{"id":"https://openalex.org/W7124877942","doi":"https://doi.org/10.1109/tifs.2026.3655514","title":"Contextual Masking Distillation for Network Traffic Anomaly Detection","display_name":"Contextual Masking Distillation for Network Traffic Anomaly Detection","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124877942","doi":"https://doi.org/10.1109/tifs.2026.3655514"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3655514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3655514","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123291009","display_name":"Xinglin Lian","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinglin Lian","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123377344","display_name":"Yu Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zheng","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123392839","display_name":"Yan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Liu","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123390785","display_name":"Fan Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhou","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012655281","display_name":"Chunlei Peng","orcid":"https://orcid.org/0000-0003-3448-2514"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunlei Peng","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101313930","display_name":"Xinbo Gao","orcid":"https://orcid.org/0000-0002-7985-0037"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinbo Gao","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Electronic Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Electronic Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123291009"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12013113,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1273","last_page":"1286"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.49410000443458557,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.49410000443458557,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.39899998903274536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.022600000724196434,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7597000002861023},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.7196000218391418},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.6219000220298767},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4595000147819519},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4101000130176544},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.40470001101493835},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3610999882221222}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485999703407288},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7597000002861023},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.7196000218391418},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.6219000220298767},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.546999990940094},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5403000116348267},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5026000142097473},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4595000147819519},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4101000130176544},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.40470001101493835},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3050999939441681},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.29989999532699585},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2935999929904938},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.29120001196861267},{"id":"https://openalex.org/C204030448","wikidata":"https://www.wikidata.org/wiki/Q101017","display_name":"Distillation","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.27959999442100525}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3655514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3655514","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.7576491236686707,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2278457346","display_name":null,"funder_award_id":"62572097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3976612152","display_name":null,"funder_award_id":"62176043","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5302744849","display_name":null,"funder_award_id":"U22A2035","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5405834107","display_name":null,"funder_award_id":"62276198","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5420252985","display_name":null,"funder_award_id":"B16037","funder_id":"https://openalex.org/F4320336698","funder_display_name":"Overseas Expertise Introduction Center for Discipline Innovation of Food Nutrition and Human Health (111 Center)"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336698","display_name":"Overseas Expertise Introduction Center for Discipline Innovation of Food Nutrition and Human Health (111 Center)","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W2132870739","https://openalex.org/W2296719434","https://openalex.org/W2343828539","https://openalex.org/W2591712613","https://openalex.org/W2606697812","https://openalex.org/W2789828921","https://openalex.org/W2963045681","https://openalex.org/W2964137095","https://openalex.org/W3034314048","https://openalex.org/W3120227884","https://openalex.org/W3134226201","https://openalex.org/W3134622107","https://openalex.org/W3138516171","https://openalex.org/W3205483739","https://openalex.org/W4285111199","https://openalex.org/W4291710829","https://openalex.org/W4297094626","https://openalex.org/W4307042912","https://openalex.org/W4308632297","https://openalex.org/W4312772600","https://openalex.org/W4313060919","https://openalex.org/W4319299981","https://openalex.org/W4366147360","https://openalex.org/W4375861276","https://openalex.org/W4382239858","https://openalex.org/W4382240180","https://openalex.org/W4384436171","https://openalex.org/W4385562531","https://openalex.org/W4386065608","https://openalex.org/W4386565855","https://openalex.org/W4386694208","https://openalex.org/W4387007222","https://openalex.org/W4387011225","https://openalex.org/W4387158267","https://openalex.org/W4387266502","https://openalex.org/W4387351203","https://openalex.org/W4387805894","https://openalex.org/W4387846563","https://openalex.org/W4389639318","https://openalex.org/W4390547394","https://openalex.org/W4390571282","https://openalex.org/W4390737701","https://openalex.org/W4393150251","https://openalex.org/W4396757496","https://openalex.org/W4397000408","https://openalex.org/W4400489845","https://openalex.org/W4402288718","https://openalex.org/W4404896192","https://openalex.org/W4406754164","https://openalex.org/W4410090375","https://openalex.org/W4410226412","https://openalex.org/W4411244487","https://openalex.org/W6940431289"],"related_works":[],"abstract_inverted_index":{"Network":[0],"traffic":[1,35,152],"anomaly":[2,96,144],"detection":[3,172],"is":[4,123],"critical":[5],"for":[6,81,105],"cybersecurity":[7],"but":[8],"faces":[9],"challenges":[10],"in":[11,129,166],"accurately":[12],"identifying":[13],"malicious":[14],"activities.":[15],"Recent":[16],"zero-positive":[17],"approaches,":[18],"which":[19,110,149],"use":[20],"only":[21],"normal":[22,130],"training":[23,121],"data":[24],"under":[25],"the":[26,44,106,133,181,200],"reconstruction":[27],"paradigm,":[28],"have":[29],"shown":[30],"progress.":[31],"However,":[32],"encrypted":[33],"network":[34,137,168],"obscures":[36],"normal\u2013anomalous":[37],"distinctions,":[38],"causing":[39],"confused":[40],"modeling.":[41],"In":[42],"addition,":[43],"\u201cidentical":[45],"shortcut\u201d":[46],"problem,":[47],"where":[48],"models":[49],"reconstruct":[50],"any":[51],"input":[52],"with":[53,146],"similar":[54],"fidelity,":[55],"produces":[56],"suboptimal":[57],"representations":[58,83],"and":[59,84,93,114,160,195,202],"indistinguishable":[60],"detection.":[61],"To":[62],"address":[63],"these":[64],"limitations,":[65],"this":[66],"paper":[67],"introduces":[68],"ConMD,":[69,184],"a":[70,94,118,142],"novel":[71],"Contextual":[72],"Masking":[73],"Knowledge":[74],"Distillation":[75],"framework.":[76],"ConMD":[77,154],"features":[78],"distillation":[79],"paradigm":[80],"discriminative":[82],"then":[85],"pursues":[86],"two":[87],"objectives:":[88],"effective":[89],"contextual":[90,127],"information":[91],"modeling":[92],"comprehensive":[95,151],"metric.":[97],"Specifically,":[98],"we":[99,139],"introduce":[100],"context-aware":[101],"local-global":[102],"attention":[103],"mechanisms":[104],"student":[107],"network's":[108],"backbone,":[109],"capture":[111],"both":[112,158],"intra-packet":[113],"inter-packet":[115],"dependencies.":[116],"Additionally,":[117],"context-enhanced":[119],"masking":[120],"strategy":[122],"designed":[124],"to":[125,163,193],"facilitate":[126],"interactions":[128],"flows.":[131],"Given":[132],"structural":[134],"characteristics":[135],"of":[136,183],"traffic,":[138],"also":[140],"present":[141],"new":[143],"scoring":[145],"multi-view":[147],"awareness,":[148],"perceive":[150],"patterns.":[153],"combines":[155],"insights":[156],"from":[157],"packet-":[159],"flow-level":[161],"views":[162],"highlight":[164],"deviations":[165],"anomalous":[167],"flows,":[169],"thereby":[170],"improving":[171],"accuracy.":[173],"Extensive":[174],"experiments":[175],"on":[176,199],"three":[177],"real-world":[178],"datasets":[179],"validate":[180],"effectiveness":[182],"yielding":[185],"consistent":[186],"improvements":[187],"over":[188],"state-of-the-art":[189],"baselines,":[190],"achieving":[191],"up":[192],"2.8%":[194],"5.1%":[196],"AUC":[197],"gains":[198],"DataCon2020":[201],"CIC-IDS2017":[203],"datasets,":[204],"respectively.":[205],"Our":[206],"model":[207],"code":[208],"will":[209],"be":[210],"released":[211],"at":[212],"https://github.com/ikun0124/ConMD.":[213]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-21T00:00:00"}
