{"id":"https://openalex.org/W4402005644","doi":"https://doi.org/10.1145/3690637","title":"DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization","display_name":"DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization","publication_year":2024,"publication_date":"2024-08-29","ids":{"openalex":"https://openalex.org/W4402005644","doi":"https://doi.org/10.1145/3690637"},"language":"en","primary_location":{"id":"doi:10.1145/3690637","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690637","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3690637","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3690637","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008799702","display_name":"Mukhtar Ahmed","orcid":"https://orcid.org/0009-0000-0167-5593"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210119514","display_name":"Lasbela University of Agriculture Water and Marine Science","ror":"https://ror.org/0212pqc18","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210119514"]}],"countries":["CN","PK"],"is_corresponding":true,"raw_author_name":"Mukhtar Ahmed","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China and Quality Enhancement Cell, Lasbela University of Agriculture Water and Marine Sciences, Uthal, Pakistan","School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China and Quality Enhancement Cell, Lasbela University of Agriculture Water and Marine Sciences, Uthal, Pakistan","institution_ids":["https://openalex.org/I4210119514","https://openalex.org/I115592961"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063671391","display_name":"Jinfu Chen","orcid":"https://orcid.org/0000-0002-3124-5452"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinfu Chen","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China and Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, Zhenjiang, China","School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China and Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042192654","display_name":"Ernest Akpaku","orcid":"https://orcid.org/0000-0003-2540-3861"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ernest Akpaku","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050920580","display_name":"Rexford Nii Ayitey Sosu","orcid":"https://orcid.org/0000-0001-5527-5114"},"institutions":[{"id":"https://openalex.org/I898088062","display_name":"Ghana Communication Technology University","ror":"https://ror.org/05hvkkr89","country_code":"GH","type":"education","lineage":["https://openalex.org/I898088062"]},{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN","GH"],"is_corresponding":false,"raw_author_name":"Rexford Nii Ayitey Sosu","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China and Faculty of Computing and Information Systems, Ghana Communication Technology University, Accra, Ghana","Faculty of Computing and Information Systems, Ghana Communication Technology University, Accra, Ghana"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China and Faculty of Computing and Information Systems, Ghana Communication Technology University, Accra, Ghana","institution_ids":["https://openalex.org/I898088062","https://openalex.org/I115592961"]},{"raw_affiliation_string":"Faculty of Computing and Information Systems, Ghana Communication Technology University, Accra, Ghana","institution_ids":["https://openalex.org/I898088062"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072937615","display_name":"Ajmal Latif","orcid":"https://orcid.org/0009-0000-8050-4089"},"institutions":[{"id":"https://openalex.org/I4210119514","display_name":"Lasbela University of Agriculture Water and Marine Science","ror":"https://ror.org/0212pqc18","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210119514"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ajmal Latif","raw_affiliation_strings":["Directorate of Information Technology, Lasbela University of Agriculture Water and Marine Sciences, Uthal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Directorate of Information Technology, Lasbela University of Agriculture Water and Marine Sciences, Uthal, Pakistan","institution_ids":["https://openalex.org/I4210119514"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008799702"],"corresponding_institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210119514"],"apc_list":null,"apc_paid":null,"fwci":3.3077,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.92788591,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"27","issue":"4","first_page":"1","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7480269074440002},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.614767849445343},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5434849262237549},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5412994623184204},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.5411763191223145},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5121755599975586},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4720393419265747},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44943276047706604},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.42956069111824036},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42094430327415466},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.41407421231269836},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1256006360054016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7480269074440002},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.614767849445343},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5434849262237549},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5412994623184204},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.5411763191223145},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5121755599975586},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4720393419265747},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44943276047706604},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.42956069111824036},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42094430327415466},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.41407421231269836},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1256006360054016},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3690637","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690637","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3690637","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3690637","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690637","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3690637","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G3694159625","display_name":null,"funder_award_id":"62172194, 62202206, and U1836116","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402005644.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1823320334","https://openalex.org/W2020870540","https://openalex.org/W2104933073","https://openalex.org/W2296509296","https://openalex.org/W2620369751","https://openalex.org/W2789828921","https://openalex.org/W2896412072","https://openalex.org/W2926701059","https://openalex.org/W2950204666","https://openalex.org/W2970602317","https://openalex.org/W2978385178","https://openalex.org/W2997315662","https://openalex.org/W3009091629","https://openalex.org/W3100068262","https://openalex.org/W3117819143","https://openalex.org/W3129809016","https://openalex.org/W3130082175","https://openalex.org/W3149839747","https://openalex.org/W3170487598","https://openalex.org/W3201641044","https://openalex.org/W4214529720","https://openalex.org/W4309173386","https://openalex.org/W4313530841","https://openalex.org/W4313586675","https://openalex.org/W4318677156","https://openalex.org/W4318773647","https://openalex.org/W4320713315","https://openalex.org/W4321365946","https://openalex.org/W4372260035","https://openalex.org/W4385636980","https://openalex.org/W4387092456","https://openalex.org/W4388278452"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"With":[0,194],"the":[1,7,55,64,84,92,95,120,125,154,206,227],"rapid":[2],"advancements":[3],"in":[4,54,204],"internet":[5],"technology,":[6],"complexity":[8],"and":[9,27,101,161,171,197,210,241],"sophistication":[10],"of":[11,35,68,94],"network":[12,30,47,69,80,184,192,213],"traffic":[13,48,81,132],"attacks":[14,82],"are":[15],"increasing,":[16],"making":[17],"it":[18],"challenging":[19],"for":[20,39,78,146,149,165,175,189],"traditional":[21],"anomaly":[22,75],"detection":[23,76,230],"systems":[24,188],"to":[25,42,134,143,183],"analyze":[26],"detect":[28],"malicious":[29,44,79,191],"attacks.":[31],"The":[32,50,137,215],"increasing":[33],"advancedness":[34],"cyber":[36,208],"threats":[37],"calls":[38],"innovative":[40],"approaches":[41,59],"identify":[43],"patterns":[45],"within":[46],"precisely.":[49],"primary":[51],"issue":[52],"lies":[53],"fact":[56],"that":[57,219],"these":[58],"do":[60],"not":[61],"focus":[62],"on":[63,130],"essential":[65],"adaptive":[66],"features":[67],"traffic.":[70,193],"We":[71,90],"proposed":[72,200],"an":[73],"effective":[74,176],"system":[77],"called":[83],"Deep":[85,97,102],"Ensemble":[86],"Learning":[87],"Model":[88],"(DELM).":[89],"leverage":[91],"structure":[93],"Feedforward":[96],"Neural":[98],"Network":[99,104,140],"(FDNN),":[100],"Belief":[103],"(DBN),":[105],"incorporating":[106],"multiple":[107],"hidden":[108],"layers":[109],"with":[110,119,223],"non-linear":[111],"activation":[112],"functions.":[113],"Integrating":[114],"Adaptive":[115],"Feature":[116],"Aggregation":[117],"(AFA)":[118],"FDNN":[121],"algorithm":[122],"dynamically":[123],"adjusts":[124],"feature":[126,172,177],"aggregation":[127,173],"process":[128],"based":[129],"incoming":[131],"characteristics":[133],"improve":[135,153],"adaptability.":[136],"Conditional":[138],"Generative":[139],"was":[141],"employed":[142],"enhance":[144],"DELM":[145],"generating":[147],"data":[148,162],"minority":[150],"classes.":[151],"To":[152],"model\u2019s":[155],"accuracy,":[156,237],"we":[157],"applied":[158],"batch":[159],"normalization":[160],"augmentation":[163],"techniques":[164],"preprocessing,":[166],"utilized":[167],"n-gram,":[168],"one-hot":[169],"encoding,":[170],"methods":[174],"extraction.":[178],"This":[179],"study":[180],"significantly":[181],"contributes":[182],"security":[185],"by":[186,234],"enhancing":[187],"detecting":[190],"its":[195,235],"interpretability":[196],"adaptability,":[198],"our":[199,220],"model":[201,221],"shows":[202],"promise":[203],"addressing":[205],"evolving":[207],"threat":[209],"fortifying":[211],"critical":[212],"infrastructure.":[214],"experimental":[216],"results":[217],"demonstrate":[218],"performs":[222],"higher":[224,236],"stability":[225],"than":[226],"existing":[228],"state-of-the-art":[229],"approaches,":[231],"as":[232],"reflected":[233],"precision,":[238],"recall,":[239],"F1-score,":[240],"AUC-ROC.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5}],"updated_date":"2026-02-24T08:05:00.420983","created_date":"2025-10-10T00:00:00"}
