{"id":"https://openalex.org/W4409356405","doi":"https://doi.org/10.1109/tnse.2025.3560027","title":"TEAM: Temporal Adversarial Examples Attack Model Against Network Intrusion Detection System Applied to RNN","display_name":"TEAM: Temporal Adversarial Examples Attack Model Against Network Intrusion Detection System Applied to RNN","publication_year":2025,"publication_date":"2025-04-11","ids":{"openalex":"https://openalex.org/W4409356405","doi":"https://doi.org/10.1109/tnse.2025.3560027"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3560027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3560027","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052678886","display_name":"Ziyi Liu","orcid":"https://orcid.org/0000-0002-6796-650X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ziyi Liu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050526815","display_name":"Dengpan Ye","orcid":"https://orcid.org/0000-0003-2510-9523"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengpan Ye","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101423908","display_name":"Long Tang","orcid":"https://orcid.org/0000-0002-9345-0312"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Long Tang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102790106","display_name":"Yunming Zhang","orcid":"https://orcid.org/0000-0003-3087-5580"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunming Zhang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020820156","display_name":"Jiacheng Deng","orcid":"https://orcid.org/0000-0003-0452-4031"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiacheng Deng","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117109311","display_name":"Wanrong Kuang","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanrong Kuang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5052678886"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":7.4438,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.96862172,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":"4","first_page":"3400","last_page":"3415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9524999856948853,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8792253732681274},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6718789935112},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5669761896133423},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5311236381530762},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39291995763778687},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3572933077812195},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.19650378823280334}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8792253732681274},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6718789935112},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5669761896133423},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5311236381530762},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39291995763778687},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3572933077812195},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.19650378823280334}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3560027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3560027","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5626719751","display_name":null,"funder_award_id":"62472325","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W2064675550","https://openalex.org/W2099940443","https://openalex.org/W2110485445","https://openalex.org/W2136922672","https://openalex.org/W2789828921","https://openalex.org/W2794034234","https://openalex.org/W2874136421","https://openalex.org/W2889836475","https://openalex.org/W2908403421","https://openalex.org/W2919115771","https://openalex.org/W2923778952","https://openalex.org/W2950635152","https://openalex.org/W2963857521","https://openalex.org/W2972302902","https://openalex.org/W3006503311","https://openalex.org/W3016852133","https://openalex.org/W3020434223","https://openalex.org/W3034234149","https://openalex.org/W3086419524","https://openalex.org/W3111088413","https://openalex.org/W3114263020","https://openalex.org/W3130982961","https://openalex.org/W3134622107","https://openalex.org/W3154803439","https://openalex.org/W3179018710","https://openalex.org/W3197150995","https://openalex.org/W3198511875","https://openalex.org/W4220744793","https://openalex.org/W4226197247","https://openalex.org/W4290714064","https://openalex.org/W4293846201","https://openalex.org/W4312204616","https://openalex.org/W4313591247","https://openalex.org/W4317382644","https://openalex.org/W4319998055","https://openalex.org/W4323545679","https://openalex.org/W4361010174","https://openalex.org/W4364361361","https://openalex.org/W4391097056","https://openalex.org/W4392405181","https://openalex.org/W4396982193","https://openalex.org/W4401508167","https://openalex.org/W4401567590","https://openalex.org/W4401990456","https://openalex.org/W4404622795","https://openalex.org/W4406371502","https://openalex.org/W6771954343","https://openalex.org/W6810434748"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"With":[0],"the":[1,19,31,48,53,68,114,126,131,154,162,176,188,196,200,204],"development":[2],"of":[3,33,42,70,156,179,203],"artificial":[4],"intelligence,":[5],"neural":[6,22,58],"networks":[7,23,59],"play":[8],"a":[9,79],"key":[10],"role":[11],"in":[12,72,122,170,199],"network":[13],"intrusion":[14],"detection":[15],"systems":[16],"(NIDS).":[17],"Despite":[18],"tremendous":[20],"advantages,":[21],"are":[24],"susceptible":[25],"to":[26,108,151],"adversarial":[27,54,82,93,118,128,159],"attacks.":[28],"To":[29],"improve":[30],"reliability":[32],"NIDS,":[34],"many":[35],"research":[36],"has":[37],"been":[38,45],"conducted":[39],"and":[40,112,119,184],"plenty":[41],"solutions":[43,50],"have":[44],"proposed.":[46],"However,":[47],"existing":[49],"rarely":[51],"consider":[52],"attacks":[55,138],"against":[56],"recurrent":[57],"(RNN)":[60],"with":[61],"time":[62,109,120,133,164],"steps,":[63],"which":[64,106],"would":[65],"greatly":[66],"affect":[67],"application":[69],"NIDS":[71,180,205],"real":[73],"world.":[74],"Therefore,":[75],"we":[76],"first":[77],"propose":[78],"novel":[80],"RNN":[81],"attack":[83,172],"model":[84],"based":[85],"on":[86,139,181],"feature":[87],"reconstruction":[88],"called":[89],"<bold":[90,94,97,100,103],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[91,95,98,101,104],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">T</b>emporal":[92],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">E</b>xamples":[96],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">A</b>ttack":[99],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">M</b>odel":[102],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(TEAM)</b>,":[105],"applied":[107],"series":[110],"data":[111],"reveals":[113],"potential":[115],"connection":[116],"between":[117],"steps":[121,134],"RNN.":[123],"That":[124],"is,":[125],"past":[127],"examples":[129,160,209],"within":[130,161],"same":[132,163],"can":[135],"trigger":[136],"further":[137],"current":[140],"or":[141],"future":[142],"original":[143,208],"examples.":[144],"Moreover,":[145],"TEAM":[146,174],"leverages":[147],"Time":[148],"Dilation":[149],"(TD)":[150],"effectively":[152],"mitigates":[153],"effect":[155],"temporal":[157],"among":[158],"steps.":[165],"Experimental":[166],"results":[167],"show":[168],"that":[169],"most":[171],"categories,":[173],"improves":[175],"misjudgment":[177,189,201],"rate":[178,190,202],"both":[182],"black":[183],"white":[185],"boxes,":[186],"making":[187],"reach":[191],"more":[192],"than":[193],"97.65%.":[194],"Meanwhile,":[195],"maximum":[197],"increase":[198],"for":[206],"subsequent":[207],"exceeds":[210],"95.57%.":[211]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
