{"id":"https://openalex.org/W4281570285","doi":"https://doi.org/10.3390/computers11060085","title":"Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier","display_name":"Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier","publication_year":2022,"publication_date":"2022-05-26","ids":{"openalex":"https://openalex.org/W4281570285","doi":"https://doi.org/10.3390/computers11060085"},"language":"en","primary_location":{"id":"doi:10.3390/computers11060085","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11060085","pdf_url":"https://www.mdpi.com/2073-431X/11/6/85/pdf?version=1653562192","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/11/6/85/pdf?version=1653562192","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080488010","display_name":"Wen Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Wen Xu","raw_affiliation_strings":["Cybersecurity Lab, Comp Sci/Info Tech, Massey University, Auckland 0632, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Lab, Comp Sci/Info Tech, Massey University, Auckland 0632, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007979944","display_name":"Julian Jang\u2010Jaccard","orcid":"https://orcid.org/0000-0002-1002-057X"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Julian Jang-Jaccard","raw_affiliation_strings":["Cybersecurity Lab, Comp Sci/Info Tech, Massey University, Auckland 0632, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Lab, Comp Sci/Info Tech, Massey University, Auckland 0632, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392689","display_name":"Tong Liu","orcid":"https://orcid.org/0000-0003-3047-1148"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Tong Liu","raw_affiliation_strings":["Cybersecurity Lab, Comp Sci/Info Tech, Massey University, Auckland 0632, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Lab, Comp Sci/Info Tech, Massey University, Auckland 0632, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087242242","display_name":"Fariza Sabrina","orcid":"https://orcid.org/0000-0002-8455-2499"},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fariza Sabrina","raw_affiliation_strings":["School of Engineering and Technology, Central Queensland University, Sydney, NSW 2000, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Technology, Central Queensland University, Sydney, NSW 2000, Australia","institution_ids":["https://openalex.org/I74899385"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078627842","display_name":"Jin Kwak","orcid":"https://orcid.org/0000-0001-6931-2705"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jin Kwak","raw_affiliation_strings":["Department of Cyber Security, Ajou University, Suwon 16499, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Ajou University, Suwon 16499, Korea","institution_ids":["https://openalex.org/I57664883"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007979944","https://openalex.org/A5080488010"],"corresponding_institution_ids":["https://openalex.org/I51158804"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":4.826,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.95280932,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"11","issue":"6","first_page":"85","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.9234343767166138},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.791027307510376},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5760971903800964},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5706103444099426},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5597311854362488},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5430796146392822},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5155948996543884},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5022993087768555},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.4930431544780731},{"id":"https://openalex.org/keywords/sync","display_name":"sync","score":0.47725269198417664},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4151361584663391},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4048750400543213},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3345276713371277},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3312665820121765},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.13227492570877075},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12740901112556458},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.10714203119277954},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08118215203285217}],"concepts":[{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.9234343767166138},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.791027307510376},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5760971903800964},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5706103444099426},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5597311854362488},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5430796146392822},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5155948996543884},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5022993087768555},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.4930431544780731},{"id":"https://openalex.org/C3913047","wikidata":"https://www.wikidata.org/wiki/Q1956265","display_name":"sync","level":3,"score":0.47725269198417664},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4151361584663391},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4048750400543213},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3345276713371277},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3312665820121765},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.13227492570877075},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12740901112556458},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.10714203119277954},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08118215203285217},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/computers11060085","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11060085","pdf_url":"https://www.mdpi.com/2073-431X/11/6/85/pdf?version=1653562192","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d746bcdf02e94360b8bfff4d9f96a2cd","is_oa":true,"landing_page_url":"https://doaj.org/article/d746bcdf02e94360b8bfff4d9f96a2cd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 11, Iss 6, p 85 (2022)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/21599382","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Improved_bidirectional_GAN-based_approach_for_network_intrusion_detection_using_one-class_classifier/21599382","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:mro.massey.ac.nz:10179/17423","is_oa":true,"landing_page_url":"http://hdl.handle.net/10179/17423","pdf_url":null,"source":{"id":"https://openalex.org/S4306402588","display_name":"Massey Research Online (Massey University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I51158804","host_organization_name":"Massey University","host_organization_lineage":["https://openalex.org/I51158804"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.3390/computers11060085","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11060085","pdf_url":"https://www.mdpi.com/2073-431X/11/6/85/pdf?version=1653562192","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4281570285.pdf","grobid_xml":"https://content.openalex.org/works/W4281570285.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1966741850","https://openalex.org/W2399941526","https://openalex.org/W2584757120","https://openalex.org/W2736937187","https://openalex.org/W2803446235","https://openalex.org/W2901561143","https://openalex.org/W2902758299","https://openalex.org/W2914570111","https://openalex.org/W2984419450","https://openalex.org/W2993999308","https://openalex.org/W3005645996","https://openalex.org/W3085865982","https://openalex.org/W3088376608","https://openalex.org/W3089397955","https://openalex.org/W3093410479","https://openalex.org/W3102376457","https://openalex.org/W3113720674","https://openalex.org/W3153872861","https://openalex.org/W3173866276","https://openalex.org/W3203072121","https://openalex.org/W3209469313","https://openalex.org/W3215200159","https://openalex.org/W4214714410","https://openalex.org/W4230604704","https://openalex.org/W4320013936","https://openalex.org/W6712640429","https://openalex.org/W7016021835"],"related_works":["https://openalex.org/W4293202849","https://openalex.org/W1980965563","https://openalex.org/W1489300767","https://openalex.org/W2387995142","https://openalex.org/W4380714744","https://openalex.org/W4319453655","https://openalex.org/W3040099731","https://openalex.org/W2366944513","https://openalex.org/W2896600774","https://openalex.org/W4289406342"],"abstract_inverted_index":{"Existing":[0],"generative":[1,254],"adversarial":[2],"networks":[3],"(GANs),":[4],"primarily":[5],"used":[6,244],"for":[7,34,55,64,67,122],"creating":[8],"fake":[9,41],"image":[10],"samples":[11,42],"from":[12,150],"natural":[13],"images,":[14],"demand":[15],"a":[16,80,112,198,202],"strong":[17,52],"dependence":[18],"(i.e.,":[19],"the":[20,24,27,35,46,75,97,137,141,145,151,154,159,163,177,181,184,188,206],"training":[21,57,138,152,173],"strategy":[22,174],"of":[23,140,153,179,190,201,222],"generators":[25,36],"and":[26,91,183,225,250,260],"discriminators":[28],"require":[29],"to":[30,37,96,242],"be":[31,243],"in":[32,130,187,245],"sync)":[33],"produce":[38],"as":[39,85],"realistic":[40],"that":[43,50,118,170,235],"can":[44],"\u201cfool\u201d":[45],"discriminators.":[47],"We":[48],"argue":[49],"this":[51,108,171],"dependency":[53],"required":[54],"GAN":[56,65,115],"on":[58,104,217,256],"images":[59],"does":[60],"not":[61],"necessarily":[62],"work":[63],"models":[66],"network":[68,76,123,214,246],"intrusion":[69,77,124,247],"detection":[70,101,125,248],"tasks.":[71],"This":[72],"is":[73,119,147,239],"because":[74],"inputs":[78],"have":[79],"simpler":[81],"feature":[82,89],"structure":[83],"such":[84],"relatively":[86],"low-dimension,":[87],"discrete":[88],"values,":[90],"smaller":[92],"input":[93],"size":[94],"compared":[95],"existing":[98],"GAN-based":[99],"anomaly":[100,227],"tasks":[102,249],"proposed":[103,135,172,237],"images.":[105],"To":[106],"address":[107],"issue,":[109],"we":[110],"propose":[111],"new":[113,199],"Bidirectional":[114],"(Bi-GAN)":[116],"model":[117,196],"better":[120],"equipped":[121],"with":[126,162],"reduced":[127],"overheads":[128],"involved":[129],"excessive":[131],"training.":[132],"In":[133,193],"our":[134,195,236],"method,":[136],"iteration":[139],"generator":[142,182],"(and":[143],"accordingly":[144],"encoder)":[146],"increased":[148],"separate":[149],"discriminator":[155,185],"until":[156],"it":[157],"satisfies":[158],"condition":[160],"associated":[161],"cross-entropy":[164],"loss.":[165],"Our":[166,231],"empirical":[167],"results":[168,220],"show":[169],"greatly":[175],"improves":[176],"performance":[178],"both":[180],"even":[186],"presence":[189],"imbalanced":[191],"classes.":[192],"addition,":[194],"offers":[197],"construct":[200],"one-class":[203,210],"classifier":[204,211],"using":[205],"trained":[207],"encoder\u2013discriminator.":[208],"The":[209],"detects":[212],"anomalous":[213],"traffic":[215],"based":[216],"binary":[218],"classification":[219],"instead":[221],"calculating":[223],"expensive":[224],"complex":[226],"scores":[228],"(or":[229],"thresholds).":[230],"experimental":[232],"result":[233],"illustrates":[234],"method":[238],"highly":[240],"effective":[241],"outperforms":[251],"other":[252],"similar":[253],"methods":[255],"two":[257],"datasets:":[258],"NSL-KDD":[259],"CIC-DDoS2019":[261],"datasets.":[262]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
