{"id":"https://openalex.org/W4315629915","doi":"https://doi.org/10.1109/globecom48099.2022.10001289","title":"A Dynamic Access Control Model Based on Attributes and Intro VAE","display_name":"A Dynamic Access Control Model Based on Attributes and Intro VAE","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4315629915","doi":"https://doi.org/10.1109/globecom48099.2022.10001289"},"language":"en","primary_location":{"id":"doi:10.1109/globecom48099.2022.10001289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001289","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Research Base of International Cyberspace Governance (Southeast University), Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Research Base of International Cyberspace Governance (Southeast University), Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110526670","display_name":"Yuelin Hu","orcid":"https://orcid.org/0000-0003-3466-748X"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuelin Hu","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102351112","display_name":"Yifei Qin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yifei Qin","raw_affiliation_strings":["Jiangsu Enlink network technology Co., Ltd"],"affiliations":[{"raw_affiliation_string":"Jiangsu Enlink network technology Co., Ltd","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034787225","display_name":"Jian Gong","orcid":"https://orcid.org/0000-0001-7264-3636"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Gong","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5073150709"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.6486,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.62555617,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1379","last_page":"1384"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8310854434967041},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7868844270706177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6152232885360718},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.547351598739624},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5086215734481812},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.49428892135620117},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.45745742321014404},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.44242098927497864},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4317302107810974},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3241526484489441},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2180595099925995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8310854434967041},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7868844270706177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6152232885360718},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.547351598739624},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5086215734481812},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.49428892135620117},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.45745742321014404},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.44242098927497864},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4317302107810974},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3241526484489441},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2180595099925995},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom48099.2022.10001289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001289","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/3"}],"awards":[{"id":"https://openalex.org/G3175317044","display_name":null,"funder_award_id":"61602114","funder_id":"https://openalex.org/F4320333688","funder_display_name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320333688","display_name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1959608418","https://openalex.org/W1970088130","https://openalex.org/W2076063813","https://openalex.org/W2098662896","https://openalex.org/W2102409316","https://openalex.org/W2566006170","https://openalex.org/W2891833507","https://openalex.org/W2936845163","https://openalex.org/W2950378732","https://openalex.org/W2981186629","https://openalex.org/W3000429356","https://openalex.org/W3002823324","https://openalex.org/W3013462939","https://openalex.org/W3113886654","https://openalex.org/W3119029232","https://openalex.org/W3145705989","https://openalex.org/W3153872861","https://openalex.org/W4231029117","https://openalex.org/W4287180005","https://openalex.org/W4320013936","https://openalex.org/W6640963894","https://openalex.org/W6675401909","https://openalex.org/W6753113894","https://openalex.org/W6775328258","https://openalex.org/W6787622487","https://openalex.org/W6795205016"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2555738791","https://openalex.org/W1990260561","https://openalex.org/W1593822213","https://openalex.org/W2357728851","https://openalex.org/W2017675414","https://openalex.org/W2367441718","https://openalex.org/W2355345331"],"abstract_inverted_index":{"Affected":[0],"by":[1,180],"the":[2,11,16,29,96,112,118,129,137,152,167,170,178,184,218,232,248,287],"COVID-19":[3],"pandemic,":[4],"teleworking":[5,33],"is":[6,43,62,66,108,189,235],"becoming":[7],"more":[8],"popular,":[9],"with":[10,34],"exposed":[12],"attack":[13,115,119,229],"surface":[14],"of":[15,98,114,139,169,212,221,228,250,271,280,289],"internal":[17],"network":[18,140,251],"expanding.":[19],"Once":[20],"outsiders":[21],"personate":[22],"accounts":[23],"or":[24],"insiders":[25],"conduct":[26],"illegal":[27],"operations,":[28],"data":[30,54],"security":[31],"in":[32,273],"traditional":[35],"border":[36],"protection":[37],"will":[38],"be":[39,204],"broken.":[40],"Therefore,":[41],"it":[42,107],"necessary":[44],"to":[45,52,95,110,124,150,194,240,242,247],"implement":[46],"fine-grained":[47],"and":[48,70,79,102,117,162,224,276],"dynamic":[49,85,145,196,264],"access":[50,59,86,146,197,265],"control":[51,60,147],"protect":[53],"from":[55],"malicious":[56],"access.":[57,207],"Attribute-based":[58],"(ABAC)":[61],"ideal,":[63],"where":[64],"authorization":[65],"performed":[67],"through":[68,159,237,283],"attributes":[69,168],"rules.":[71],"On":[72],"this":[73],"basis,":[74],"risk":[75],"assessment,":[76],"context":[77],"awareness,":[78],"machine":[80],"learning":[81,239],"are":[82,132],"supplemented":[83],"for":[84,136,191,206,215],"control.":[87,266],"However,":[88],"these":[89],"methods":[90],"have":[91],"their":[92],"limitations":[93],"due":[94,246],"requirement":[97],"sufficient":[99],"prior":[100],"knowledge":[101],"massive":[103,223],"label-classified":[104],"data.":[105],"Moreover,":[106],"challenging":[109],"obtain":[111],"samples":[113,211,227],"behaviors,":[116],"behaviors":[120,131,245],"may":[121],"change":[122],"frequently":[123,225],"evade":[125],"detection.":[126],"In":[127],"contrast,":[128],"normal":[130,202,213,244],"relatively":[133],"stable":[134],"except":[135],"update":[138,249],"services.":[141,252],"We":[142],"propose":[143],"a":[144],"model,":[148],"ABAC-IntroVAE,":[149],"address":[151],"above":[153],"issues.":[154],"ABAC-IntroVAE":[155,208,260],"judges":[156],"users'":[157],"requests":[158,176,214],"rule":[160,181],"matching":[161],"behavior":[163,192,292],"analysis":[164,193],"based":[165],"on":[166],"requests.":[171,230],"It":[172,267],"first":[173],"filters":[174],"out":[175],"against":[177],"rules":[179],"matching.":[182],"Then,":[183],"introspective":[185],"variational":[186],"autoencoder":[187],"(IntroVAE)":[188],"used":[190],"realize":[195],"decisions.":[198],"Requests":[199],"classified":[200],"as":[201],"can":[203,261],"authorized":[205],"only":[209],"needs":[210],"training,":[216],"avoiding":[217],"difficult":[219],"task":[220],"collecting":[222],"changing":[226],"Meanwhile,":[231],"IntroVAE":[233],"model":[234],"updated":[236],"continual":[238,284],"adapt":[241],"new-style":[243,290],"Our":[253],"experiment":[254],"study":[255],"suggests":[256],"that":[257],"our":[258],"proposed":[259],"effectively":[262],"perform":[263],"achieves":[268],"an":[269,278],"accuracy":[270,279],"97.2%":[272],"abnormal":[274],"detection":[275],"maintains":[277],"over":[281],"97%":[282],"learning,":[285],"despite":[286],"addition":[288],"user":[291],"patterns.":[293]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
