{"id":"https://openalex.org/W4414070474","doi":"https://doi.org/10.32604/cmc.2025.068599","title":"An Auto Encoder-Enhanced Stacked Ensemble for Intrusion Detection in Healthcare Networks","display_name":"An Auto Encoder-Enhanced Stacked Ensemble for Intrusion Detection in Healthcare Networks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414070474","doi":"https://doi.org/10.32604/cmc.2025.068599"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068599","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068599","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068599","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000166233","display_name":"Fatma S. Alrayes","orcid":"https://orcid.org/0000-0002-1644-8526"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fatma S. Alrayes","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033923198","display_name":"Mohammed Zakariah","orcid":"https://orcid.org/0000-0002-2488-2605"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammed Zakariah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076877194","display_name":"Mohammed K. Alzaylaee","orcid":"https://orcid.org/0000-0002-3791-3458"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammed K. Alzaylaee","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007931218","display_name":"Syed Umar Amin","orcid":"https://orcid.org/0000-0002-4718-0155"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Syed Umar Amin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5058902321","display_name":"Zafar Iqbal Khan","orcid":"https://orcid.org/0000-0002-5079-2902"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zafar Iqbal Khan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000166233"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6666,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88138872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"85","issue":"2","first_page":"3457","last_page":"3484"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6470000147819519},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.6107000112533569},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42149999737739563},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.4047999978065491},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.3982999920845032},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.36480000615119934},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.35359999537467957},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.34279999136924744}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7372999787330627},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6470000147819519},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.6107000112533569},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5633000135421753},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5317999720573425},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5091999769210815},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42149999737739563},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.4047999978065491},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3982999920845032},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.36480000615119934},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.35359999537467957},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.32739999890327454},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.3151000142097473},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2784999907016754},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.25279998779296875},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2515999972820282},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.068599","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068599","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068599","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068599","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W3033120446","https://openalex.org/W3123598942","https://openalex.org/W3158729335","https://openalex.org/W3187990532","https://openalex.org/W3205323312","https://openalex.org/W4212986808","https://openalex.org/W4214643830","https://openalex.org/W4229046377","https://openalex.org/W4283019189","https://openalex.org/W4303022245","https://openalex.org/W4312204616","https://openalex.org/W4321503132","https://openalex.org/W4377821253","https://openalex.org/W4385522694","https://openalex.org/W4386422124","https://openalex.org/W4387189847","https://openalex.org/W4388775013","https://openalex.org/W4391514872","https://openalex.org/W4400593388","https://openalex.org/W4401266448","https://openalex.org/W4402130526","https://openalex.org/W4402522641","https://openalex.org/W4403390182","https://openalex.org/W4404622922","https://openalex.org/W4404972735","https://openalex.org/W4405080044","https://openalex.org/W4406710186","https://openalex.org/W4407135326"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Healthcare":[0],"networks":[1],"prove":[2],"to":[3,14,46,162,165,209,241,244],"be":[4,44,236],"an":[5,63],"urgent":[6],"issue":[7],"in":[8,32,50,225,238],"terms":[9],"of":[10,18,25,39,83,184],"intrusion":[11,48,72],"detection":[12,49,174],"due":[13,208],"the":[15,22,33,60,78,81,106,136,155,185,189],"critical":[16],"consequences":[17],"cyber":[19],"threats":[20],"and":[21,58,70,102,125,196,213],"extreme":[23],"sensitivity":[24],"medical":[26],"information.":[27],"The":[28,53,159],"proposed":[29],"Auto-Stack":[30,107],"ID":[31,108,191],"study":[34,79],"is":[35,97],"a":[36,130],"stacked":[37],"ensemble":[38,231],"encoder-enhanced":[40],"auctions":[41],"that":[42,94,144],"can":[43,205],"used":[45],"improve":[47,242],"healthcare":[51,227],"networks.":[52],"WUSTL-EHMS":[54],"2020":[55],"dataset":[56],"trains":[57],"evaluates":[59],"model,":[61],"constituting":[62],"imbalanced":[64],"class":[65,96],"distribution":[66],"(87.46%":[67],"normal":[68],"traffic":[69],"12.53%":[71],"attacks).":[73],"To":[74],"address":[75],"this":[76],"imbalance,":[77],"balances":[80],"effect":[82],"training":[84,101,132],"Bias":[85],"through":[86,230],"Stratified":[87],"K-fold":[88],"cross-validation":[89],"(K":[90],"=":[91],"5),":[92],"so":[93],"each":[95],"represented":[98],"similarly":[99],"on":[100,135],"validation":[103],"splits.":[104],"Second,":[105],"method":[109],"combines":[110],"many":[111],"base":[112,142,170],"classifiers":[113,143],"such":[114],"as":[115,152],"TabNet,":[116],"LightGBM,":[117],"Gaussian":[118],"Naive":[119],"Bayes,":[120],"Histogram-Based":[121],"Gradient":[122],"Boosting":[123],"(HGB),":[124],"Logistic":[126],"Regression.":[127],"We":[128],"apply":[129],"two-stage":[131],"process":[133],"based":[134],"first":[137],"stage,":[138],"where":[139],"we":[140,150],"have":[141],"predict":[145],"out-of-fold":[146],"(OOF)":[147],"predictions,":[148],"which":[149],"use":[151],"inputs":[153],"for":[154],"second-stage":[156],"meta-learner":[157,160],"XGBoost.":[158],"learns":[161],"refine":[163],"predictions":[164],"capture":[166],"complicated":[167],"interactions":[168],"between":[169],"models,":[171],"thus":[172],"improving":[173],"accuracy":[175,195],"without":[176],"introducing":[177],"bias,":[178],"overfitting,":[179],"or":[180],"requiring":[181],"domain":[182],"knowledge":[183],"meta-data.":[186],"In":[187],"addition,":[188],"auto-stack":[190],"model":[192],"got":[193],"98.41%":[194],"93.45%":[197],"F1":[198],"score,":[199],"better":[200],"than":[201],"individual":[202],"classifiers.":[203],"It":[204],"identify":[206,222],"intrusions":[207],"its":[210,223],"90.55%":[211],"recall":[212],"96.53%":[214],"precision":[215],"with":[216],"minimal":[217],"false":[218],"positives.":[219],"These":[220],"findings":[221],"suitability":[224],"ensuring":[226],"networks\u2019":[228],"security":[229],"learning.":[232],"Ongoing":[233],"efforts":[234],"will":[235],"deployed":[237],"real":[239],"time":[240],"response":[243],"evolving":[245],"threats.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
