{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,7,6]],“日期-时间”:“2024-07-06T05:54:32Z”,“时间戳”:1720245272333},“参考-计数”:44,“发布者”:“Elsevier BV”,“许可证”:[{“开始”:“日期-零件”:[[2024,2,1]],”日期-时间“:”2024-02-01T00:00:00 0:00Z“,”时间戳“:1706745600000},”内容-版本“:“tdm”,“延迟天数”:0,“URL”:“https://www.elsevier.com/tdm\/userlicense\/1.0\/”},{“开始”:{“日期部分”:[[2024,2,1]],“日期时间”:“2024-02-01T00:00:00Z”,“时间戳”:1706745600000},“内容版本”:“stm-asf”,“延迟天数”:0,“URL”:“https://doi.org/10.15223\/policy-017”},{“开始”:{“日期部分“:[[2024,2,1]],”日期-时间“:”2024-02-01T00:00:00Z“,“timestamp”:1706745600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”},{“start”:{“date-parts”:[[2024,2,1]],“date-time”:“2024-02-01T00:00:00Z”,“timetamp”:170 674560000},\\/doi.org\/10.15223\/policy-012“},{“start”:{“date-parts”:[[2024,2,1]],“date-time”:“2024-02-01T00:00:00Z”,“timestamp”:1706745600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2024,2,1]],“date-time”:“2024-01-01T00:00Z”,”timestamp“1706745700000}”,“content-version”:“st m-asf“,”delay-in-days“:0,”URL“:”https:\/\/doi.org\/10.15223\/policy-004“}],“资助者”:[{“DOI”:“10.13039\/501100012166”,“名称”:“国家重点研发计划”,“DOI-asserted-by”:“出版商”,“奖项”:[“2022YFB4500900”]},{“DOI”:”10.13039\/501100002855“,“名称“:”中华人民共和国科学技术部“,”DOI-assert-by“:”publisher“}],“内容域”:{“domain”:[“elsevier.com”,“sciencedirect.com”],“crossmark-restriction”:true},“short-container-title”:[“Computers&Security”],”published-print“:{“date-parts”:[[2024,2]},”DOI“:”10.1016\/j.cose.2023.103644“,”type“:”journal-article“,”created“:{“date-ports”:[2023,12,10]],“date-time”:“2023-12-10T02:15:31Z”,“timestamp”:170 2174531000},“页面”:“103644”,“update-policy”:“http://\/dx.doi.org\/10.1016\/elsevier_cm_policy“,”source“:”Crossref“,“is-referenced-by-count”:6,“title”:[“增强基于深度学习的入侵检测系统对抗性鲁棒性的简单框架”],“前缀”:“10.1016”,“卷”:“137”,“作者”:[{“给定”:“Xinwei”,“家族”:“Yuan”,“序列”:“first”,“从属关系”:[]},{“given”:“Shu”,“family”:“Han”,“sequence”:“additional”,“affiliation”:[]},{“ORCID”:”http://\/ORCID.org\/00000-0003-1418-6267“,“authenticated-ORCID”:false,“giving”:“Wei”,“家庭”:“Huang”,”sequence“:”additional“,”affiliance“:[]{”given“give”:long“,”family“:”Kong“,”sequence“:“additional”,“affiliation”:[]},{“given”:“Fan”,“family”:“Zhang”,“sequence”:“additional”,“affiliation”:[]}],“member”:“78”,“reference”:[{“issue”:“1”,“key”:“10.1016\/j.cose.2023.103644_br0010”,“article title”:“网络入侵检测系统:机器学习和深度学习方法的系统研究”,“volume”:“32”,“author”:“Ahmad”,“year”:“2021”,“journal-title”:“Trans.Emerg.Telecommun.Technol.”},{“issue”:“2”,“key”:“10.1016\/j.cose.2023.103644_br0020”,“first-page”:“778”,“article-title“:“K-means、KNN和EM非监督机器学习方法在网络流分类中的初步性能评估”,“volume”:“6”,“author”:“Alalousi”,“year”:“2016”,“journal-ttitle”:“国际电子计算系统工程”},{“key”:“10.1016\/J.cose.2023.103644_br0030”,“doi-asserted-by”:“crossref”,“doi”:“101016\/J.eswa.2021.115782”,“article-title”:“网络入侵检测系统中的对抗性机器学习”,“volume”:”186“,”author“:”Alhajjar“,”year“:”2021“,”journal-title“:”Expert Syst.Appl.“},}”key“”:“10.1016\/j.cose.2023.103644_br0050”,“series-title”:“第21届ACM SIGKDD国际知识发现与数据挖掘会议论文集”,“首页”:“29”,“article-title”:“估计局部内在维度”,“author”:“Amsaleg”,“year”:“2015”},{“key”::“机器学习国际会议”,“首页”:“274”,“文章标题”:“模糊梯度给人一种虚假的安全感:绕过对抗性示例的防御”,“作者”:“Athalye”,“年份”:“2018”},{“key”:“10.1016\/j.cose.2023.103644_br0080”,“author”:“Ballet”}、{“密钥”:“101016\/j.cose.2023.103644_br 0100”,”series-title“:“2017 IEEE安全与隐私研讨会(SP)”,“首页”:“39”,“article-title”:“评估神经网络的鲁棒性”,“author”:“Carlini”,“year”:“2017”},{“key”:“10.1016\/j.cose.2023.103644_br0110”,“series-title”:《第十届ACM人工智能与安全研讨会论文集》:“对手示例不容易检测:绕过十种检测方法”,“author”:“Carlini”,“year”:“2017”},{“issue”:“2”,“key”:“10.1016\/j.cose.2023.103644_br0120”,“doi-asserted-by”:“crossref”,“first page”:”650“,“doi”:“101109\/TSP.2009.2031722”,《article-title》:“局部内禀维度估计及其应用”,“volume”::“58”,“author”:“Carter”,“year”:“2009”,“journal-title”:“IEEE Trans.Signal Process.”},{“issue”:“3”,“key”:“10.1016\/j.cose.2023.103644_br0130”,“doi-asserted-by”:“crossref”,“first page”:”542“,“doi”:“101109\/TNN.2009.2015974”,“article-title“:”半监督学习“,”volume“:”20“,”author“:”Chapelle“,“year:”2009《新闻标题》:“IEEE Trans.Neural Netw。“},{”key“:”10.1016\/j.cose.2023.103644_br0140“,”series-title“:”2021 IEEE计算智能(SSCI)研讨会系列“,”首页“:”01“,”article-title“:“对抗性技术对抗网络安全深度学习”,”author“:”Clements“,”year“:”2020“}10.1016\/j.cose.2023.103644_br0160“,“series-title”:“第二十二届ACM SIGSAC计算机与通信安全会议论文集”,“首页”:“1322”,“article-title”:“利用可信度信息和基本对策的模型反转攻击”,“author”:“Fredrikson”,“year”:“2015”},{“key”:series-title“:“2017年国防会议传感器信号处理(SSPD)”,“首页”:“1”,“文章标题”:“网络入侵和网络攻击检测的支持向量机”,“作者”:“Ghanem”,“年份”:“2017”},{“key”:“10.1016\/j.cose.2023.103644_br0190”,“series-ttle”:“2022年IEEE国际人工智能与计算机应用会议(ICAICA)”,“首页”:“521”,“文章标题”:“基于局部余弦相似性的对抗性检测”,“作者”:“Guan”,“年份”:“2022”},{“密钥”:“10.1016\/j.cose.2023.103644_br0200”,“作者”:“Guo”},{“密钥”:“10.1016\/j.cose.2023.103644_br0210”,“系列标题”:“2020 IEEE网络功能虚拟化和软件定义网络(NFV-SDN)会议”,“首页”:“37”,“文章标题”:“增强对网络入侵检测系统中对抗性示例的鲁棒性”,“作者”:“Hashemi”,“年份”:“2020”},{“问题”:“1”,“关键”:“10.1016\/j.cose.2023.103644_br0220”,“doi-asserted-by”:“crossref”第一页“:”538“,”DOI“:”10.1109\/COMST.2022.3233793“,”文章标题“:”网络入侵检测系统的对抗性机器学习:综合调查“,”卷“:”25“,”作者“:”何“,”年份“:”2023“,“新闻标题”:“IEEE Commun。Surv公司。导师。“},{”key“:”10.1016\/j.cose.2023.103644_br0230“,”series-title“:”人工智能安全与保障“,”first page“:“99”,”article-title“:“物理世界中的对抗性示例”,”author“:”Kurakin“,”year“:”2018“}”,{“key”:“10.1016\\j.cose.2023.103644_br 0240”,”series-title”:“知识发现和数据挖掘的进展:第26届太平洋亚洲会议,会议记录,第三部分“,“第一页”:“79”,“文章标题”:“May.Idsgan:生成对抗入侵检测攻击的对抗网络”,“author”:“Lin”,“year”:“2022”},{“key”:“10.1016\/j.cose.2023.103644_br0250”,“author”:“Ma”}、{“key”:10.1016\/j.cose.2023.103644_br0260“,“series-title”:“国际机器学习大会”,“首页”:“3355”,“文章标题”:“带噪声标签的维度驱动学习”,“作者”:“Ma”,“年份”:“2018”},{“key”:“10.1016\\j.cose.2023.103644_br 0270”,“author”:“Madry”}、{“key”:”10.1016//j.cose.2023.03644~br0280“,”author“Metzen”},{“键”:10.1016\/j.cose.2023.103644_br0290“,“series-title”:“IEEE计算机视觉和模式识别会议论文集”,“首页”:“2574”,“article-title”:“Deepfool:愚弄深度神经网络的简单而准确的方法”,“author”:“Moosavi-Dezfouli”,“year”:“2016”},{“key”:IEEE计算机视觉和模式识别会议记录”,“首页”:“427”,“文章标题”:“深度神经网络很容易被愚弄:无法识别图像的高置信度预测”,“作者”:“Nguyen”,“年份”:“2015”},{“键”:“10.1016\/j.cose.2023.103644_br0310”,“作家”:“Papernot”}10.1016\/j.cose.2023.103644_br0320“,“article-title”:“对称特征值问题”,“author”:“Parlett”,“year”:“1998”,“journal-tittle”:“Soc.Ind.Appl。数学。“},{”key“:”10.1016\/j.cose.2023.103644_br0330“,”series-title“:”对抗入侵检测分类器的对抗性深度学习“,”author“:”Rigaki“,”year“:”2017“}”,{“key”:“10.1016\/j.cose.2023.103644_br 0340”,“series-ttle”:“计算、分析和网络的进展:2017年ICCAN会议录”,“首页”:“753”,“article-title”:”使用数据挖掘技术对入侵检测进行分类“,”author“:”Sahani“,”year“:”2018“},{”key“:”10.1016\/j.cose.2023.103644_br0350“,”first-page“:”1“,”article-title“:”网络入侵检测系统的对抗性示例“,”author“:”Shetsley“,”year“:10.1016\/j.cose.2023.103644_br0360“,“series-title”:“IEEE\/CVF国际计算机视觉会议论文集”,“首页”:“16423”,“文章-标题”:“低曲率激活减少对抗训练中的过拟合”,“作者”:“Singla”,“年份”:“2021”},{“key”:“10.1016//j.cose.2023.103644_br 0370”,“series-标题”2019 IEEE安全与隐私研讨会(SPW)”,“首页”:“1”,“文章标题”:“关于深k近邻的稳健性”,“作者”:“Sitawarin”,“年份”:“2019”},{“密钥”:“10.1016\/j.cose.2023.103644_br0390”,“作家”:“Szegedy”}2009 IEEE安全与防御应用计算智能研讨会”,“首页”:“1”,“文章标题”:“KDD CUP 99数据集的详细分析”,“作者”:“Tavallaee”,“年份”:“2009”},{“密钥”:“10.1016\/j.cose.2023.103644_br0410”,“作家”:“Tram\u00e8r”},{“issue“:”2“,”key“:”10.1016\/j.cose.2023.103644_br0430“,”doi-asserted-by“:”crossref“,”first page“:“1139”,“doi”:“10.1109\/TDSC.2022.3148990”,“article-title”:“Manda:on partial example detection for network intrusion detection system”,“volume”:“20”,“author”:“Wang”,“year”:“2022”,“journal-title“:”IEEE Trans。可靠安全的计算机。“},{”key“:”10.1016\/j.cose.2023.103644_br0440“,”doi-asserted-by“:”crossref“,”first-page“:”38367“,”doi“:”101109\/ACCESS.2018.2854599“,”article-title“:”Deep-learning-based intrusion detection with parties“,”volume“:“6”,”author“:”Wang“,”year“:”2018“,”journal title“:“IEEE ACCESS”},”{“key”:“10.1016\\j.cose 2023.10364 4_b r0450“,”doi-asserted-by“:”crossref“,”first-page“:”41238“,”DOI“:”10.1109\/ACCESS.2018.2858277“,”article-title“:”通过堆叠稀疏自动编码器有效提取特征以改进入侵检测系统“,”volume“:”6“,”author“:”Yan“,”year“:”2018“,”journal-title”:“IEEE ACCESS”},{“key”:“10.1016\/j.cose.2023.103644_br0460”,“series-title”:”MILCOM 2018-2018 IEEE军事通信会议(MILCOM)“,“首页”:“559”,“文章标题”:“针对基于深度学习的网络入侵检测系统的对抗性示例”,“作者”:“杨”,“年份”:“2018”},{“密钥”:“10.1016\/j.cose.2023.103644_br0470”,“论文标题”:通过建模深层神经网络的固有属性对对手攻击进行稳健检测”,“卷”:“31”,“作者”:“郑”,“年份”:“2018年”,“新闻标题”:“高级神经信息处理”。系统。“},{”key“:”10.1016\/j.cose.2023103644_br0480“,”文章标题“:”本地和全球一致性学习“,”卷“:”16“,”作者“:”周“,”年份“:”2003“,”期刊标题“:”高级神经网络信息处理系统“},{”key“:”10.1016\/j.cose.2023103644_br0490“,”系列标题“:”第20届国际机器学习大会论文集(ICML-03)“,”首页“:”912“,”article-title“:”使用高斯场和调和函数的半监督学习“,”author“:”Zhu“,”year“:”2003“}],”container-title”:[“Computers&Security”],”original-title:[],“language”:“en”,“link”:[{“URL”:“https:\/\/api.elsevier.com\/content\/article\/PII:S016740482300539?httpAccept=text\/xml”,“content-type”:“text\/.xml”,“content-version“:”vor“,”intended-application“:”text-mining“},{“URL”:“https:\/\/api.elsevier.com/content\/article\/PII:S016740482300539?httpAccept=text\/plain”,“content-type”:“text\/plan”,“content-version”:“vor”,“intended-application”:“text-mining”}],“deposed”:{“date-parts”:[2023,12,28]],“date-time”:”2023-12-28T15:45:45Z“,”timestamp“:1703778345000},”score“:1,”resource“:{“primary”:{”URL“:”https:\/\/linkinghub.elsevier.com/retrieve\/pii\/S016740482305539“}},“subtitle”:[],“shorttitle”:[],“issued”:{“date-parts”:[[2024,2]]},《references-count》:44,“alternative-id”:[“S0167404282305539”],“URL”:“http://\/dx.doi”org\/10.1016\/j.cose.2023.103644“,”关系“:{},”ISSN“:[”0167-4048“],”issn-type“:[{”value“:”0167-4038“,”type“:”print“}],”subject“:[],”published“:{”date-parts“:[[2024,2]]},”assertion“:[[{“value”:“Elsevier”,“name”:“publisher”,“label”:“本文由”}维护,{“value”:“一个简单的框架,用于增强基于深度学习的入侵检测系统的对抗健壮性”,“名称”:“articletite”,“label“:”Article Title“},{“value”:“Computers&Security”,“name”:“journaltitle”,“label”:“Journal Title”},“value“:”https:\/\/doi.org\/10.1016\/j.cose.2023.103644“,”name“:”articlelink“,”label“:”CrossRef doi link to publisher maintained version“}、{“value”:“Article”、“name”“:”content_type“,”标签“:”content-type“}”,{”value“:”\u00a9 2023 Elsevier Ltd。保留所有权利。“,”name“:”copyright“,”label“:”copyright“}],”文章编号“:”103644“}}