{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:W7MZVFMIEM73FKWA5U2F6JOFG4","short_pith_number":"pith:W7MZVFMI","schema_version":"1.0","canonical_sha256":"b7d99a9588233fb2aac0ed345f25c5371640ff64ebecb0fca048f990edf15a65","source":{"kind":"arxiv","id":"1901.07949","version":3},"attestation_state":"computed","paper":{"title":"Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"cs.CR","authors_text":"Chunbo Luo, Geyong Min, He Zhang, Peng Ren, Xingrui Yu","submitted_at":"2019-01-23T15:27:39Z","abstract_excerpt":"Intrusion detection systems (IDSs) play an important role in identifying malicious attacks and threats in networking systems. As fundamental tools of IDSs, learning based classification methods have been widely employed. When it comes to detecting network intrusions in small sample sizes (e.g., emerging intrusions), the limited number and imbalanced proportion of training samples usually cause significant challenges in training supervised and semi-supervised classifiers. In this paper, we propose a general network intrusion detection framework to address the challenges of both \\emph{data scarc"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1901.07949","kind":"arxiv","version":3},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2019-01-23T15:27:39Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"e86312cdfb346ffdd80fee61c3be2a368eb42a7f3f593a0abc51f624764ae742","abstract_canon_sha256":"1e791e7aded58806eb74bcd5d22590759a0eca291cb7507b17e58c1b35907555"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:55:26.761343Z","signature_b64":"/QB6Lj3sp2RhI4fWikqzcR688c/5v4yjsXgPcBhirJzTigF9sSS6lDZnf+a07xbNHhFzo8fEdLuDCSLqwHlXAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b7d99a9588233fb2aac0ed345f25c5371640ff64ebecb0fca048f990edf15a65","last_reissued_at":"2026-05-17T23:55:26.760924Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:55:26.760924Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"cs.CR","authors_text":"Chunbo Luo, Geyong Min, He Zhang, Peng Ren, Xingrui Yu","submitted_at":"2019-01-23T15:27:39Z","abstract_excerpt":"Intrusion detection systems (IDSs) play an important role in identifying malicious attacks and threats in networking systems. As fundamental tools of IDSs, learning based classification methods have been widely employed. When it comes to detecting network intrusions in small sample sizes (e.g., emerging intrusions), the limited number and imbalanced proportion of training samples usually cause significant challenges in training supervised and semi-supervised classifiers. In this paper, we propose a general network intrusion detection framework to address the challenges of both \\emph{data scarc"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.07949","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1901.07949","created_at":"2026-05-17T23:55:26.760993+00:00"},{"alias_kind":"arxiv_version","alias_value":"1901.07949v3","created_at":"2026-05-17T23:55:26.760993+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.07949","created_at":"2026-05-17T23:55:26.760993+00:00"},{"alias_kind":"pith_short_12","alias_value":"W7MZVFMIEM73","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_16","alias_value":"W7MZVFMIEM73FKWA","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_8","alias_value":"W7MZVFMI","created_at":"2026-05-18T12:33:30.264802+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4","json":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4.json","graph_json":"https://pith.science/api/pith-number/W7MZVFMIEM73FKWA5U2F6JOFG4/graph.json","events_json":"https://pith.science/api/pith-number/W7MZVFMIEM73FKWA5U2F6JOFG4/events.json","paper":"https://pith.science/paper/W7MZVFMI"},"agent_actions":{"view_html":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4","download_json":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4.json","view_paper":"https://pith.science/paper/W7MZVFMI","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1901.07949&json=true","fetch_graph":"https://pith.science/api/pith-number/W7MZVFMIEM73FKWA5U2F6JOFG4/graph.json","fetch_events":"https://pith.science/api/pith-number/W7MZVFMIEM73FKWA5U2F6JOFG4/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4/action/timestamp_anchor","attest_storage":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4/action/storage_attestation","attest_author":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4/action/author_attestation","sign_citation":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4/action/citation_signature","submit_replication":"https://pith.science/pith/W7MZVFMIEM73FKWA5U2F6JOFG4/action/replication_record"}},"created_at":"2026-05-17T23:55:26.760993+00:00","updated_at":"2026-05-17T23:55:26.760993+00:00"}