{"id":"https://openalex.org/W2908954810","doi":"https://doi.org/10.1631/fitee.1800573","title":"Cyber security meets artificial intelligence: a survey","display_name":"Cyber security meets artificial intelligence: a survey","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2908954810","doi":"https://doi.org/10.1631/fitee.1800573","mag":"2908954810"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.1800573","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.1800573","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian-hua Li","raw_affiliation_strings":["School of Cyber Security, Shanghai Jiao Tong University, Shanghai, 200240, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100391361"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":7.6154,"has_fulltext":false,"cited_by_count":310,"citation_normalized_percentile":{"value":0.9778714,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"19","issue":"12","first_page":"1462","last_page":"1474"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7336177825927734},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.67708420753479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6414096355438232},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.594962477684021},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5711811184883118},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5581997632980347},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5076802968978882},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47189459204673767},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4419686496257782}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7336177825927734},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.67708420753479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6414096355438232},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.594962477684021},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5711811184883118},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5581997632980347},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5076802968978882},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47189459204673767},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4419686496257782},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.1800573","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.1800573","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3421103565","display_name":null,"funder_award_id":"61431008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4859250427","display_name":null,"funder_award_id":"61571300","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":85,"referenced_works":["https://openalex.org/W639708223","https://openalex.org/W1710476689","https://openalex.org/W1883420340","https://openalex.org/W1945616565","https://openalex.org/W2031738616","https://openalex.org/W2041596034","https://openalex.org/W2069285803","https://openalex.org/W2083188342","https://openalex.org/W2123442489","https://openalex.org/W2124623839","https://openalex.org/W2145339207","https://openalex.org/W2150341604","https://openalex.org/W2179402106","https://openalex.org/W2180612164","https://openalex.org/W2198623851","https://openalex.org/W2217248474","https://openalex.org/W2243397390","https://openalex.org/W2245869277","https://openalex.org/W2337093093","https://openalex.org/W2472963837","https://openalex.org/W2542971063","https://openalex.org/W2543927648","https://openalex.org/W2548015322","https://openalex.org/W2571196383","https://openalex.org/W2584321260","https://openalex.org/W2594867206","https://openalex.org/W2597490979","https://openalex.org/W2604252918","https://openalex.org/W2604505099","https://openalex.org/W2604802223","https://openalex.org/W2612866063","https://openalex.org/W2618043096","https://openalex.org/W2619203976","https://openalex.org/W2625220439","https://openalex.org/W2625570400","https://openalex.org/W2724314416","https://openalex.org/W2724616073","https://openalex.org/W2738229973","https://openalex.org/W2738841453","https://openalex.org/W2743475759","https://openalex.org/W2745868649","https://openalex.org/W2751702350","https://openalex.org/W2756580315","https://openalex.org/W2767079719","https://openalex.org/W2767961413","https://openalex.org/W2768346313","https://openalex.org/W2770859475","https://openalex.org/W2771179281","https://openalex.org/W2781091734","https://openalex.org/W2782676859","https://openalex.org/W2783037699","https://openalex.org/W2783284780","https://openalex.org/W2786075294","https://openalex.org/W2792736988","https://openalex.org/W2793130752","https://openalex.org/W2800017313","https://openalex.org/W2803881474","https://openalex.org/W2805454539","https://openalex.org/W2808560727","https://openalex.org/W2888263775","https://openalex.org/W2919115771","https://openalex.org/W2949311987","https://openalex.org/W2950745363","https://openalex.org/W2950774971","https://openalex.org/W2962700793","https://openalex.org/W2963047332","https://openalex.org/W2963184668","https://openalex.org/W2963207607","https://openalex.org/W2963341057","https://openalex.org/W2963431851","https://openalex.org/W3100789280","https://openalex.org/W3105009650","https://openalex.org/W3105463048","https://openalex.org/W4205947740","https://openalex.org/W4293529028","https://openalex.org/W4293584023","https://openalex.org/W4297670622","https://openalex.org/W4298289240","https://openalex.org/W4300434632","https://openalex.org/W4318619660","https://openalex.org/W4383466480","https://openalex.org/W6601939488","https://openalex.org/W6602117066","https://openalex.org/W6605139453","https://openalex.org/W6605327257"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W3159204880","https://openalex.org/W2982631433","https://openalex.org/W2800890348","https://openalex.org/W4380786369","https://openalex.org/W3081416576","https://openalex.org/W4396751709"],"abstract_inverted_index":{"There":[0],"is":[1],"a":[2,160,174],"wide":[3],"range":[4],"of":[5,99,112,153],"interdisciplinary":[6],"intersections":[7],"between":[8],"cyber":[9,28,54,69,102,114],"security":[10,29,70],"and":[11,38,41,62,72,101,124,143,158],"artificial":[12],"intelligence":[13,43],"(AI).":[14],"On":[15,45],"one":[16],"hand,":[17,48],"AI":[18,49,65,100,136,176],"technologies,":[19],"such":[20],"as":[21],"deep":[22,126,163],"learning,":[23,61,79,84,87,164],"can":[24],"be":[25],"introduced":[26],"into":[27],"to":[30,75,172],"construct":[31],"smart":[32],"models":[33,50,66],"for":[34],"implementing":[35],"malware":[36],"classification":[37],"intrusion":[39],"detection":[40],"threating":[42],"sensing.":[44],"the":[46,91,97,132,145,151,167],"other":[47],"will":[51,57],"face":[52],"various":[53],"threats,":[55],"which":[56,135],"disturb":[58],"their":[59,141],"sample,":[60],"decisions.":[63],"Thus,":[64],"need":[67],"specific":[68],"defense":[71,147],"protection":[73],"technologies":[74],"combat":[76],"adversarial":[77],"machine":[78,83,121],"preserve":[80],"privacy":[81],"in":[82,110],"secure":[85,161,175],"federated":[86,162],"etc.":[88],"Based":[89],"on":[90,170],"above":[92],"two":[93],"aspects,":[94],"we":[95,105,130,165],"review":[96],"intersection":[98],"security.":[103],"First,":[104],"summarize":[106],"existing":[107,125,168],"research":[108,169],"efforts":[109],"terms":[111],"combating":[113],"attacks":[115],"using":[116],"AI,":[117],"including":[118],"adopting":[119],"traditional":[120],"learning":[122,127],"methods":[123],"solutions.":[128],"Then,":[129],"analyze":[131],"counterattacks":[133],"from":[134,150],"itself":[137],"may":[138],"suffer,":[139],"dissect":[140],"characteristics,":[142],"classify":[144],"corresponding":[146],"methods.":[148],"Finally,":[149],"aspects":[152],"constructing":[154],"encrypted":[155],"neural":[156],"network":[157],"realizing":[159],"expatiate":[166],"how":[171],"build":[173],"system.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":53},{"year":2024,"cited_by_count":79},{"year":2023,"cited_by_count":71},{"year":2022,"cited_by_count":53},{"year":2021,"cited_by_count":25},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
