{"id":"https://openalex.org/W3038731719","doi":"https://doi.org/10.1587/transinf.2019ici0001","title":"Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network","display_name":"Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network","publication_year":2020,"publication_date":"2020-06-30","ids":{"openalex":"https://openalex.org/W3038731719","doi":"https://doi.org/10.1587/transinf.2019ici0001","mag":"3038731719"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2019ici0001","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019ici0001","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICI0001/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICI0001/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039785089","display_name":"Kwangjo Kim","orcid":"https://orcid.org/0000-0002-8922-6203"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kwangjo KIM","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology (KAIST)"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology (KAIST)","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5039785089"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":null,"apc_paid":null,"fwci":0.4854,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.67680189,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"E103.D","issue":"7","first_page":"1433","last_page":"1447"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8988269567489624},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7234224081039429},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.53817218542099},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5226861238479614},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4114759564399719},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3785618543624878}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8988269567489624},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7234224081039429},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.53817218542099},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5226861238479614},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4114759564399719},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3785618543624878}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2019ici0001","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019ici0001","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICI0001/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2019ici0001","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019ici0001","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICI0001/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6072120315","display_name":null,"funder_award_id":"funded","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"}],"funders":[{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3038731719.pdf","grobid_xml":"https://content.openalex.org/works/W3038731719.grobid-xml"},"referenced_works_count":68,"referenced_works":["https://openalex.org/W111228695","https://openalex.org/W123720765","https://openalex.org/W135902891","https://openalex.org/W189596042","https://openalex.org/W1534489247","https://openalex.org/W1673075472","https://openalex.org/W1811853421","https://openalex.org/W1964421503","https://openalex.org/W1966156248","https://openalex.org/W1974089633","https://openalex.org/W1977973562","https://openalex.org/W1980529734","https://openalex.org/W1985987493","https://openalex.org/W1987380082","https://openalex.org/W2011778831","https://openalex.org/W2028070713","https://openalex.org/W2034265047","https://openalex.org/W2040370888","https://openalex.org/W2051812123","https://openalex.org/W2064675550","https://openalex.org/W2076063813","https://openalex.org/W2112796928","https://openalex.org/W2123585936","https://openalex.org/W2130613448","https://openalex.org/W2140833774","https://openalex.org/W2143426320","https://openalex.org/W2145094598","https://openalex.org/W2150847526","https://openalex.org/W2170285839","https://openalex.org/W2182607710","https://openalex.org/W2290933337","https://openalex.org/W2335999708","https://openalex.org/W2399803916","https://openalex.org/W2399941526","https://openalex.org/W2512496029","https://openalex.org/W2532890539","https://openalex.org/W2535642622","https://openalex.org/W2547977869","https://openalex.org/W2549585799","https://openalex.org/W2560162835","https://openalex.org/W2566616303","https://openalex.org/W2602255610","https://openalex.org/W2607252931","https://openalex.org/W2611452998","https://openalex.org/W2678934292","https://openalex.org/W2742119477","https://openalex.org/W2744071776","https://openalex.org/W2747617717","https://openalex.org/W2756275803","https://openalex.org/W2762776925","https://openalex.org/W2763032280","https://openalex.org/W2763978449","https://openalex.org/W2766315530","https://openalex.org/W2769262927","https://openalex.org/W2772373517","https://openalex.org/W2776415876","https://openalex.org/W2787262922","https://openalex.org/W2809178492","https://openalex.org/W2893903497","https://openalex.org/W2902883059","https://openalex.org/W3016607949","https://openalex.org/W3123463689","https://openalex.org/W3169389953","https://openalex.org/W3214373139","https://openalex.org/W4205947740","https://openalex.org/W4231109964","https://openalex.org/W4246198815","https://openalex.org/W4249179470"],"related_works":["https://openalex.org/W4223943233","https://openalex.org/W4309045103","https://openalex.org/W3014300295","https://openalex.org/W4299487748","https://openalex.org/W3164822677","https://openalex.org/W4250304930","https://openalex.org/W3215138031","https://openalex.org/W2922457425","https://openalex.org/W4205568523","https://openalex.org/W2584408238"],"abstract_inverted_index":{"Deep":[0],"learning":[1,36,75,101,105],"is":[2],"gaining":[3],"more":[4,6],"and":[5,10,30,55,66,83,95,119,128,148,171],"lots":[7],"of":[8,49,69,79,89,99,115,144],"attractions":[9],"better":[11,165],"performance":[12,44,143],"in":[13,32,46,73,158],"implementing":[14],"the":[15,27,42,47,59,70,77,80,87,91,97,109,113,116,124,129,141,155,167],"Intrusion":[16],"Detection":[17],"System":[18],"(IDS),":[19],"especially":[20],"for":[21,133],"feature":[22,104,126,131],"learning.":[23],"This":[24],"paper":[25],"presents":[26],"state-of-the-art":[28],"advances":[29],"challenges":[31,173],"IDS":[33],"using":[34],"deep":[35,74,92,100],"models,":[37],"which":[38,161],"have":[39],"been":[40],"achieved":[41,164],"big":[43],"enhancements":[45],"field":[48],"computer":[50],"vision,":[51],"natural":[52],"language":[53],"processing,":[54],"image/audio":[56],"processing":[57],"than":[58,166],"traditional":[60],"methods.":[61],"After":[62],"providing":[63],"a":[64,177],"systematic":[65],"methodical":[67],"description":[68],"latest":[71],"developments":[72],"from":[76],"points":[78],"deployed":[81],"architectures":[82],"techniques,":[84],"we":[85],"suggest":[86],"pros-and-cons":[88],"all":[90],"learning-based":[93],"IDS,":[94],"discuss":[96],"importance":[98],"models":[102],"as":[103,176],"approach.":[106],"For":[107],"this,":[108],"author":[110],"has":[111],"suggested":[112,175],"concept":[114],"Deep-Feature":[117],"Extraction":[118],"Selection":[120],"(D-FES).":[121],"By":[122],"combining":[123],"stacked":[125],"extraction":[127],"weighted":[130],"selection":[132],"D-FES,":[134],"our":[135],"experiment":[136],"was":[137],"verified":[138],"to":[139,153],"get":[140],"best":[142],"detection":[145],"rate,":[146,151],"99.918%":[147],"false":[149],"alarm":[150],"0.012%":[152],"detect":[154],"impersonation":[156],"attacks":[157],"Wi-Fi":[159],"network":[160],"can":[162],"be":[163],"previous":[168],"publications.":[169],"Summary":[170],"further":[172],"are":[174],"concluding":[178],"remark.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
