1. Zhang, H., Li, Y., Lv, Z., et al.: A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA J. Autom. Sin. 7(3), 790–799 (2020)
2. Dong, R.H., Yan, H.H., Zhang, Q.Y.: An intrusion detection model for wireless sensor network based on information gain ratio and bagging algorithm. Int. J. Netw. Secur. 22(2), 218–230 (2020)
3. Yang, W.H.: Security detection of network intrusion: application of cluster analysis method. Comput. Opt. 44(4), 660–664 (2020)
4. Zhu, D.H., Cheng, Y.: Leak control of sensitive data in Internet of Things based on local differential privacy. Comput. Simul. 38(02), 472–476 (2021)
5. Jo, W., Kim, S., Lee, C., et al.: Packet preprocessing in CNN-based network intrusion detection system. Electronics 9(7), 1151 (2020)