{"id":"https://openalex.org/W3200271991","doi":"https://doi.org/10.1155/2021/9956371","title":"Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network","display_name":"Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3200271991","doi":"https://doi.org/10.1155/2021/9956371","mag":"3200271991"},"language":"en","primary_location":{"id":"doi:10.1155/2021/9956371","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9956371","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/9956371.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2021/9956371.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068391219","display_name":"Guohong Qi","orcid":"https://orcid.org/0000-0002-2886-6063"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guohong Qi","raw_affiliation_strings":["College of Information Science and Technology, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003189850","display_name":"Jie Zhou","orcid":"https://orcid.org/0000-0003-2406-3981"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Zhou","raw_affiliation_strings":["College of Information Science and Technology, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070164802","display_name":"Wenxian Jia","orcid":"https://orcid.org/0000-0002-7492-1481"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenxian Jia","raw_affiliation_strings":["College of Information Science and Technology, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010076243","display_name":"Menghan Liu","orcid":"https://orcid.org/0000-0002-8659-4457"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Menghan Liu","raw_affiliation_strings":["College of Information Science and Technology, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100750745","display_name":"Shengnan Zhang","orcid":"https://orcid.org/0000-0002-9496-0584"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengnan Zhang","raw_affiliation_strings":["College of Information Science and Technology, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102008835","display_name":"Mengying Xu","orcid":"https://orcid.org/0000-0003-1862-6709"},"institutions":[{"id":"https://openalex.org/I102208913","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78","country_code":"CN","type":"education","lineage":["https://openalex.org/I102208913"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengying Xu","raw_affiliation_strings":["College of Information Science and Technology, Shihezi University, Shihezi, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Shihezi University, Shihezi, China","institution_ids":["https://openalex.org/I102208913"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003189850"],"corresponding_institution_ids":["https://openalex.org/I102208913"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":1.1131,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.79450243,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8277188539505005},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7110985517501831},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6697171926498413},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.5899888277053833},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5859475135803223},{"id":"https://openalex.org/keywords/elite","display_name":"Elite","score":0.5292125344276428},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.47593238949775696},{"id":"https://openalex.org/keywords/backpropagation","display_name":"Backpropagation","score":0.4615149199962616},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4520750045776367},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35076749324798584},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.32196736335754395},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.09215280413627625}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8277188539505005},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7110985517501831},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6697171926498413},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.5899888277053833},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5859475135803223},{"id":"https://openalex.org/C2775987171","wikidata":"https://www.wikidata.org/wiki/Q192797","display_name":"Elite","level":3,"score":0.5292125344276428},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47593238949775696},{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.4615149199962616},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4520750045776367},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35076749324798584},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32196736335754395},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.09215280413627625},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/9956371","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9956371","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/9956371.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:73a8e61d8d6f43acafc812a3fac38f82","is_oa":true,"landing_page_url":"https://doaj.org/article/73a8e61d8d6f43acafc812a3fac38f82","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/9956371","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9956371","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/9956371.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1127805430","display_name":null,"funder_award_id":"2020CB001","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G2690357005","display_name":null,"funder_award_id":"220531","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G4083691118","display_name":null,"funder_award_id":"2018CB006","funder_id":"https://openalex.org/F4320330448","funder_display_name":"Youth and Middle-aged Scientific and Technological Innovation Leading Talents Program of the Corps"},{"id":"https://openalex.org/G4611892408","display_name":null,"funder_award_id":"RCZK2018C38","funder_id":"https://openalex.org/F4320322542","funder_display_name":"Shihezi University"},{"id":"https://openalex.org/G5264161846","display_name":null,"funder_award_id":"2018CB006","funder_id":"https://openalex.org/F4320322542","funder_display_name":"Shihezi University"},{"id":"https://openalex.org/G6751657884","display_name":null,"funder_award_id":"2020CB001","funder_id":"https://openalex.org/F4320322542","funder_display_name":"Shihezi University"},{"id":"https://openalex.org/G73036591","display_name":null,"funder_award_id":"ZZZC201915B","funder_id":"https://openalex.org/F4320322542","funder_display_name":"Shihezi University"},{"id":"https://openalex.org/G7382825568","display_name":null,"funder_award_id":"ZZZC201915B","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8159739679","display_name":null,"funder_award_id":"2018CB006","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8561436333","display_name":null,"funder_award_id":"RCZK2018C38","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8657358997","display_name":null,"funder_award_id":"220531","funder_id":"https://openalex.org/F4320322542","funder_display_name":"Shihezi University"}],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322542","display_name":"Shihezi University","ror":"https://ror.org/04x0kvm78"},{"id":"https://openalex.org/F4320330448","display_name":"Youth and Middle-aged Scientific and Technological Innovation Leading Talents Program of the Corps","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3200271991.pdf","grobid_xml":"https://content.openalex.org/works/W3200271991.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W195047088","https://openalex.org/W1966809779","https://openalex.org/W2099940443","https://openalex.org/W2124808847","https://openalex.org/W2342408547","https://openalex.org/W2526515856","https://openalex.org/W2646522505","https://openalex.org/W2786723494","https://openalex.org/W2794048982","https://openalex.org/W2912327636","https://openalex.org/W2921134108","https://openalex.org/W2941898360","https://openalex.org/W2943847475","https://openalex.org/W2965151497","https://openalex.org/W2969580071","https://openalex.org/W2971913919","https://openalex.org/W2979571639","https://openalex.org/W2982676630","https://openalex.org/W2996741729","https://openalex.org/W3001466087","https://openalex.org/W3005630930","https://openalex.org/W3025641753","https://openalex.org/W3033120446","https://openalex.org/W3035730517","https://openalex.org/W3080909177","https://openalex.org/W3081727988","https://openalex.org/W3091446405","https://openalex.org/W3094700150"],"related_works":["https://openalex.org/W3173976592","https://openalex.org/W4386010110","https://openalex.org/W2322432826","https://openalex.org/W2047008865","https://openalex.org/W2943855857","https://openalex.org/W650538140","https://openalex.org/W1531633990","https://openalex.org/W1589465577","https://openalex.org/W2350164584","https://openalex.org/W2133389611"],"abstract_inverted_index":{"With":[0],"the":[1,41,56,95,111,135,159,171],"rapid":[2],"development":[3],"of":[4,44,50,58,97,115,145,161,174],"Internet":[5],"technology,":[6],"network":[7,26,45,51,77,107,162,179,190],"attacks":[8,180],"have":[9,55],"become":[10],"more":[11],"frequent":[12],"and":[13,15,32,34,61,79,93,101,119,129,150,165,193],"complex,":[14],"intrusion":[16,69,108,163,191],"detection":[17,29,192],"has":[18,141,186],"also":[19],"played":[20],"an":[21,37,142],"increasingly":[22],"important":[23,67],"role":[24],"in":[25,68,138,189],"security.":[27],"Intrusion":[28],"is":[30,36,181],"real\u2010time":[31],"proactive,":[33],"it":[35],"indispensable":[38],"technology":[39],"under":[40],"diversified":[42],"trend":[43],"security":[46],"issues.":[47],"In":[48,169],"terms":[49],"security,":[52],"neural":[53,76],"networks":[54],"characteristics":[57],"self\u2010learning,":[59],"self\u2010adaptation,":[60],"parallel":[62],"computing,":[63],"which":[64,91],"are":[65],"very":[66],"detection.":[70,109],"This":[71],"paper":[72,140],"combines":[73],"back":[74],"propagation":[75],"(BPNN)":[78],"elite":[80],"clone":[81],"artificial":[82],"bee":[83],"colony":[84],"(ECABC)":[85],"to":[86,106,177],"propose":[87],"a":[88],"new":[89],"ECABC\u2010BPNN,":[90],"updates":[92],"optimizes":[94],"settings":[96],"traditional":[98],"BPNN":[99],"weights":[100],"thresholds.":[102],"Then,":[103],"apply":[104],"ECABC\u2010BPNN":[105,136,156,176,185],"Use":[110],"attack":[112,123],"data":[113],"samples":[114],"KDD":[116,148],"CUP":[117],"99":[118,149],"water":[120,153],"pipe":[121,154],"for":[122],"classification":[124,164,167],"experiments":[125],"using":[126,175],"GA\u2010BPNN,":[127],"PSO\u2010BPNN,":[128],"ECABC\u2010BPNN.":[130],"The":[131],"results":[132],"show":[133],"that":[134],"proposed":[137],"this":[139],"accuracy":[143,160],"rate":[144],"98.08%":[146],"on":[147,152],"99.76%":[151],"data.":[155],"effectively":[157],"improves":[158],"reduces":[166],"errors.":[168],"addition,":[170],"time":[172],"complexity":[173],"classify":[178],"relatively":[182],"low.":[183],"Therefore,":[184],"superior":[187],"performance":[188],"classification.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
