{"id":"https://openalex.org/W4406892235","doi":"https://doi.org/10.1109/csnet64211.2024.10851755","title":"Effective Anomaly Detection in 5G Networks via Transformer-Based Models and Contrastive Learning","display_name":"Effective Anomaly Detection in 5G Networks via Transformer-Based Models and Contrastive Learning","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406892235","doi":"https://doi.org/10.1109/csnet64211.2024.10851755"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057569676","display_name":"Saeid Sheikhi","orcid":"https://orcid.org/0000-0002-3600-966X"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Saeid Sheikhi","raw_affiliation_strings":["University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051336752","display_name":"Panos Kostakos","orcid":"https://orcid.org/0000-0002-8545-599X"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Panos Kostakos","raw_affiliation_strings":["University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000765468","display_name":"Susanna Pirttikangas","orcid":"https://orcid.org/0000-0003-2428-9948"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Susanna Pirttikangas","raw_affiliation_strings":["University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014","institution_ids":["https://openalex.org/I98381234"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057569676"],"corresponding_institution_ids":["https://openalex.org/I98381234"],"apc_list":null,"apc_paid":null,"fwci":1.7405,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.87766677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"38","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9304999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6773003935813904},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6234330534934998},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.546838104724884},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4388406276702881},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.42279577255249023},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.149909108877182},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.08986315131187439},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06492829322814941},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.06082114577293396}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6773003935813904},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6234330534934998},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.546838104724884},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4388406276702881},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.42279577255249023},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.149909108877182},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.08986315131187439},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06492829322814941},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.06082114577293396},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1661701608","https://openalex.org/W2767159843","https://openalex.org/W2957864913","https://openalex.org/W2965236767","https://openalex.org/W3034578955","https://openalex.org/W3037175369","https://openalex.org/W3191493780","https://openalex.org/W4210763735","https://openalex.org/W4286507519","https://openalex.org/W4292259339","https://openalex.org/W4303980519","https://openalex.org/W4310398258","https://openalex.org/W4311716377","https://openalex.org/W4312877533","https://openalex.org/W4366829097","https://openalex.org/W4382239668","https://openalex.org/W4385269797","https://openalex.org/W4396561990","https://openalex.org/W4402811674"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,26],"present":[4],"a":[5,64,76,99,133],"novel":[6],"approach":[7],"to":[8,28,67,80,141],"anomaly":[9,160],"detection":[10,31,161],"in":[11,157,162,174],"5G":[12,44,101,163],"networks":[13],"using":[14],"contrastive":[15,77,151],"learning":[16,78,152],"and":[17,41,58,89,109,119,126,171],"transformer-based":[18,155],"models.":[19],"Leveraging":[20],"the":[21,30,39,49,69,72,82,85,148],"power":[22],"of":[23,32,43,51,71,87,137,150],"self-supervision":[24],"mechanisms,":[25],"aim":[27],"enhance":[29],"anomalous":[33,90],"network":[34,176],"activities":[35],"that":[36,116],"can":[37],"compromise":[38],"secu-rity":[40],"reliability":[42],"networks.":[45],"The":[46,93,145],"methodology":[47],"involves":[48],"use":[50],"pretrained":[52],"transformer":[53],"models":[54,95],"(DistilBERT,":[55],"BERT,":[56],"RoBERTa,":[57,118],"ALBERT)":[59],"as":[60],"encoders,":[61],"followed":[62],"by":[63],"projection":[65],"layer":[66],"reduce":[68],"dimensionality":[70],"embeddings.":[73],"We":[74,131],"employ":[75],"objective":[79],"train":[81],"models,":[83],"encouraging":[84],"separation":[86],"normal":[88,107],"data":[91],"points.":[92],"trained":[94],"are":[96],"evaluated":[97],"on":[98],"custom":[100],"testbed":[102],"dataset,":[103],"which":[104],"simulates":[105],"various":[106],"operations":[108],"attack":[110],"scenarios.":[111],"Our":[112],"experimental":[113],"results":[114],"demonstrate":[115],"DistilBERT,":[117],"ALBERT":[120],"achieve":[121],"high":[122],"accuracy,":[123],"precision,":[124],"recall,":[125],"Fl-score,":[127],"significantly":[128],"outperforming":[129],"BERT.":[130],"provide":[132],"comprehensive":[134],"visualization":[135],"analysis":[136],"each":[138],"model's":[139],"performance":[140],"illustrate":[142],"their":[143],"effectiveness.":[144],"findings":[146],"underscore":[147],"effectiveness":[149],"combined":[153],"with":[154],"architectures":[156],"achieving":[158],"robust":[159],"networks,":[164],"offering":[165],"valuable":[166],"insights":[167],"for":[168],"future":[169],"research":[170],"practical":[172],"implementations":[173],"enhancing":[175],"security.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
