{"id":"https://openalex.org/W3081176624","doi":"https://doi.org/10.1145/3404555.3404556","title":"An Intrusion Detection Feature Selection Method Based on Improved Fireworks Algorithm","display_name":"An Intrusion Detection Feature Selection Method Based on Improved Fireworks Algorithm","publication_year":2020,"publication_date":"2020-04-23","ids":{"openalex":"https://openalex.org/W3081176624","doi":"https://doi.org/10.1145/3404555.3404556","mag":"3081176624"},"language":"en","primary_location":{"id":"doi:10.1145/3404555.3404556","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404555.3404556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005230186","display_name":"Shuangyue Niu","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuangyue Niu","raw_affiliation_strings":["College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033646805","display_name":"Xiang Ji","orcid":"https://orcid.org/0000-0002-0240-8582"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiang Ji","raw_affiliation_strings":["Research Institute of CSIC, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Research Institute of CSIC, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101526011","display_name":"Jingmei Li","orcid":"https://orcid.org/0000-0002-7246-3093"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingmei Li","raw_affiliation_strings":["College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089386832","display_name":"Di Xue","orcid":"https://orcid.org/0000-0002-6430-5466"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Di Xue","raw_affiliation_strings":["College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000318376","display_name":"Weifei Wu","orcid":"https://orcid.org/0000-0002-6217-0043"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weifei Wu","raw_affiliation_strings":["College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Sci. and Tech., Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005230186"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.1542,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51901773,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"356","last_page":"361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8322893381118774},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.7439788579940796},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7216081619262695},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6832822561264038},{"id":"https://openalex.org/keywords/fireworks","display_name":"Fireworks","score":0.6649901866912842},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5885951519012451},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5503569841384888},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5309994220733643},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4964953064918518},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43531888723373413},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38832715153694153},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36348670721054077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08034297823905945}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8322893381118774},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.7439788579940796},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7216081619262695},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6832822561264038},{"id":"https://openalex.org/C2778758847","wikidata":"https://www.wikidata.org/wiki/Q127933","display_name":"Fireworks","level":2,"score":0.6649901866912842},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5885951519012451},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5503569841384888},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5309994220733643},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4964953064918518},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43531888723373413},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38832715153694153},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36348670721054077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08034297823905945},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3404555.3404556","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404555.3404556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1546540950","https://openalex.org/W2146653490","https://openalex.org/W2809091344","https://openalex.org/W3003196385"],"related_works":["https://openalex.org/W2210716960","https://openalex.org/W3087929459","https://openalex.org/W2436765613","https://openalex.org/W2807833928","https://openalex.org/W2358600532","https://openalex.org/W4244468174","https://openalex.org/W1965080005","https://openalex.org/W2951187577","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"With":[0],"the":[1,28,32,60,68,77,86,93,124],"rapid":[2],"development":[3],"of":[4,63,80,88],"network":[5,7,14],"technology,":[6,17],"intrusion":[8,15,49,105],"has":[9,119],"become":[10],"increasingly":[11],"frequent.":[12],"In":[13],"detection":[16,33,50,121],"how":[18],"to":[19,30,75,91,99],"reduce":[20,24],"feature":[21,44],"dimensions":[22],"and":[23,58,96],"redundant":[25],"information":[26],"is":[27],"key":[29],"improve":[31,85],"accuracy.":[34],"To":[35],"solve":[36],"this":[37,39],"problem,":[38],"paper":[40],"proposes":[41],"a":[42],"new":[43],"selection":[45,61,69],"method":[46],"SIFWA":[47,56,118],"for":[48,104],"based":[51,71],"on":[52,72],"improved":[53,59],"fireworks":[54,64,89],"algorithm.":[55,126],"optimized":[57],"strategy":[62,70],"algorithm,":[65],"which":[66,82],"adopted":[67],"fitness":[73],"value":[74],"screen":[76],"next":[78],"generation":[79],"fireworks,":[81],"could":[83],"greatly":[84],"ability":[87],"algorithm":[90],"find":[92],"optimal":[94],"solution":[95],"search":[97],"efficiency":[98],"select":[100],"more":[101],"effective":[102],"features":[103],"detection.":[106],"Simulation":[107,114],"experiments":[108],"were":[109],"conducted":[110],"using":[111],"UCI":[112],"data.":[113],"results":[115],"show":[116],"that":[117],"higher":[120],"accuracy":[122],"than":[123],"benchmark":[125]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
