{"id":"https://openalex.org/W7133344909","doi":"https://doi.org/10.1109/tnse.2026.3669948","title":"Evolving Intelligent Network Attack Classifier Under Label Distribution Shift","display_name":"Evolving Intelligent Network Attack Classifier Under Label Distribution Shift","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7133344909","doi":"https://doi.org/10.1109/tnse.2026.3669948"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2026.3669948","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3669948","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121186409","display_name":"Miru Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Miru Kim","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108693952","display_name":"Mugon Joe","orcid":"https://orcid.org/0009-0003-4111-491X"},"institutions":[{"id":"https://openalex.org/I141371507","display_name":"Soongsil University","ror":"https://ror.org/017xnm587","country_code":"KR","type":"education","lineage":["https://openalex.org/I141371507"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Mugon Joe","raw_affiliation_strings":["Department of Intelligent Semiconductors, Soongsil University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Intelligent Semiconductors, Soongsil University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I141371507"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102421354","display_name":"Minhae Kwon","orcid":null},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Minhae Kwon","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5121186409"],"corresponding_institution_ids":["https://openalex.org/I848706"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54959786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"7448","last_page":"7464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.2705000042915344,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.2705000042915344,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.05609999969601631,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.04179999977350235,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.616100013256073},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5231999754905701},{"id":"https://openalex.org/keywords/adaptive-system","display_name":"Adaptive system","score":0.3986999988555908},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3817000091075897},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.34860000014305115},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.34630000591278076},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.34540000557899475},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.30379998683929443}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.766700029373169},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.616100013256073},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5795000195503235},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5332000255584717},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5231999754905701},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4643999934196472},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.3986999988555908},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3817000091075897},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.34860000014305115},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34630000591278076},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.34540000557899475},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.30379998683929443},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.29269999265670776},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.28940001130104065},{"id":"https://openalex.org/C109747225","wikidata":"https://www.wikidata.org/wiki/Q815758","display_name":"Scarcity","level":2,"score":0.2752000093460083},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.26019999384880066}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2026.3669948","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3669948","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2296509296","https://openalex.org/W2342992012","https://openalex.org/W2800788706","https://openalex.org/W2899243711","https://openalex.org/W2899434936","https://openalex.org/W2919936975","https://openalex.org/W2963613787","https://openalex.org/W2999562137","https://openalex.org/W3015232403","https://openalex.org/W3035725276","https://openalex.org/W3042350893","https://openalex.org/W3109847748","https://openalex.org/W3137050615","https://openalex.org/W3163231210","https://openalex.org/W4205946715","https://openalex.org/W4210693780","https://openalex.org/W4221144447","https://openalex.org/W4224331011","https://openalex.org/W4225131702","https://openalex.org/W4226248369","https://openalex.org/W4281398200","https://openalex.org/W4290994499","https://openalex.org/W4293811873","https://openalex.org/W4295789122","https://openalex.org/W4297883168","https://openalex.org/W4312823356","https://openalex.org/W4376481220","https://openalex.org/W4376958494","https://openalex.org/W4385695950","https://openalex.org/W4385885002","https://openalex.org/W4387848639","https://openalex.org/W4388212456","https://openalex.org/W4390591018","https://openalex.org/W4391850289","https://openalex.org/W4394625553","https://openalex.org/W4401508754","https://openalex.org/W4402626740","https://openalex.org/W4402716345","https://openalex.org/W4402716390","https://openalex.org/W4403220169","https://openalex.org/W4405270678","https://openalex.org/W4408222463","https://openalex.org/W4409325994","https://openalex.org/W4409356405","https://openalex.org/W4413785338","https://openalex.org/W4414991739","https://openalex.org/W4416018038","https://openalex.org/W7084096617","https://openalex.org/W7118715632","https://openalex.org/W7133202575"],"related_works":[],"abstract_inverted_index":{"The":[0],"next-generation":[1],"internet":[2],"is":[3,132,180],"being":[4],"reshaped":[5],"by":[6,58],"the":[7,22,59,65,95,102,143,156,159,205],"growing":[8],"intelligence":[9,14],"and":[10,47,64,67,90,97,118,165,220],"connectivity":[11],"of":[12,15,24,61,70,113,126,145,177],"artificial":[13],"things":[16],"(AIoT)":[17],"devices.":[18],"This":[19,105],"evolution":[20],"emphasizes":[21],"importance":[23],"AI-enabled":[25],"network":[26,33],"intrusion":[27],"detection":[28],"systems":[29,42],"(NIDS)":[30],"in":[31,39,75,101,218,231],"intelligent":[32],"environments.":[34],"Two":[35],"major":[36],"technical":[37],"challenges":[38],"developing":[40],"such":[41],"are":[43],"addressing":[44],"class":[45,137],"imbalance":[46],"adapting":[48],"to":[49,134,168,210],"label":[50,197],"distribution":[51,69],"shifts":[52],"after":[53],"deployment.":[54],"Class":[55],"imbalance,":[56,138],"caused":[57],"dominance":[60],"normal":[62],"traffic":[63],"scarcity":[66],"uneven":[68],"attack":[71,80,86],"types,":[72],"often":[73],"results":[74],"low":[76],"performance":[77],"for":[78,136,172],"minority":[79],"type":[81],"classes.":[82],"In":[83,123,155],"addition,":[84],"evolving":[85],"patterns":[87],"necessitate":[88],"efficient":[89],"continuous":[91],"model":[92,163],"post-training,":[93],"despite":[94],"limited":[96],"unlabeled":[98],"data":[99],"available":[100],"post-deployment":[103],"phase.":[104],"study":[106],"proposes":[107],"a":[108,114,182,228],"unified":[109],"training":[110],"framework":[111,160],"consisting":[112],"two-step":[115],"pre-training":[116],"scheme":[117],"an":[119,211],"adaptive":[120],"post-training":[121,157,232],"scheme.":[122],"Step":[124,140],"I":[125],"pre-training,":[127],"balanced":[128],"contrastive":[129],"pair":[130],"selection":[131],"performed":[133],"account":[135],"while":[139],"II":[141],"refines":[142],"representations":[144,167],"hard-to-distinguish":[146],"samples":[147],"located":[148],"near":[149],"decision":[150],"boundaries":[151],"using":[152],"latent":[153,166,184],"features.":[154],"phase,":[158],"leverages":[161],"both":[162],"outputs":[164],"generate":[169],"reliable":[170,188],"pseudo-labels":[171],"learning.":[173],"A":[174],"key":[175],"insight":[176],"this":[178],"work":[179],"that":[181,204],"well-structured":[183],"representation":[185],"space":[186],"enables":[187],"pseudo-labeling":[189],"during":[190],"post-training.":[191],"Extensive":[192],"simulations":[193],"across":[194],"eight":[195,223],"online":[196],"shift":[198],"scenarios":[199],"with":[200,227],"three":[201],"datasets":[202],"demonstrate":[203],"proposed":[206],"method":[207],"achieves":[208],"up":[209],"<inline-formula":[212],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[213],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[214],"notation=\"LaTeX\">$\\bf":[215],"{8.6}\\%$</tex-math></inline-formula>":[216],"improvement":[217],"accuracy":[219],"F1-score":[221],"over":[222],"state-of-the-art":[224],"approaches,":[225],"along":[226],"significant":[229],"reduction":[230],"complexity.":[233]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-04T00:00:00"}
