{"id":"https://openalex.org/W4307874907","doi":"https://doi.org/10.3233/faia220405","title":"Intrusion Detection System Using PSO and DE Algorithms with BP Neural Network","display_name":"Intrusion Detection System Using PSO and DE Algorithms with BP Neural Network","publication_year":2022,"publication_date":"2022-10-18","ids":{"openalex":"https://openalex.org/W4307874907","doi":"https://doi.org/10.3233/faia220405"},"language":"en","primary_location":{"id":"doi:10.3233/faia220405","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia220405","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA220405","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA220405","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101445828","display_name":"Ke Wang","orcid":"https://orcid.org/0000-0003-2300-0743"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Wang","raw_affiliation_strings":["Department of Computer Science and Technology, EECS, Peking University, Beijing, China","Key Laboratory of High Confidence Software Technologies (Peking University), MoE, Beijing, China","National Engineering Research Center for Software Engineering, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, EECS, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Key Laboratory of High Confidence Software Technologies (Peking University), MoE, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"National Engineering Research Center for Software Engineering, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004473534","display_name":"Jingwei Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I50632499","display_name":"Chongqing University of Technology","ror":"https://ror.org/04vgbd477","country_code":"CN","type":"education","lineage":["https://openalex.org/I50632499"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingwei Guan","raw_affiliation_strings":["Liangjiang International College, Chongqing University of Technology, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Liangjiang International College, Chongqing University of Technology, Chongqing, China","institution_ids":["https://openalex.org/I50632499"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101913842","display_name":"Song Luo","orcid":"https://orcid.org/0000-0003-1498-5253"},"institutions":[{"id":"https://openalex.org/I50632499","display_name":"Chongqing University of Technology","ror":"https://ror.org/04vgbd477","country_code":"CN","type":"education","lineage":["https://openalex.org/I50632499"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Luo","raw_affiliation_strings":["School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China","institution_ids":["https://openalex.org/I50632499"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005225068","display_name":"Zhi Guan","orcid":"https://orcid.org/0000-0002-6144-4815"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Guan","raw_affiliation_strings":["National Engineering Research Center for Software Engineering, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Software Engineering, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101445828"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36575647,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14225","display_name":"Advanced Sensor and Control Systems","score":0.9298999905586243,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9293000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8487231731414795},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.8132181167602539},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7615222334861755},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.7510905265808105},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5147235989570618},{"id":"https://openalex.org/keywords/differential-evolution","display_name":"Differential evolution","score":0.5110974907875061},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4702422022819519},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4274230897426605},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36834824085235596},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.32084810733795166}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8487231731414795},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.8132181167602539},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7615222334861755},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.7510905265808105},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5147235989570618},{"id":"https://openalex.org/C74750220","wikidata":"https://www.wikidata.org/wiki/Q2662197","display_name":"Differential evolution","level":2,"score":0.5110974907875061},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4702422022819519},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4274230897426605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36834824085235596},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32084810733795166},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia220405","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia220405","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA220405","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia220405","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia220405","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA220405","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1267473","display_name":null,"funder_award_id":"2020YFB1005404","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2799337928","display_name":null,"funder_award_id":"2020YFB100540","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3151624230","display_name":null,"funder_award_id":"6187205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5517038434","display_name":null,"funder_award_id":"2020YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6163091765","display_name":null,"funder_award_id":"2020010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6600626235","display_name":null,"funder_award_id":"61872051","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4307874907.pdf","grobid_xml":"https://content.openalex.org/works/W4307874907.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W130494427","https://openalex.org/W1495172800","https://openalex.org/W1498436455","https://openalex.org/W1583353573","https://openalex.org/W1884606608","https://openalex.org/W2543580944","https://openalex.org/W2789828921","https://openalex.org/W2964200838","https://openalex.org/W2980254366","https://openalex.org/W3015203156","https://openalex.org/W3100028011","https://openalex.org/W3186319586","https://openalex.org/W4241513211"],"related_works":["https://openalex.org/W2351252967","https://openalex.org/W2388271354","https://openalex.org/W2361617591","https://openalex.org/W2366221835","https://openalex.org/W2189193988","https://openalex.org/W2181334302","https://openalex.org/W4307874907","https://openalex.org/W2380986143","https://openalex.org/W2931208445","https://openalex.org/W4380489994"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,20,63,84],"system":[2],"(IDS)":[3],"combines":[4],"software":[5],"and":[6,47],"hardware":[7],"to":[8,65],"detect":[9],"network":[10,28,35],"attacks.":[11],"In":[12],"this":[13],"paper,":[14],"we":[15],"propose":[16,55],"a":[17,56],"new":[18,57],"intrusion":[19,62],"method":[21],"based":[22,59,74],"on":[23,60,75],"an":[24],"improved":[25,68],"BP":[26,33,69],"neural":[27,34,70],"algorithm.":[29,52],"We":[30,53],"improve":[31],"the":[32,41,48,76],"algorithm":[36,46],"by":[37],"combining":[38],"it":[39],"with":[40],"particle":[42],"swarm":[43],"optimization":[44],"(PSO)":[45],"differential":[49],"evolution":[50],"(DE)":[51],"also":[54],"framework":[58,64],"common":[61],"accommodate":[66],"our":[67,80],"network.":[71],"The":[72],"experiments":[73],"CICIDS2017":[77],"dataset":[78],"show":[79],"approach":[81],"achieves":[82],"better":[83],"efficiency.":[85]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
