{"id":"https://openalex.org/W3136706308","doi":"https://doi.org/10.1145/3453187.3453311","title":"Network Intrusion Detection Model Based on PCA + ADASYN and XGBoost","display_name":"Network Intrusion Detection Model Based on PCA + ADASYN and XGBoost","publication_year":2020,"publication_date":"2020-12-05","ids":{"openalex":"https://openalex.org/W3136706308","doi":"https://doi.org/10.1145/3453187.3453311","mag":"3136706308"},"language":"en","primary_location":{"id":"doi:10.1145/3453187.3453311","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3453187.3453311","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 3rd International Conference on E-Business, Information Management and Computer Science","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108508513","display_name":"Leilei Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Leilei Pan","raw_affiliation_strings":["Guilin University of Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Technology, Guilin, China","institution_ids":["https://openalex.org/I38706770"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101699482","display_name":"Xiaolan Xie","orcid":"https://orcid.org/0000-0001-9546-5115"},"institutions":[{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolan Xie","raw_affiliation_strings":["Guilin University of Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Technology, Guilin, China","institution_ids":["https://openalex.org/I38706770"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108508513"],"corresponding_institution_ids":["https://openalex.org/I38706770"],"apc_list":null,"apc_paid":null,"fwci":0.9251,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.78134546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"44","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.7001809477806091},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6774852275848389},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.617228090763092},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6107604503631592},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5810071229934692},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5806339979171753},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5427461266517639},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5260602831840515},{"id":"https://openalex.org/keywords/data-redundancy","display_name":"Data redundancy","score":0.4736156165599823},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4190293252468109}],"concepts":[{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.7001809477806091},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6774852275848389},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.617228090763092},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6107604503631592},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5810071229934692},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5806339979171753},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5427461266517639},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5260602831840515},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.4736156165599823},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4190293252468109},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3453187.3453311","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3453187.3453311","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 3rd International Conference on E-Business, Information Management and Computer Science","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W1966809779"],"related_works":["https://openalex.org/W2002428578","https://openalex.org/W1968475104","https://openalex.org/W2899564673","https://openalex.org/W2897258045","https://openalex.org/W2018406690","https://openalex.org/W1044083074","https://openalex.org/W2072332896","https://openalex.org/W2118010945","https://openalex.org/W2951748633","https://openalex.org/W1998713996"],"abstract_inverted_index":{"Due":[0],"to":[1,49,68,72,89,96],"the":[2,9,51,55,60,74,79,91,98,101,119,132,146,156,159,167],"class-imbalance":[3],"and":[4,37,129,131,136,151,165],"redundancy":[5,52,150],"of":[6,54,76,100,105,118,148,158],"sample":[7,71,164],"features,":[8],"network":[10,28],"intrusion":[11,29],"detection":[12,30,160],"model":[13,31,121,161],"based":[14,32],"on":[15,33,111],"classification":[16],"algorithm":[17,46,65],"has":[18],"high":[19],"false":[20],"positive":[21],"rate":[22],"(FPR)":[23],"for":[24,122,162],"minority":[25,70,123,163],"sample.":[26],"A":[27],"PCA":[34],"+":[35],"ADASYN":[36],"XGBoost":[38,83],"is":[39,47,66,84],"proposed.":[40],"The":[41,116,138],"principal":[42],"component":[43],"analysis":[44],"(PCA)":[45],"used":[48,67,85],"reduce":[50,155],"features":[53],"data.":[56,93],"On":[57],"this":[58],"basis,":[59],"adaptive":[61],"synthetic":[62],"sampling":[63],"(ADASYN)":[64],"oversample":[69],"solve":[73],"problem":[75,147],"class-imbalanced":[77],"at":[78],"data":[80,114,149],"level.":[81],"Finally,":[82],"as":[86],"a":[87],"classifier":[88],"classify":[90],"detected":[92],"In":[94],"order":[95],"verify":[97],"validity":[99],"model,":[102],"several":[103],"groups":[104],"comparative":[106],"experiments":[107],"were":[108,127,134],"carried":[109],"out":[110],"KDD":[112],"CUP99":[113],"set.":[115],"FPR":[117,157],"proposed":[120],"samples":[124],"(r2l,":[125],"u2r)":[126],"17.3%":[128],"19.7%,":[130],"F1":[133],"90.1%":[135],"84.5%.":[137],"experimental":[139],"results":[140],"show":[141],"that":[142],"by":[143],"dealing":[144],"with":[145],"class-imbalanced,":[152],"we":[153],"can":[154],"improve":[166],"F1.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
