{"id":"https://openalex.org/W4390970347","doi":"https://doi.org/10.1109/tnsm.2024.3355698","title":"User Behavior Threat Detection Based on Adaptive Sliding Window GAN","display_name":"User Behavior Threat Detection Based on Adaptive Sliding Window GAN","publication_year":2024,"publication_date":"2024-01-18","ids":{"openalex":"https://openalex.org/W4390970347","doi":"https://doi.org/10.1109/tnsm.2024.3355698"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2024.3355698","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3355698","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084780155","display_name":"Xiaoling Tao","orcid":"https://orcid.org/0000-0002-6573-2291"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoling Tao","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101864404","display_name":"Shen Lu","orcid":"https://orcid.org/0000-0001-7233-1552"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shen Lu","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102740754","display_name":"Feng Zhao","orcid":"https://orcid.org/0000-0002-5730-2208"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Zhao","raw_affiliation_strings":["School of Information and Communication, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045514825","display_name":"Rushi Lan","orcid":"https://orcid.org/0000-0002-9488-8236"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rushi Lan","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046322385","display_name":"Longsheng Chen","orcid":"https://orcid.org/0000-0002-4206-9861"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longsheng Chen","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088558094","display_name":"Lianyou Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lianyou Fu","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006425337","display_name":"Ruchun Jia","orcid":"https://orcid.org/0000-0003-2316-932X"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruchun Jia","raw_affiliation_strings":["School of Computing, Sichuan University (Wangjiang Campus), Chengdu, China","School of Computing, Wangjiang Campus of Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computing, Sichuan University (Wangjiang Campus), Chengdu, China","institution_ids":["https://openalex.org/I24185976","https://openalex.org/I4210125143"]},{"raw_affiliation_string":"School of Computing, Wangjiang Campus of Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5084780155"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":4.3959,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94619119,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"21","issue":"2","first_page":"2493","last_page":"2503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8304662108421326},{"id":"https://openalex.org/keywords/sliding-window-protocol","display_name":"Sliding window protocol","score":0.69707852602005},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.521141767501831},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.4830899238586426},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4358084201812744},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.4355226159095764},{"id":"https://openalex.org/keywords/variance","display_name":"Variance (accounting)","score":0.4151371121406555},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4121049642562866},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40563955903053284},{"id":"https://openalex.org/keywords/window","display_name":"Window (computing)","score":0.3580051362514496},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35078269243240356},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3374177813529968},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32132357358932495},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15208348631858826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8304662108421326},{"id":"https://openalex.org/C102392041","wikidata":"https://www.wikidata.org/wiki/Q592860","display_name":"Sliding window protocol","level":3,"score":0.69707852602005},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.521141767501831},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.4830899238586426},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4358084201812744},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.4355226159095764},{"id":"https://openalex.org/C196083921","wikidata":"https://www.wikidata.org/wiki/Q7915758","display_name":"Variance (accounting)","level":2,"score":0.4151371121406555},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4121049642562866},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40563955903053284},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.3580051362514496},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35078269243240356},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3374177813529968},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32132357358932495},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15208348631858826},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2024.3355698","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3355698","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3790707578","display_name":null,"funder_award_id":"61962015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1458873377","https://openalex.org/W1518484620","https://openalex.org/W1966347356","https://openalex.org/W1966809779","https://openalex.org/W1973704753","https://openalex.org/W1995976200","https://openalex.org/W1998332705","https://openalex.org/W2005221715","https://openalex.org/W2025519999","https://openalex.org/W2077847043","https://openalex.org/W2113997717","https://openalex.org/W2142638723","https://openalex.org/W2176490120","https://openalex.org/W2332951940","https://openalex.org/W2342408547","https://openalex.org/W2402548350","https://openalex.org/W2493819142","https://openalex.org/W2538737552","https://openalex.org/W2599354622","https://openalex.org/W2603951493","https://openalex.org/W2752620559","https://openalex.org/W2753797983","https://openalex.org/W2784369383","https://openalex.org/W2790227466","https://openalex.org/W2794465672","https://openalex.org/W2795060553","https://openalex.org/W2808709910","https://openalex.org/W2884984219","https://openalex.org/W2887799638","https://openalex.org/W2888160480","https://openalex.org/W2898625021","https://openalex.org/W2909135150","https://openalex.org/W2911200746","https://openalex.org/W2914623161","https://openalex.org/W2949320318","https://openalex.org/W2959392253","https://openalex.org/W2964493783","https://openalex.org/W2985983260","https://openalex.org/W3000429356","https://openalex.org/W3009500417","https://openalex.org/W3011124515","https://openalex.org/W3013148769","https://openalex.org/W3044818515","https://openalex.org/W3114329625","https://openalex.org/W3133055724","https://openalex.org/W3153493802","https://openalex.org/W3180055034","https://openalex.org/W3212667006","https://openalex.org/W4281292970","https://openalex.org/W4283711508","https://openalex.org/W4285356110","https://openalex.org/W6745040976","https://openalex.org/W6747885888","https://openalex.org/W6763672751","https://openalex.org/W6791222398"],"related_works":["https://openalex.org/W2390901981","https://openalex.org/W2109115373","https://openalex.org/W2353818951","https://openalex.org/W1605879311","https://openalex.org/W2611980620","https://openalex.org/W4230691760","https://openalex.org/W2385763735","https://openalex.org/W4391923333","https://openalex.org/W2386394344","https://openalex.org/W3014558862"],"abstract_inverted_index":{"User":[0],"behavior":[1,30,56,67,90],"threat":[2,68,99,139],"detection":[3,46,69,112],"is":[4],"important":[5],"for":[6],"the":[7,94,103,119],"protection":[8],"of":[9],"network":[10,34],"system":[11],"security.":[12],"Traditional":[13],"supervised":[14],"modeling":[15],"methods":[16,47],"and":[17,40,44,92,127,134],"unbalanced":[18],"sample":[19],"data":[20,91],"lead":[21],"to":[22,42,88,97,109],"a":[23,58,65,123,128],"high":[24],"false":[25,131],"positive":[26,132],"rate":[27,126],"in":[28],"user":[29,35,55,66,138],"detection.":[31],"In":[32,60],"addition,":[33],"behaviors":[36],"are":[37,48],"complex,":[38],"changeable,":[39],"difficult":[41],"predict,":[43],"existing":[45],"facing":[49],"ever":[50],"greater":[51],"challenges.":[52],"Effectively":[53],"detecting":[54],"remains":[57],"challenge.":[59],"this":[61],"paper,":[62],"we":[63],"propose":[64],"method":[70,81,121],"based":[71],"on":[72],"an":[73,83],"Adaptive":[74],"Sliding":[75],"Window":[76],"Generative":[77],"Adversarial":[78],"Network(ASW-GAN).":[79],"This":[80],"designs":[82],"adaptive":[84],"sliding":[85],"window":[86],"mechanism":[87],"process":[89],"uses":[93,102],"GAN":[95],"model":[96],"detect":[98],"behavior,":[100],"finally":[101],"maximum":[104],"interclass":[105],"variance":[106],"algorithm":[107],"Otsu":[108],"optimize":[110],"test":[111],"result.":[113],"Compared":[114],"with":[115],"other":[116],"typical":[117],"methods,":[118],"proposed":[120],"achieves":[122],"higher":[124],"accuracy":[125],"markedly":[129],"lower":[130],"rate,":[133],"can":[135],"effectively":[136],"evaluate":[137],"behaviors.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
