{"id":"https://openalex.org/W4417149872","doi":"https://doi.org/10.1145/3779432","title":"IEDL-IDS: An Image-Enhanced Encoder-Based Deep Learning Scheme for Intrusion Detection Systems","display_name":"IEDL-IDS: An Image-Enhanced Encoder-Based Deep Learning Scheme for Intrusion Detection Systems","publication_year":2025,"publication_date":"2025-12-09","ids":{"openalex":"https://openalex.org/W4417149872","doi":"https://doi.org/10.1145/3779432"},"language":"en","primary_location":{"id":"doi:10.1145/3779432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779432","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3779432","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069913342","display_name":"Shiyun Wang","orcid":"https://orcid.org/0009-0004-1890-6350"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Shiyun Wang","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University - Halifax Campus","Faculty of Computer Science, Dalhousie University - Halifax Campus, Halifax, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University - Halifax Campus","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University - Halifax Campus, Halifax, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033658029","display_name":"Qiang Ye","orcid":"https://orcid.org/0000-0001-6711-7818"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Qiang Ye","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University - Halifax Campus","Faculty of Computer Science, Dalhousie University - Halifax Campus, Halifax, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University - Halifax Campus","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University - Halifax Campus, Halifax, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078909812","display_name":"Yujie Tang","orcid":"https://orcid.org/0000-0002-9086-7948"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yujie Tang","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University - Halifax Campus","Faculty of Computer Science, Dalhousie University - Halifax Campus, Halifax, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University - Halifax Campus","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University - Halifax Campus, Halifax, Canada","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069913342"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46685103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":"1","first_page":"1","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8992000222206116,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8992000222206116,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.017100000753998756,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.014299999922513962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7609999775886536},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5658000111579895},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5375000238418579},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5318999886512756},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.48030000925064087},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47540000081062317},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4578999876976013},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.44679999351501465},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.4438999891281128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7972000241279602},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7609999775886536},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6680999994277954},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5658000111579895},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5375000238418579},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5318999886512756},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4828999936580658},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.48030000925064087},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47540000081062317},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4578999876976013},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.44679999351501465},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.4438999891281128},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4293999969959259},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3734000027179718},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3409000039100647},{"id":"https://openalex.org/C82990744","wikidata":"https://www.wikidata.org/wiki/Q166194","display_name":"RGB color model","level":2,"score":0.3330000042915344},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.3255999982357025},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.29589998722076416},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.2849000096321106},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.2680000066757202},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.2632000148296356},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.25780001282691956},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3779432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779432","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3779432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3779432","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2789828921","https://openalex.org/W2986055611","https://openalex.org/W3005630930","https://openalex.org/W3008195198","https://openalex.org/W3027210640","https://openalex.org/W3035254752","https://openalex.org/W3082865979","https://openalex.org/W3085955590","https://openalex.org/W3087644100","https://openalex.org/W3107335479","https://openalex.org/W3125088505","https://openalex.org/W3132676275","https://openalex.org/W3134794785","https://openalex.org/W3140416091","https://openalex.org/W3145185940","https://openalex.org/W3145680685","https://openalex.org/W3154196099","https://openalex.org/W3163301462","https://openalex.org/W3163895120","https://openalex.org/W3165871547","https://openalex.org/W3167979994","https://openalex.org/W3168997536","https://openalex.org/W3193365863","https://openalex.org/W3203072121","https://openalex.org/W3204957802","https://openalex.org/W3205117227","https://openalex.org/W3209814877","https://openalex.org/W3217411715","https://openalex.org/W3217648337","https://openalex.org/W4221155816","https://openalex.org/W4226319939","https://openalex.org/W4285219637","https://openalex.org/W4297799123","https://openalex.org/W4312378515","https://openalex.org/W4312384107","https://openalex.org/W4312678820","https://openalex.org/W4312994655","https://openalex.org/W4313477864","https://openalex.org/W4313643708","https://openalex.org/W4367666219","https://openalex.org/W4379470642","https://openalex.org/W4382281941","https://openalex.org/W4383750730","https://openalex.org/W4383988875","https://openalex.org/W4384159728","https://openalex.org/W4387011098","https://openalex.org/W4387423279","https://openalex.org/W4388565318","https://openalex.org/W4388624483","https://openalex.org/W4388758247","https://openalex.org/W4388966623","https://openalex.org/W4389428576","https://openalex.org/W4389664993","https://openalex.org/W4389988095","https://openalex.org/W4391892504","https://openalex.org/W4396505479","https://openalex.org/W4396605089","https://openalex.org/W4396629515","https://openalex.org/W4396982373","https://openalex.org/W4398150616","https://openalex.org/W4401236093","https://openalex.org/W4401508167","https://openalex.org/W4403243966","https://openalex.org/W4408993848"],"related_works":[],"abstract_inverted_index":{"As":[0],"networks":[1],"expand":[2],"and":[3,34,60,92,185,194,201,203,211,231],"evolve,":[4],"their":[5,28],"increasing":[6],"complexity":[7],"introduces":[8],"significant":[9],"security":[10,158],"challenges,":[11],"necessitating":[12],"robust":[13],"Intrusion":[14,52],"Detection":[15,53],"Systems":[16,54],"(IDS).":[17],"Traditional":[18],"IDS":[19,169],"often":[20],"struggle":[21],"to":[22,27,64,89,103],"detect":[23,65],"sophisticated":[24],"cyberattacks":[25],"due":[26],"reliance":[29],"on":[30,197,205],"raw":[31,83],"network":[32,70,84,157],"data":[33],"primitive":[35],"feature":[36,62,138],"extraction":[37,63],"techniques.":[38],"To":[39],"address":[40],"these":[41],"limitations,":[42],"we":[43],"propose":[44],"an":[45],"Image-enhanced":[46],"Encoder-based":[47],"Deep":[48],"Learning":[49],"scheme":[50],"for":[51,115,182,187,209,234],"(IEDL-IDS),":[55],"which":[56],"combines":[57],"image-based":[58],"transformation":[59],"encoder-based":[61],"complex":[66],"intrusion":[67,117,236],"patterns":[68],"in":[69,144],"traffic.":[71],"Technically,":[72],"IEDL-IDS":[73,120,143,165,175,221],"consists":[74],"of":[75,142,156,180],"three":[76],"sequential":[77],"modules.":[78],"The":[79],"preprocessing":[80],"module":[81,98,110],"transforms":[82],"traffic":[85],"into":[86],"RGB":[87,101],"images":[88,102],"reveal":[90],"temporal":[91],"spatial":[93],"patterns.":[94],"Thereafter,":[95],"the":[96,100,108,112,140,153,167,172,198,206],"encoder":[97],"processes":[99],"extract":[104],"latent":[105,113],"features.":[106],"Finally,":[107],"classifier":[109,127],"utilizes":[111],"features":[114],"high-accuracy":[116],"detection.":[118],"Notably,":[119,215],"is":[121],"highly":[122],"flexible,":[123],"as":[124],"its":[125,217],"built-in":[126],"can":[128],"be":[129],"easily":[130],"replaced":[131],"with":[132,148],"any":[133],"neural":[134],"network-based":[135],"model.":[136],"This":[137],"highlights":[139],"adaptability":[141],"balancing":[145],"detection":[146,219,237],"performance":[147],"resource":[149],"constraints,":[150],"thereby":[151],"meeting":[152],"diverse":[154],"needs":[155],"applications.":[159],"Our":[160],"experimental":[161],"results":[162],"demonstrate":[163],"that":[164],"outperforms":[166],"state-of-the-art":[168],"schemes.":[170],"On":[171],"CICIoT":[173],"dataset,":[174,200,208],"achieves":[176],"a":[177,223,229],"classification":[178,184],"accuracy":[179,196],"99.91%":[181],"binary":[183,210],"95.66%":[186],"multi-class":[188,212],"classification.":[189],"Similarly,":[190],"it":[191,228],"attains":[192],"99.61%":[193],"98.25%":[195],"NSL-KDD":[199],"99.27%":[202],"96.42%":[204],"ToN_IoT":[207],"tasks,":[213],"respectively.":[214],"despite":[216],"high":[218],"performance,":[220],"maintains":[222],"competitive":[224],"computational":[225],"footprint,":[226],"making":[227],"practical":[230],"scalable":[232],"solution":[233],"real-world":[235],"deployments.":[238]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-09T00:00:00"}
