{"id":"https://openalex.org/W7102781034","doi":"https://doi.org/10.1155/int/1500333","title":"Securing Data Privacy in NIDS: Black\u2010Box Adversarial Attacks","display_name":"Securing Data Privacy in NIDS: Black\u2010Box Adversarial Attacks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7102781034","doi":"https://doi.org/10.1155/int/1500333"},"language":"en","primary_location":{"id":"doi:10.1155/int/1500333","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/1500333","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/1500333","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/1500333","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Dawei Xu","orcid":"https://orcid.org/0000-0003-4422-0606"},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]},{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I49232843","display_name":"Changchun University","ror":"https://ror.org/02an57k10","country_code":"CN","type":"education","lineage":["https://openalex.org/I49232843"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawei Xu","raw_affiliation_strings":["School of Computer Science and Technology ,  Changchun University ,  Changchun ,  China ,  ccu.edu.cn","School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology ,  Changchun University ,  Changchun ,  China ,  ccu.edu.cn","institution_ids":["https://openalex.org/I106645853","https://openalex.org/I49232843"]},{"raw_affiliation_string":"School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yunfang Liang","orcid":"https://orcid.org/0009-0002-4242-084X"},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]},{"id":"https://openalex.org/I49232843","display_name":"Changchun University","ror":"https://ror.org/02an57k10","country_code":"CN","type":"education","lineage":["https://openalex.org/I49232843"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunfang Liang","raw_affiliation_strings":["School of Computer Science and Technology ,  Changchun University ,  Changchun ,  China ,  ccu.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology ,  Changchun University ,  Changchun ,  China ,  ccu.edu.cn","institution_ids":["https://openalex.org/I106645853","https://openalex.org/I49232843"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yunfan Yang","orcid":"https://orcid.org/0000-0002-9915-0118"},"institutions":[{"id":"https://openalex.org/I4210108204","display_name":"China Electronic Information Industry Development","ror":"https://ror.org/01mbbxx50","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210108204","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunfan Yang","raw_affiliation_strings":["Department of Product Development ,  Pudao Credit Information Co., Ltd. ,  Beijing ,  China"],"affiliations":[{"raw_affiliation_string":"Department of Product Development ,  Pudao Credit Information Co., Ltd. ,  Beijing ,  China","institution_ids":["https://openalex.org/I4210108204"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yajie Wang","orcid":"https://orcid.org/0000-0002-0962-4464"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajie Wang","raw_affiliation_strings":["School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Baokun Zheng","orcid":"https://orcid.org/0000-0003-3333-9281"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I177955009","display_name":"China University of Political Science and Law","ror":"https://ror.org/00e49gy82","country_code":"CN","type":"education","lineage":["https://openalex.org/I177955009"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baokun Zheng","raw_affiliation_strings":["School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn","School of Legal Information Management ,  China University of Political Science and Law ,  Beijing ,  China ,  cupl.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I125839683"]},{"raw_affiliation_string":"School of Legal Information Management ,  China University of Political Science and Law ,  Beijing ,  China ,  cupl.edu.cn","institution_ids":["https://openalex.org/I177955009"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chuan Zhang","orcid":"https://orcid.org/0000-0001-7684-8540"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chuan Zhang","raw_affiliation_strings":["Department of Guangdong Province Key Laboratory ,  New Security Intelligence Technology ,  Shenzhen , Guangdong,  China","School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn"],"affiliations":[{"raw_affiliation_string":"Department of Guangdong Province Key Laboratory ,  New Security Intelligence Technology ,  Shenzhen , Guangdong,  China","institution_ids":["https://openalex.org/I4210152380"]},{"raw_affiliation_string":"School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":null,"display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology ,  Beijing Institute of Technology ,  Beijing ,  China ,  bit.edu.cn","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I125839683","https://openalex.org/I177955009","https://openalex.org/I202334528","https://openalex.org/I4210152380"],"apc_list":{"value":2500,"currency":"USD","value_usd":2500},"apc_paid":{"value":2500,"currency":"USD","value_usd":2500},"fwci":2.3169,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93122194,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"2025","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5194000005722046,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5194000005722046,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.275299996137619,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.031300000846385956,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8982999920845032},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6972000002861023},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5595999956130981},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.548799991607666},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4397999942302704},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.39419999718666077},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3878999948501587},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.38190001249313354}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8982999920845032},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8158000111579895},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6972000002861023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6198999881744385},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5595999956130981},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.548799991607666},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4397999942302704},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4205999970436096},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3878999948501587},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.38190001249313354},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.36149999499320984},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.36090001463890076},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3327000141143799},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.32429999113082886},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.32109999656677246},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3174999952316284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3165999948978424},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.2558000087738037}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1155/int/1500333","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/1500333","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/1500333","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1155/int/1500333","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/1500333","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/1500333","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7818830013275146}],"awards":[{"id":"https://openalex.org/G2376276132","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7816876400","display_name":null,"funder_award_id":"21ZFY52001","funder_id":"https://openalex.org/F4320325175","funder_display_name":"China University of Political Science and Law"},{"id":"https://openalex.org/G8951484681","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320325175","display_name":"China University of Political Science and Law","ror":"https://ror.org/00e49gy82"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7102781034.pdf","grobid_xml":"https://content.openalex.org/works/W7102781034.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W34732858","https://openalex.org/W1985902740","https://openalex.org/W2023923119","https://openalex.org/W2026258420","https://openalex.org/W2032247543","https://openalex.org/W2127991899","https://openalex.org/W2148324316","https://openalex.org/W2167423345","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2820900234","https://openalex.org/W2923817828","https://openalex.org/W2963178695","https://openalex.org/W2963391384","https://openalex.org/W3093410479","https://openalex.org/W3103836116","https://openalex.org/W3168771234","https://openalex.org/W3171785101","https://openalex.org/W3211999566","https://openalex.org/W4214529720","https://openalex.org/W4285249917","https://openalex.org/W4323545679","https://openalex.org/W4377079883","https://openalex.org/W4379644971","https://openalex.org/W4400447302","https://openalex.org/W4405517228","https://openalex.org/W4414123601"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,53,82,104,135,157,160,194,207,218,223,231,243],"increasing":[2],"importance":[3],"of":[4,55,84,103,159,245],"privacy":[5,67,188],"and":[6,26,41,68,130,168,189,210,227,239],"data":[7,27,66,187],"security":[8,190],"in":[9,21,111,197,215,237],"network":[10,12,202],"communications,":[11],"intrusion":[13],"detection":[14],"systems":[15],"(NIDSs)":[16],"play":[17],"a":[18,62,146],"vital":[19],"role":[20],"safeguarding":[22],"against":[23],"unauthorized":[24],"access":[25],"breaches.":[28],"NIDSs":[29],"utilize":[30],"machine":[31],"learning":[32,35],"or":[33,121],"deep":[34,200],"models":[36,57,214],"to":[37,58,65,75,81,155,234],"distinguish":[38],"between":[39],"normal":[40],"malicious":[42],"traffic,":[43],"taking":[44],"preventive":[45],"actions":[46],"when":[47],"suspicious":[48],"activities":[49],"are":[50,124],"identified.":[51],"However,":[52],"vulnerability":[54],"these":[56,141],"adversarial":[59,73,90,115,148,170,179,220],"attacks":[60,74,91],"poses":[61],"significant":[63],"threat":[64],"security.":[69],"Attackers":[70],"can":[71],"exploit":[72],"evade":[76],"NIDS":[77],"detection,":[78],"potentially":[79],"leading":[80],"compromise":[83],"sensitive":[85],"information.":[86],"Existing":[87],"research":[88],"on":[89,94],"primarily":[92],"focuses":[93],"white\u2010box":[95],"scenarios,":[96,241],"which":[97,181],"assume":[98],"attackers":[99],"have":[100],"complete":[101],"knowledge":[102],"target":[105,161],"model.":[106],"This":[107],"assumption":[108],"is":[109,182],"unrealistic":[110],"real\u2010world":[112,186],"scenarios.":[113],"Moreover,":[114],"examples":[116,221],"generated":[117,219],"through":[118],"random":[119],"perturbations":[120],"unconstrained":[122],"methods":[123],"often":[125],"easily":[126],"detectable":[127],"by":[128],"classifiers,":[129],"they":[131],"may":[132],"not":[133],"retain":[134],"full":[136],"attack":[137,149],"capabilities.":[138],"To":[139],"address":[140],"issues,":[142],"this":[143,198,246],"article":[144],"explores":[145],"black\u2010box":[147],"approach,":[150],"using":[151],"alternative":[152],"model":[153,162,166,209],"algorithms":[154],"obtain":[156],"output":[158],"without":[163],"requiring":[164],"detailed":[165],"information":[167],"utilizing":[169],"sample":[171],"generation":[172],"method":[173,195],"(A\u2010M)":[174],"with":[175,185,212,222],"realistic":[176],"constraints":[177],"for":[178],"attacks,":[180],"more":[183],"aligned":[184],"issues.":[191],"When":[192],"evaluating":[193],"proposed":[196],"article,":[199],"neural":[201],"(DNN)":[203],"was":[204],"used":[205],"as":[206],"basic":[208],"compared":[211],"various":[213],"experiments.":[216],"Comparing":[217],"original":[224],"NSL\u2010KDD":[225],"dataset":[226],"KDD\u2010CUP":[228],"99":[229],"dataset,":[230],"accuracy":[232],"decreased":[233],"around":[235],"50%":[236],"binary":[238],"multiclassification":[240],"demonstrating":[242],"effectiveness":[244],"method.":[247]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-31T00:00:00"}
