{"title":"撤回: Chinnathangam Karthikraja, Jayaprakasam Senthilkumar, Rajadurai Hariharan, Gandhi Usha Devi, Yuvaraj Suresh, Vijayakumar Mohanraj. 基于 XGBoost 和双向长短期模型的经验入侵检测系统,适用于 5G 和其他电信技术。 Comput Intell 38: 1216-1231, 2022 (10.1111/coin.12497)","authors":"","doi":"10.1111/coin.12671","DOIUrl":null,"url":null,"abstract":"<p>The above article, published online on 23 January 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Diana Inkpen, and Wiley Periodicals LLC. The article was published as part of a guest-edited special issue. Following publication, it came to our attention that two of those named as Guest Editors of this issue were being impersonated and/or misrepresented by a fraudulent entity. An investigation by the publisher found that all of the articles, including this one, experienced compromised editorial handling and peer review which was not in line with the journal's ethical standards. Therefore, a decision has been made to retract this article. We did not find any evidence of misconduct by the authors. The authors have been informed of the decision to retract but do not agree with this decision.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":null,"pages":null},"PeriodicalIF":1.8000,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.12671","citationCount":"0","resultStr":"{\"title\":\"Retraction: Chinnathangam Karthikraja, Jayaprakasam Senthilkumar, Rajadurai Hariharan, Gandhi Usha Devi, Yuvaraj Suresh, Vijayakumar Mohanraj. An empirical intrusion detection system based on XGBoost and bidirectional long-short term model for 5G and other telecommunication technologies. Comput Intell 38: 1216–1231, 2022 (10.1111/coin.12497)\",\"authors\":\"\",\"doi\":\"10.1111/coin.12671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The above article, published online on 23 January 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Diana Inkpen, and Wiley Periodicals LLC. The article was published as part of a guest-edited special issue. Following publication, it came to our attention that two of those named as Guest Editors of this issue were being impersonated and/or misrepresented by a fraudulent entity. An investigation by the publisher found that all of the articles, including this one, experienced compromised editorial handling and peer review which was not in line with the journal's ethical standards. Therefore, a decision has been made to retract this article. We did not find any evidence of misconduct by the authors. The authors have been informed of the decision to retract but do not agree with this decision.</p>\",\"PeriodicalId\":55228,\"journal\":{\"name\":\"Computational Intelligence\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2024-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.12671\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computational Intelligence\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1111/coin.12671\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computational Intelligence","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/coin.12671","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Retraction: Chinnathangam Karthikraja, Jayaprakasam Senthilkumar, Rajadurai Hariharan, Gandhi Usha Devi, Yuvaraj Suresh, Vijayakumar Mohanraj. An empirical intrusion detection system based on XGBoost and bidirectional long-short term model for 5G and other telecommunication technologies. Comput Intell 38: 1216–1231, 2022 (10.1111/coin.12497)
The above article, published online on 23 January 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Diana Inkpen, and Wiley Periodicals LLC. The article was published as part of a guest-edited special issue. Following publication, it came to our attention that two of those named as Guest Editors of this issue were being impersonated and/or misrepresented by a fraudulent entity. An investigation by the publisher found that all of the articles, including this one, experienced compromised editorial handling and peer review which was not in line with the journal's ethical standards. Therefore, a decision has been made to retract this article. We did not find any evidence of misconduct by the authors. The authors have been informed of the decision to retract but do not agree with this decision.
期刊介绍:
This leading international journal promotes and stimulates research in the field of artificial intelligence (AI). Covering a wide range of issues - from the tools and languages of AI to its philosophical implications - Computational Intelligence provides a vigorous forum for the publication of both experimental and theoretical research, as well as surveys and impact studies. The journal is designed to meet the needs of a wide range of AI workers in academic and industrial research.