{"id":"https://openalex.org/W4412972673","doi":"https://doi.org/10.1109/tii.2025.3574417","title":"DDCC: Synergizing Denoising Diffusion Probabilistic Models and Curriculum-Based Complexity Control for Insider Threat Detection","display_name":"DDCC: Synergizing Denoising Diffusion Probabilistic Models and Curriculum-Based Complexity Control for Insider Threat Detection","publication_year":2025,"publication_date":"2025-07-17","ids":{"openalex":"https://openalex.org/W4412972673","doi":"https://doi.org/10.1109/tii.2025.3574417"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2025.3574417","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3574417","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017411757","display_name":"Jiankuo Dong","orcid":"https://orcid.org/0000-0003-1693-3000"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiankuo Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-1693-3000","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jie Wei","orcid":"https://orcid.org/0009-0007-0652-3688"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Wei","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0007-0652-3688","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaoyu Hu","orcid":"https://orcid.org/0009-0006-9381-0177"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Hu","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0006-9381-0177","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100528032","display_name":"Zhenjiang Dong","orcid":"https://orcid.org/0009-0001-1213-8686"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenjiang Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0001-1213-8686","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019828636","display_name":"Fuyuan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fuyuan Chen","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101859314","display_name":"Xin Hu","orcid":"https://orcid.org/0000-0001-9978-4121"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Hu","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009718169","display_name":"Jin Qi","orcid":"https://orcid.org/0000-0001-5846-4674"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Qi","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-5846-4674","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5017411757"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28287791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"11","first_page":"8351","last_page":"8361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9459999799728394,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9365000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.7997134923934937},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.7547826170921326},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.597698450088501},{"id":"https://openalex.org/keywords/noise-reduction","display_name":"Noise reduction","score":0.5149670243263245},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4262763559818268},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.41014036536216736},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39639878273010254}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.7997134923934937},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.7547826170921326},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.597698450088501},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.5149670243263245},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4262763559818268},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.41014036536216736},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39639878273010254},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2025.3574417","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3574417","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4021021469","display_name":null,"funder_award_id":"62302238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4314279214","display_name":null,"funder_award_id":"BK20220388","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G6469624284","display_name":null,"funder_award_id":"62372245","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8081072183","display_name":null,"funder_award_id":"62172258","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W61534595","https://openalex.org/W1991210879","https://openalex.org/W2025519999","https://openalex.org/W2064675550","https://openalex.org/W2157331557","https://openalex.org/W2296073425","https://openalex.org/W2342408547","https://openalex.org/W2495841828","https://openalex.org/W2538737552","https://openalex.org/W2772609275","https://openalex.org/W2789266794","https://openalex.org/W2808709910","https://openalex.org/W3000429356","https://openalex.org/W3003457445","https://openalex.org/W3011124515","https://openalex.org/W3128317221","https://openalex.org/W3130625521","https://openalex.org/W3153493802","https://openalex.org/W3175686153","https://openalex.org/W4206342677","https://openalex.org/W4283318673","https://openalex.org/W4288083473","https://openalex.org/W4292851291","https://openalex.org/W4296123057","https://openalex.org/W4297828509","https://openalex.org/W4385605314","https://openalex.org/W4387706023","https://openalex.org/W4390872231"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2792608345","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W4387194049","https://openalex.org/W2063508592"],"abstract_inverted_index":{"Insider":[0],"threat":[1,58,85,184],"detection":[2,86,185],"aims":[3],"to":[4,28,46,56,83,114,135,146],"identify":[5],"malicious":[6],"activities":[7],"by":[8],"employees":[9],"that":[10],"may":[11],"compromise":[12],"the":[13,128,133,155,161,172,197,204],"confidentiality,":[14],"integrity,":[15],"or":[16],"availability":[17],"of":[18,190,199],"organizational":[19,42,219],"data.":[20],"Detecting":[21],"insider":[22,57,84,183],"threats":[23],"poses":[24],"unique":[25],"challenges":[26,206],"compared":[27],"external":[29],"threats,":[30,211],"as":[31],"internal":[32,210],"actors":[33],"often":[34],"possess":[35],"authorized":[36],"system":[37],"access":[38],"and":[39,99,176],"familiarity":[40],"with":[41,66,208],"systems,":[43],"enabling":[44],"them":[45],"execute":[47],"attacks":[48],"discreetly.":[49],"This":[50],"article":[51],"presents":[52],"a":[53,67,123],"novel":[54],"approach":[55,92,201],"detection,":[59,80],"synergizing":[60],"denoising":[61,156],"diffusion":[62,157],"probabilistic":[63,158],"models":[64],"(DDPM)":[65],"curriculum-based":[68],"complexity":[69],"control":[70],"strategy":[71],"(DDCC).":[72],"While":[73],"DDPM":[74,94],"has":[75],"shown":[76],"promise":[77],"in":[78,182,202,218],"anomaly":[79,100,167],"its":[81,213],"application":[82],"remains":[87],"relatively":[88],"unexplored.":[89],"The":[90,102,139,194],"proposed":[91],"leverages":[93],"for":[95,166,215],"context-aware":[96],"behavioral":[97,110,164],"modeling":[98],"scoring.":[101],"methodology":[103],"encompasses":[104],"three":[105],"primary":[106],"components:":[107],"First,":[108],"employee":[109,163,192],"logs":[111],"undergo":[112],"fusion":[113],"aggregate":[115],"context":[116],"information":[117],"across":[118,186],"various":[119],"time":[120,188],"scales.":[121],"Second,":[122],"curriculum":[124],"learning":[125],"module":[126],"controls":[127],"training":[129,140],"process,":[130],"gradually":[131],"exposing":[132],"model":[134,159],"increasingly":[136],"complex":[137,147],"samples.":[138],"data":[141],"organization":[142],"progresses":[143],"from":[144],"simple":[145],"sequences,":[148],"facilitating":[149],"more":[150],"effective":[151],"feature":[152],"learning.":[153],"Third,":[154],"reconstructs":[160],"fused":[162],"sequences":[165],"detection.":[168],"Experimental":[169],"validation":[170],"on":[171],"CMU":[173],"CERT":[174],"r5.2":[175],"r6.2":[177],"datasets":[178],"demonstrates":[179],"robust":[180],"performance":[181],"multiple":[187],"granularities":[189],"aggregated":[191],"logs.":[193],"results":[195],"underscore":[196],"effectiveness":[198],"this":[200],"addressing":[203],"nuanced":[205],"associated":[207],"detecting":[209],"highlighting":[212],"potential":[214],"real-world":[216],"deployment":[217],"security":[220],"frameworks.":[221]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
