{"id":"https://openalex.org/W7147284845","doi":"https://doi.org/10.1109/cnml68938.2026.11452297","title":"TAGT: A Time-Aware Graph Transformer for Securing Time-Sensitive Networking","display_name":"TAGT: A Time-Aware Graph Transformer for Securing Time-Sensitive Networking","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147284845","doi":"https://doi.org/10.1109/cnml68938.2026.11452297"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11452297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132700658","display_name":"Liang Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Qi","raw_affiliation_strings":["Sun Yat-sen University,School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University,School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5132565559","display_name":"Wushao Wen","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wushao Wen","raw_affiliation_strings":["Sun Yat-sen University,School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University,School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5132700658"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.94525441,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"82","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.007499999832361937,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.0024999999441206455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5220999717712402},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4862000048160553},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.4575999975204468},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4115999937057495},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.40450000762939453},{"id":"https://openalex.org/keywords/clock-synchronization","display_name":"Clock synchronization","score":0.39910000562667847},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.38530001044273376},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.3783000111579895}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6790000200271606},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5220999717712402},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4862000048160553},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4713999927043915},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.4575999975204468},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4465999901294708},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4115999937057495},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.40450000762939453},{"id":"https://openalex.org/C129891060","wikidata":"https://www.wikidata.org/wiki/Q1513059","display_name":"Clock synchronization","level":4,"score":0.39910000562667847},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.38530001044273376},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3783000111579895},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.37700000405311584},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37119999527931213},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3626999855041504},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.351500004529953},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.3098999857902527},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C111097370","wikidata":"https://www.wikidata.org/wiki/Q10969923","display_name":"Synchronization networks","level":4,"score":0.2743000090122223},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C37624559","wikidata":"https://www.wikidata.org/wiki/Q5375776","display_name":"End-to-end delay","level":3,"score":0.2671999931335449},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.26669999957084656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11452297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11452297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2983272077","https://openalex.org/W3140377724","https://openalex.org/W3169450514","https://openalex.org/W3193860174","https://openalex.org/W3195279647","https://openalex.org/W3197944870","https://openalex.org/W4315630009","https://openalex.org/W4385245566","https://openalex.org/W4385805038","https://openalex.org/W4389859927","https://openalex.org/W4401508226","https://openalex.org/W4402370051","https://openalex.org/W4408701898"],"related_works":[],"abstract_inverted_index":{"The":[0,18,177],"precision":[1],"of":[2,8,164],"time":[3,58],"synchronization":[4,68],"is":[5,183,191],"the":[6,55,61,116,138],"cornerstone":[7],"safety-critical":[9],"applications":[10],"in":[11,67,186],"Automotive":[12],"Ethernet":[13],"and":[14,37,60,123,190],"Time-Sensitive":[15],"Networking":[16],"(TSN).":[17],"IEEE":[19],"802.1AS":[20],"protocol":[21],"(gPTP),":[22],"while":[23],"widely":[24],"adopted,":[25],"lacks":[26],"built-in":[27],"security":[28],"mechanisms,":[29],"making":[30],"it":[31],"vulnerable":[32],"to":[33,118,133,146,193],"sophisticated":[34],"delay":[35],"attacks":[36,189],"packet":[38,108],"manipulation.":[39],"Existing":[40],"Deep":[41],"Learning-based":[42],"Intrusion":[43],"Detection":[44],"Systems":[45],"(IDS)":[46],"often":[47],"treat":[48],"network":[49,139],"traffic":[50],"as":[51],"discrete":[52,94],"sequences,":[53],"ignoring":[54],"continuous":[56],"physical":[57],"dynamics":[59],"complex":[62],"spatial":[63,135],"topological":[64,194],"dependencies":[65],"inherent":[66],"protocols.To":[69],"address":[70],"these":[71],"limitations,":[72],"this":[73],"study":[74],"proposes":[75],"TAGT,":[76],"a":[77,99,148,174],"novel":[78],"Time-Aware":[79],"Graph":[80,129],"Transformer":[81],"framework":[82],"for":[83],"robust":[84,192],"gPTP":[85],"attack":[86],"detection.":[87],"Unlike":[88],"standard":[89],"Transformers":[90],"that":[91,159,180],"rely":[92],"on":[93,154],"positional":[95],"encodings,":[96],"TAGT":[97,160],"incorporates":[98],"Learnable":[100],"Continuous":[101],"Time-Encoding":[102],"(LCTE)":[103],"mechanism.":[104],"LCTE":[105],"maps":[106],"irregular":[107],"arrival":[109],"intervals":[110],"into":[111],"high-dimensional":[112],"frequency":[113],"representations,":[114],"enabling":[115],"model":[117],"capture":[119],"microsecond-level":[120],"clock":[121],"jitter":[122],"drift":[124],"anomalies.":[125],"Furthermore,":[126],"we":[127],"integrate":[128],"Attention":[130],"Networks":[131],"(GAT)":[132],"extract":[134],"features":[136],"from":[137],"topology,":[140],"fusing":[141],"them":[142],"with":[143],"temporal":[144],"embeddings":[145],"learn":[147],"unified":[149],"spatio-temporal":[150],"representation.":[151],"Extensive":[152],"experiments":[153],"high-fidelity":[155],"OMNeT++":[156],"simulations":[157],"demonstrate":[158],"achieves":[161],"an":[162],"F1-score":[163],"95.65%,":[165],"outperforming":[166],"existing":[167],"baseline":[168],"models":[169],"(e.g.,":[170],"LSTM,":[171],"GCN)":[172],"by":[173],"significant":[175],"margin.":[176],"results":[178],"validate":[179],"our":[181],"approach":[182],"highly":[184],"effective":[185],"detecting":[187],"low-frequency":[188],"changes.":[195]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
