{"id":"https://openalex.org/W4406610833","doi":"https://doi.org/10.1109/mnet.2025.3532109","title":"Improving Multi-Model Anomaly Traffic Detection in MEC Networks With Large-Model- Powered Continuous Learning","display_name":"Improving Multi-Model Anomaly Traffic Detection in MEC Networks With Large-Model- Powered Continuous Learning","publication_year":2025,"publication_date":"2025-01-20","ids":{"openalex":"https://openalex.org/W4406610833","doi":"https://doi.org/10.1109/mnet.2025.3532109"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.2025.3532109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3532109","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114973640","display_name":"Junjie Zhang","orcid":"https://orcid.org/0009-0002-1140-8688"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junjie Zhang","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, China","College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004385468","display_name":"Zheyi Chen","orcid":"https://orcid.org/0000-0002-6349-068X"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheyi Chen","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, China","College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036420194","display_name":"Hongju Cheng","orcid":"https://orcid.org/0000-0002-0768-7859"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongju Cheng","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, China","College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679241","display_name":"Jie Li","orcid":"https://orcid.org/0000-0002-4974-6116"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100770003","display_name":"Geyong Min","orcid":"https://orcid.org/0000-0003-1395-7314"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Geyong Min","raw_affiliation_strings":["Department of Computer Science, University of Exeter, Exeter, U.K","Department of Computer Science, University of Exeter, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, U.K","institution_ids":["https://openalex.org/I23923803"]},{"raw_affiliation_string":"Department of Computer Science, University of Exeter, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114973640"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":1.4888,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79463533,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"39","issue":"3","first_page":"56","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6854594349861145},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6838765740394592},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.5388007164001465},{"id":"https://openalex.org/keywords/traffic-model","display_name":"Traffic model","score":0.43573620915412903},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4346834421157837},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4070548713207245},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34183627367019653}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6854594349861145},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6838765740394592},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.5388007164001465},{"id":"https://openalex.org/C2775847900","wikidata":"https://www.wikidata.org/wiki/Q28455493","display_name":"Traffic model","level":2,"score":0.43573620915412903},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4346834421157837},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4070548713207245},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34183627367019653},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.2025.3532109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3532109","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2743678626","https://openalex.org/W2962884963","https://openalex.org/W2963516518","https://openalex.org/W2964189064","https://openalex.org/W3134226201","https://openalex.org/W3209166877","https://openalex.org/W4296473472","https://openalex.org/W4312449837","https://openalex.org/W4313166141","https://openalex.org/W4313856036","https://openalex.org/W4387491256","https://openalex.org/W4389495316"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Anomaly":[0],"traffic":[1,79,136,159,189],"detection":[2,38,65,80,137,149],"offers":[3],"essential":[4],"technical":[5],"support":[6],"for":[7,23],"securing":[8],"Mobile":[9],"Edge":[10],"Computing":[11],"(MEC)":[12],"networks.":[13,43],"The":[14],"emerging":[15],"Large":[16],"Model":[17],"(LM)":[18],"has":[19],"attracted":[20],"much":[21],"attention":[22],"their":[24,130],"excellent":[25],"data":[26,60,117],"generation":[27],"and":[28,122,129,138,150,164,173,185],"processing":[29],"capabilities,":[30],"but":[31,53],"it":[32],"is":[33],"difficult":[34],"to":[35,56,100,125,146,176],"deploy":[36],"LM-based":[37],"models":[39,49,89,103],"in":[40,63,91,119,187],"resource-constrained":[41],"MEC":[42,92,120,183],"Existing":[44],"solutions":[45],"usually":[46],"compress":[47],"large":[48,102],"into":[50],"tiny":[51,88],"ones,":[52],"they":[54],"tend":[55],"be":[57],"impacted":[58],"by":[59,116],"drift,":[61],"resulting":[62],"decreased":[64],"accuracy.":[66,153],"To":[67],"address":[68],"this":[69],"key":[70],"challenge,":[71],"we":[72,169],"propose":[73],"CL4Det,":[74],"a":[75],"novel":[76],"multi-model":[77],"anomaly":[78,188],"framework":[81],"with":[82,141,157],"LM-powered":[83],"continuous":[84,105],"learning,":[85],"where":[86],"the":[87,96,101,111,162,171,179],"deployed":[90],"networks":[93,121,184],"can":[94],"achieve":[95],"desired":[97],"performance":[98,113],"comparable":[99],"via":[104],"retraining.":[106],"Specifically,":[107],"CL4Det":[108,133],"periodically":[109],"evaluates":[110],"model":[112,152],"degradation":[114],"caused":[115],"drift":[118],"decides":[123],"whether":[124],"generate":[126],"retraining":[127,139],"tasks":[128,140],"configurations.":[131],"Meanwhile,":[132],"schedules":[134],"all":[135],"proper":[142],"resource":[143],"allocation,":[144],"aiming":[145],"ensure":[147],"real-time":[148],"maximize":[151],"A":[154],"case":[155],"study":[156],"real-world":[158],"datasets":[160],"verifies":[161],"effectiveness":[163],"superiority":[165],"of":[166,182],"CL4Det.":[167],"Finally,":[168],"outline":[170],"challenges":[172],"future":[174],"directions":[175],"fully":[177],"exploit":[178],"collaborative":[180],"potentials":[181],"LM":[186],"detection.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
