{"id":"https://openalex.org/W4396817460","doi":"https://doi.org/10.1109/tnse.2024.3397719","title":"Poison-Resilient Anomaly Detection: Mitigating Poisoning Attacks in Semi-Supervised Encrypted Traffic Anomaly Detection","display_name":"Poison-Resilient Anomaly Detection: Mitigating Poisoning Attacks in Semi-Supervised Encrypted Traffic Anomaly Detection","publication_year":2024,"publication_date":"2024-05-10","ids":{"openalex":"https://openalex.org/W4396817460","doi":"https://doi.org/10.1109/tnse.2024.3397719"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3397719","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3397719","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102825275","display_name":"Zhangfa Wu","orcid":"https://orcid.org/0009-0007-3009-9661"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhangfa Wu","raw_affiliation_strings":["School of Electronic Information, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0009-0007-3009-9661","affiliations":[{"raw_affiliation_string":"School of Electronic Information, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100395256","display_name":"Huifang Li","orcid":"https://orcid.org/0000-0001-7634-5839"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huifang Li","raw_affiliation_strings":["School of Electronic Information, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0001-7634-5839","affiliations":[{"raw_affiliation_string":"School of Electronic Information, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000733266","display_name":"Yekui Qian","orcid":"https://orcid.org/0009-0006-4529-1042"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yekui Qian","raw_affiliation_strings":["People&#x0027;s Liberation Army Air Force Academy, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0009-0006-4529-1042","affiliations":[{"raw_affiliation_string":"People&#x0027;s Liberation Army Air Force Academy, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009136223","display_name":"Yi Hua","orcid":"https://orcid.org/0000-0003-0660-7826"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Hua","raw_affiliation_strings":["School of Aeronautics, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0003-0660-7826","affiliations":[{"raw_affiliation_string":"School of Aeronautics, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071986802","display_name":"Hongping Gan","orcid":"https://orcid.org/0000-0002-4853-5077"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongping Gan","raw_affiliation_strings":["School of Software, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0002-4853-5077","affiliations":[{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102825275"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":3.0201,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91500192,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"5","first_page":"4744","last_page":"4757"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7509269714355469},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6996974349021912},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5656127333641052},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5261268615722656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47513940930366516},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.29521921277046204},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08956199884414673}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7509269714355469},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6996974349021912},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5656127333641052},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5261268615722656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47513940930366516},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29521921277046204},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08956199884414673},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3397719","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3397719","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1995443851","https://openalex.org/W2062805799","https://openalex.org/W2077488147","https://openalex.org/W2133962824","https://openalex.org/W2151298633","https://openalex.org/W2592335154","https://openalex.org/W2612544399","https://openalex.org/W2753783305","https://openalex.org/W2783205364","https://openalex.org/W2808472075","https://openalex.org/W2901866350","https://openalex.org/W2902415114","https://openalex.org/W2918992226","https://openalex.org/W2962763344","https://openalex.org/W2963197901","https://openalex.org/W3011235318","https://openalex.org/W3093556640","https://openalex.org/W3105087971","https://openalex.org/W3128465814","https://openalex.org/W3128839796","https://openalex.org/W3136873430","https://openalex.org/W3163222347","https://openalex.org/W3189460592","https://openalex.org/W3190409295","https://openalex.org/W3212213895","https://openalex.org/W3217417806","https://openalex.org/W4213446860","https://openalex.org/W4225526013","https://openalex.org/W4226060502","https://openalex.org/W4285120399","https://openalex.org/W4288758078","https://openalex.org/W4290996068","https://openalex.org/W4295438412","https://openalex.org/W4322588479","https://openalex.org/W4360930732","https://openalex.org/W6617744952","https://openalex.org/W6681673350","https://openalex.org/W6738471490","https://openalex.org/W6739088070","https://openalex.org/W6748556508","https://openalex.org/W6750462152","https://openalex.org/W6775941530","https://openalex.org/W6784767544","https://openalex.org/W6790503462"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Semi-supervised":[0],"encrypted":[1],"traffic":[2],"anomaly":[3,76,145,152,192,196],"detection":[4,55,77,146,153,172,193,197],"models":[5],"in":[6,195],"zero-positive":[7],"scenarios":[8],"are":[9,30,165],"susceptible":[10],"to":[11,32,50,70,100,122,167,189],"human":[12],"labeling":[13],"errors":[14,164],"or":[15],"poisoning":[16,42,72,127,200],"attacks,":[17],"thereby":[18,108],"compromising":[19],"the":[20,25,34,45,91,97,102,110,124,133,157,169],"stability":[21],"and":[22,44,74,96,105,132,160],"reliability":[23],"of":[24,36,47,112,126,135,171],"model.":[26],"However,":[27],"existing":[28],"methods":[29,194],"insufficient":[31],"address":[33,168],"challenge":[35],"reduced":[37],"inter-class":[38,113,130],"distance":[39,131],"caused":[40],"by":[41],"attacks":[43,73,128],"inability":[46],"reconstruction":[48,136,163],"error":[49],"serve":[51],"as":[52],"a":[53,61,80,116],"reliable":[54],"criterion.":[56],"To":[57],"alleviate":[58],"these":[59],"challenges,":[60],"framework":[62],"called":[63],"Poison-Resistant":[64],"Anomaly":[65],"Detection":[66],"(PRAD)":[67],"is":[68,85,120],"proposed":[69],"mitigate":[71],"enhance":[75,101],"performance.":[78],"Specifically,":[79],"feature":[81,103,117],"encoding":[82],"module":[83,119],"autoencoder-based":[84],"first":[86],"designed":[87],"that":[88,155,181],"simultaneously":[89],"leverages":[90],"Amsgrad":[92],"gradient":[93],"descent":[94],"algorithm":[95,154],"warm-up":[98],"strategy":[99],"extraction":[104],"generalization":[106],"capabilities,":[107],"alleviating":[109],"reduction":[111],"distance.":[114],"Additionally,":[115],"analysis":[118],"introduced":[121],"measure":[123],"impact":[125],"on":[129,176],"distribution":[134],"errors,":[137],"which":[138],"provides":[139],"valuable":[140],"prior":[141],"information":[142],"for":[143],"subsequent":[144],"tasks.":[147],"Finally,":[148],"an":[149],"online":[150],"clustering-based":[151],"utilizes":[156],"extracted":[158],"features":[159],"their":[161],"corresponding":[162],"developed":[166],"issue":[170],"criteria.":[173],"Experimental":[174],"results":[175],"public":[177],"benchmark":[178],"datasets":[179],"demonstrate":[180],"PRAD":[182],"exhibits":[183],"significantly":[184],"superior":[185],"poison-resilient":[186],"capabilities":[187],"compared":[188],"other":[190],"semi-supervised":[191],"tasks":[198],"under":[199],"attacks.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
