{"id":"https://openalex.org/W3166483780","doi":"https://doi.org/10.1145/3456415.3456431","title":"A novel DBN-LSSVM ensemble method for intrusion detection system","display_name":"A novel DBN-LSSVM ensemble method for intrusion detection system","publication_year":2021,"publication_date":"2021-02-25","ids":{"openalex":"https://openalex.org/W3166483780","doi":"https://doi.org/10.1145/3456415.3456431","mag":"3166483780"},"language":"en","primary_location":{"id":"doi:10.1145/3456415.3456431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3456415.3456431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 9th International Conference on Communications and Broadband Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066478781","display_name":"Zerong Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zerong Zhao","raw_affiliation_strings":["Guangxi University for Nationalities, China"],"affiliations":[{"raw_affiliation_string":"Guangxi University for Nationalities, China","institution_ids":["https://openalex.org/I167274908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101311332","display_name":"Lina Ge","orcid":"https://orcid.org/0000-0002-2071-222X"},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Ge","raw_affiliation_strings":["Guangxi University for Nationalities and Guangxi University for Nationalities, China"],"affiliations":[{"raw_affiliation_string":"Guangxi University for Nationalities and Guangxi University for Nationalities, China","institution_ids":["https://openalex.org/I167274908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006044088","display_name":"Guifen Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guifen Zhang","raw_affiliation_strings":["Guangxi University for Nationalities, China"],"affiliations":[{"raw_affiliation_string":"Guangxi University for Nationalities, China","institution_ids":["https://openalex.org/I167274908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066478781"],"corresponding_institution_ids":["https://openalex.org/I167274908"],"apc_list":null,"apc_paid":null,"fwci":1.3754,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.81720272,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"101","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-belief-network","display_name":"Deep belief network","score":0.8529824018478394},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7376085519790649},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7216305732727051},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7201852798461914},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6529644131660461},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.543570339679718},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49097850918769836},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.46353960037231445},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.45291659235954285},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4293571710586548}],"concepts":[{"id":"https://openalex.org/C97385483","wikidata":"https://www.wikidata.org/wiki/Q16954980","display_name":"Deep belief network","level":3,"score":0.8529824018478394},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7376085519790649},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7216305732727051},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7201852798461914},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6529644131660461},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.543570339679718},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49097850918769836},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46353960037231445},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.45291659235954285},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4293571710586548},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3456415.3456431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3456415.3456431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 9th International Conference on Communications and Broadband Networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1627728918","https://openalex.org/W2037715382","https://openalex.org/W2099940443","https://openalex.org/W2150847526","https://openalex.org/W2593528311","https://openalex.org/W2974181782","https://openalex.org/W4245460974","https://openalex.org/W4402504235"],"related_works":["https://openalex.org/W2906214541","https://openalex.org/W4367367217","https://openalex.org/W2133034788","https://openalex.org/W2897826427","https://openalex.org/W2090763504","https://openalex.org/W2792607040","https://openalex.org/W2387580700","https://openalex.org/W2746581472","https://openalex.org/W2899285606","https://openalex.org/W60934498"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"neural":[3],"networks":[4],"have":[5,33,42],"been":[6],"used":[7,79,92],"to":[8,80,93,104],"process":[9,17],"network":[10,58,71],"security":[11],"data":[12],"in":[13,44],"intrusion":[14,50,107,148],"detection,":[15],"a":[16,55,61],"that":[18,30,125],"is":[19,66,73,78,91,137],"often":[20],"highly":[21],"nonlinear":[22],"and":[23,60,75,98,130,140,146],"strongly":[24],"correlated.":[25],"To":[26],"address":[27],"the":[28,69,76,82,85,88,95,116,133],"problem":[29],"existing":[31],"methods":[32],"high":[34],"detection":[35,51,108,135,144,149],"rates":[36],"for":[37],"known":[38],"attack":[39,47],"types,":[40,48],"but":[41],"shortcomings":[43],"identifying":[45],"emerging":[46],"an":[49,106],"(DBN-LSSVM)":[52],"method":[53],"combining":[54],"deep":[56],"belief":[57],"(DBN)":[59],"least-squares":[62],"vector":[63],"machine":[64],"(LSSVM)":[65],"proposed.":[67],"First,":[68],"original":[70],"dataset":[72],"pre-processed":[74],"DBN":[77],"downscale":[81],"features":[83],"of":[84,102],"dataset;":[86],"then":[87],"PSO":[89],"algorithm":[90],"optimize":[94],"input":[96],"weights":[97],"implicit":[99],"layer":[100],"biases":[101],"LSSVM":[103],"establish":[105],"model;":[109],"finally,":[110],"simulation":[111],"experiments":[112],"are":[113],"conducted":[114],"on":[115],"KDD":[117],"CUP":[118],"99":[119],"dataset.":[120],"The":[121],"experimental":[122],"results":[123],"show":[124],"compared":[126],"with":[127],"DBN-MSVM,":[128],"DBN-BP,":[129],"SVM":[131],"methods,":[132],"overall":[134],"accuracy":[136],"significantly":[138],"improved,":[139],"DBN-LSSVM":[141],"has":[142],"higher":[143],"efficiency":[145],"better":[147],"classification":[150],"performance.":[151]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
