{"id":"https://openalex.org/W4312228544","doi":"https://doi.org/10.12720/jcm.17.11.933-940","title":"A Variational Information Bottleneck Method for Network Intrusion Detection","display_name":"A Variational Information Bottleneck Method for Network Intrusion Detection","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312228544","doi":"https://doi.org/10.12720/jcm.17.11.933-940"},"language":"en","primary_location":{"id":"doi:10.12720/jcm.17.11.933-940","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.17.11.933-940","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.12720/jcm.17.11.933-940","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050136560","display_name":"Vu Van Thieu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vu Van Thieu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101839576","display_name":"Nguy\u1ec5n Th\u1ebf Anh","orcid":"https://orcid.org/0009-0003-5528-3714"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nguyen The Anh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5113554969","display_name":"Tr\u1ea7n Ho\u00e0ng H\u1ea3i","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tran Hoang Hai","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050136560"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2764,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5787545,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"933","last_page":"940"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7968924641609192},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7721583843231201},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.6412582397460938},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6035758852958679},{"id":"https://openalex.org/keywords/information-bottleneck-method","display_name":"Information bottleneck method","score":0.5923870801925659},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5670567154884338},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5486841201782227},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.535123348236084},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.46390315890312195},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.44098618626594543},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4237176477909088},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4100602865219116},{"id":"https://openalex.org/keywords/mutual-information","display_name":"Mutual information","score":0.19846072793006897}],"concepts":[{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7968924641609192},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7721583843231201},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.6412582397460938},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6035758852958679},{"id":"https://openalex.org/C60008888","wikidata":"https://www.wikidata.org/wiki/Q6031013","display_name":"Information bottleneck method","level":3,"score":0.5923870801925659},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5670567154884338},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5486841201782227},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.535123348236084},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.46390315890312195},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.44098618626594543},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4237176477909088},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4100602865219116},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.19846072793006897},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.12720/jcm.17.11.933-940","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.17.11.933-940","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.12720/jcm.17.11.933-940","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.17.11.933-940","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4386721405","https://openalex.org/W2729514902","https://openalex.org/W2024160000","https://openalex.org/W2773500201","https://openalex.org/W2061273563","https://openalex.org/W4287995534","https://openalex.org/W2743258233","https://openalex.org/W2285052147","https://openalex.org/W2998168123","https://openalex.org/W62276109"],"abstract_inverted_index":{"The":[0],"increasing":[1],"application":[2],"of":[3,23,88],"machine":[4,90],"learning":[5,91],"to":[6,29,83,99,106],"network":[7,25],"intrusion":[8,119],"detection":[9,120],"has":[10],"shown":[11,98],"great":[12],"successes":[13],"in":[14,104],"the":[15,20,40,85,94,113],"recent":[16],"years.":[17],"To":[18],"reduce":[19],"high":[21],"dimension":[22],"captured":[24],"records":[26],"for":[27,73],"classifiers":[28],"learn":[30],"efficiently,":[31],"various":[32],"feature":[33,48],"reduction":[34],"methods":[35],"have":[36],"been":[37],"proposed.":[38],"Using":[39],"Information":[41,70],"Bottleneck":[42,71],"framework,":[43],"a":[44,67],"concise":[45],"and":[46,57,116],"discriminative":[47],"representation":[49,82],"can":[50,78],"be":[51],"derived":[52],"by":[53],"optimizing":[54],"an":[55],"intuition":[56],"theoretically":[58],"grounded":[59],"objective":[60],"function.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65],"propose":[66],"novel":[68],"Variational":[69],"method":[72],"Network":[74],"Intrusion":[75],"Detection":[76],"that":[77],"produce":[79],"high-quality":[80],"low-dimensional":[81],"increase":[84],"classification":[86,115,118],"accuracy":[87,102],"conventional":[89],"classifier.":[92],"Moreover,":[93],"proposed":[95],"model":[96],"is":[97],"achieve":[100],"promising":[101],"scores":[103],"comparison":[105],"several":[107],"state-of-the-art":[108],"anomaly-based":[109],"IDS,":[110],"on":[111],"both":[112],"2-class":[114],"5-class":[117],"problem.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2023-01-04T00:00:00"}
