{"id":"https://openalex.org/W4387870015","doi":"https://doi.org/10.1109/secon58729.2023.10287473","title":"Generative Adversarial Network-Based Network Anomaly Detection with Unlabeled Data","display_name":"Generative Adversarial Network-Based Network Anomaly Detection with Unlabeled Data","publication_year":2023,"publication_date":"2023-09-11","ids":{"openalex":"https://openalex.org/W4387870015","doi":"https://doi.org/10.1109/secon58729.2023.10287473"},"language":"en","primary_location":{"id":"doi:10.1109/secon58729.2023.10287473","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/secon58729.2023.10287473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100358823","display_name":"Qing Zhang","orcid":"https://orcid.org/0000-0003-2137-1559"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qing Zhang","raw_affiliation_strings":["China Unicom Intelligent Network Innovation Center,Beijing,China,100048","School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Unicom Intelligent Network Innovation Center,Beijing,China,100048","institution_ids":["https://openalex.org/I6507939"]},{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101965646","display_name":"Chao Cai","orcid":"https://orcid.org/0000-0003-1917-6367"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Cai","raw_affiliation_strings":["China Unicom Intelligent Network Innovation Center,Beijing,China,100048"],"affiliations":[{"raw_affiliation_string":"China Unicom Intelligent Network Innovation Center,Beijing,China,100048","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014264919","display_name":"Xiaofei Qin","orcid":"https://orcid.org/0000-0002-0258-5423"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofei Qin","raw_affiliation_strings":["China Unicom Intelligent Network Innovation Center,Beijing,China,100048"],"affiliations":[{"raw_affiliation_string":"China Unicom Intelligent Network Innovation Center,Beijing,China,100048","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100651939","display_name":"Yuzhu Wang","orcid":"https://orcid.org/0000-0003-0449-2973"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuzhu Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,School of Information and Communication Engineering,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,School of Information and Communication Engineering,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101258745","display_name":"Kang Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang Cao","raw_affiliation_strings":["China Unicom Intelligent Network Innovation Center,Beijing,China,100048"],"affiliations":[{"raw_affiliation_string":"China Unicom Intelligent Network Innovation Center,Beijing,China,100048","institution_ids":["https://openalex.org/I6507939"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100358823"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I6507939"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13561004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"112","last_page":"117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7717141509056091},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7696248292922974},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7638548612594604},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6225942373275757},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.502655029296875},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.4960852563381195},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.46579158306121826},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46555477380752563},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.4514344334602356},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.4487452208995819},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4346630573272705},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.4212930202484131},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39179450273513794},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3828775882720947},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2619073987007141},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1367776095867157}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7717141509056091},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7696248292922974},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7638548612594604},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6225942373275757},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.502655029296875},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4960852563381195},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.46579158306121826},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46555477380752563},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.4514344334602356},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.4487452208995819},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4346630573272705},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4212930202484131},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39179450273513794},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3828775882720947},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2619073987007141},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1367776095867157},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/secon58729.2023.10287473","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/secon58729.2023.10287473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2122646361","https://openalex.org/W2180566385","https://openalex.org/W2599354622","https://openalex.org/W2950361482","https://openalex.org/W2962736999","https://openalex.org/W3021378343","https://openalex.org/W3161603475","https://openalex.org/W4290996537","https://openalex.org/W4297944392","https://openalex.org/W6843471096"],"related_works":["https://openalex.org/W3186512740","https://openalex.org/W3194885736","https://openalex.org/W4363671829","https://openalex.org/W2888032422","https://openalex.org/W4377980832","https://openalex.org/W2897769091","https://openalex.org/W2845413374","https://openalex.org/W3005996785","https://openalex.org/W4297411772","https://openalex.org/W4235873501"],"abstract_inverted_index":{"In":[0],"the":[1,28,38,71,103,113,122,135],"rapidly":[2],"evolving":[3],"landscape":[4],"of":[5,33,40,73,117,138],"5G":[6,130],"networks,":[7],"effective":[8],"anomaly":[9,67,89,119],"detection":[10,68,100],"is":[11,55,82,105],"becoming":[12],"increasingly":[13],"important":[14],"to":[15,27,133],"ensure":[16],"network":[17,34,66,79,92,118],"stability":[18],"and":[19,31,76,115],"security.":[20],"Traditional":[21],"methods":[22],"often":[23],"encounter":[24],"issues":[25],"due":[26],"inherent":[29],"complexity":[30],"diversity":[32],"data,":[35],"coupled":[36],"with":[37],"lack":[39],"labeled":[41],"data.":[42],"Although":[43],"there":[44],"are":[45,125],"some":[46],"feasible":[47],"artificial":[48],"intelligence":[49],"(AI)":[50],"techniques":[51],"available,":[52],"their":[53],"performance":[54,136],"still":[56],"limited.":[57],"To":[58],"address":[59],"these":[60],"challenges,":[61],"this":[62],"paper":[63],"proposes":[64],"a":[65,108],"scheme.":[69,141],"First,":[70],"strengths":[72],"Autoencoder":[74],"(AE)":[75],"generative":[77],"adversarial":[78],"(GAN)":[80],"architectures":[81],"combined.":[83],"Through":[84],"feature":[85],"transformation,":[86],"it":[87],"calculates":[88],"scores":[90],"for":[91],"data":[93],"at":[94],"specific":[95],"time":[96],"points,":[97],"significantly":[98],"enhancing":[99],"accuracy.":[101],"Second,":[102],"scheme":[104],"deployed":[106],"in":[107,127],"distributed":[109],"architecture,":[110],"thereby":[111],"improving":[112],"robustness":[114],"flexibility":[116],"detection.":[120],"Finally,":[121],"simulation":[123],"results":[124],"provided":[126],"two":[128],"distinct":[129],"vertical":[131],"applications":[132],"show":[134],"gains":[137],"our":[139],"proposed":[140]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
