[45,288],"will":[46,93,99,113,155],"be":[47,94,100,114],"devoted":[48],"to":[49,74,116,147,176,280],"feature":[51,129,157,166,201],"processing":[52],"anomalous":[55,64],"itself,":[57,256],"convolutional":[60,68,170],"operation":[61],"by":[66],"neural":[69,241,277],"(CNN).":[71],"This":[72,243],"is":[73,194,220,232],"extract":[75],"internal":[77,282],"information.":[78],"first":[81],"step":[82,154],"cascaded":[85,247,272],"CNNs,":[86],"dimensions":[88],"anomaly":[91,97],"processed,":[95],"sorted":[101,111],"under":[102],"concept":[104],"relevance":[106],"grouping,":[107],"then":[109,174],"results":[112,137,183,211],"added":[115],"convolution":[118],"pooling.":[120],"The":[121,151,181,207,270,287],"performance":[122,145],"test":[123,182,210],"uses":[124],"three":[125],"datasets":[126],"with":[127,165],"different":[128],"capacities":[130],"as":[131],"attack":[133],"sources,":[134],"show":[138,184,212],"a":[139],"13.22%":[140],"improvement":[141],"in":[142],"compared":[146],"standard":[149,226],"CNN.":[150],"extended":[152,218],"CNN":[153,219,248,265,273],"perform":[156],"identification":[158],"for":[159,253,294],"homologous":[160],"or":[161],"similar":[162],"threats,":[164],"expansion":[167,193],"within":[168],"layer":[171],"first,":[172],"pooling":[175],"reduce":[177],"computational":[179],"cost.":[180],"that":[185,213,223,235,245],"when":[186],"maximum":[188],"value":[189,293],"domain":[190],"linear":[192],"2,":[195],"model":[197,208,230],"has":[198,266,290],"best":[200],"recognition":[202],"performance,":[203],"fluctuating":[204],"around":[205],"85%;":[206],"comparison":[209],"accuracy":[215],"higher":[221],"than":[222,234],"CNN,":[227],"stability":[231],"better":[233],"back":[238],"propagation":[239],"(BP)":[240],"network.":[242],"indicates":[244],"dual":[249],"module":[250,274],"mine":[252],"thus":[257],"ignoring":[258],"risk":[260,285],"unknowns,":[261],"this":[263],"connected":[264],"some":[267],"practical":[268],"significance.":[269],"proposed":[271],"applies":[275],"advanced":[276],"technology":[279],"identify":[281],"external":[284],"content":[289],"important":[291],"reference":[292],"security":[296],"management":[297],"IoT":[299],"systems.":[300]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
