{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:54:47Z","timestamp":1730213687394,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361315","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"1137-1142","source":"Crossref","is-referenced-by-count":0,"title":["An Intrusion Detection System Empowered by Deep Learning Algorithms"],"prefix":"10.1109","author":[{"given":"Weiye","family":"Tang","sequence":"first","affiliation":[{"name":"wenzhou-kean university,department of computer science,Wenzhou,China"}]},{"given":"Daren","family":"Li","sequence":"additional","affiliation":[{"name":"wenzhou-kean university,department of computer science,Wenzhou,China"}]},{"given":"Wuyue","family":"Fan","sequence":"additional","affiliation":[{"name":"wenzhou-kean university,department of computer science,Wenzhou,China"}]},{"given":"Tianhao","family":"Liu","sequence":"additional","affiliation":[{"name":"wenzhou-kean university,department of computer science,Wenzhou,China"}]},{"given":"Man","family":"Chen","sequence":"additional","affiliation":[{"name":"wenzhou-kean university,department of computer science,Wenzhou,China"}]},{"given":"Omar","family":"Dib","sequence":"additional","affiliation":[{"name":"wenzhou-kean university,department of computer science,Wenzhou,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-031-29927-8_17"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1186\/s42400-019-0038-7"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s12652-022-04416-5"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/IndiaCom.2014.6828073"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s00500-021-05893-0"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JSYST.2022.3193200"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ACCESS.2022.3165809"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ACCESS.2022.3220622"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.ijcip.2022.100516"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICOSEC49089.2020.9215333"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TCYB.2022.3163811"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.eswa.2023.119771"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.comcom.2022.12.010"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.compeleceng.2022.108156"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.compeleceng.2022.107876"},{"issue":"6","key":"ref16","first-page":"1","article-title":"Autokeras: An automl library for deep learning","volume":"24","author":"Jin","year":"2023","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s10462-018-09679-z"},{"key":"ref18","first-page":"10096","article-title":"Efficientnetv2: Smaller models and faster training","volume-title":"International conference on machine learning. PMLR","author":"Tan","year":"2021"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TPAMI.2022.3152247"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.livsci.2021.104700"},{"year":"2022","author":"Zhuang","journal-title":"arXiv preprint","article-title":"Understanding adamw through proximal methods and scale-freeness","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.2991\/978-94-6463-094-7_9"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.pmcj.2023.101750"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361315.pdf?arnumber=10361315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:44:41Z","timestamp":1705092281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361315","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}