{"id":"https://openalex.org/W7127104295","doi":"https://doi.org/10.1109/trustcom66490.2025.00108","title":"Prototype-Integrated Representation Learning for Novelty Detection","display_name":"Prototype-Integrated Representation Learning for Novelty Detection","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7127104295","doi":"https://doi.org/10.1109/trustcom66490.2025.00108"},"language":null,"primary_location":{"id":"doi:10.1109/trustcom66490.2025.00108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102764461","display_name":"Saranya Vijayakumar","orcid":"https://orcid.org/0009-0005-9377-2548"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saranya Vijayakumar","raw_affiliation_strings":["Carnegie Mellon University,Computer Science,Pittsburgh,USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University,Computer Science,Pittsburgh,USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035605036","display_name":"Christos Faloutsos","orcid":"https://orcid.org/0000-0003-2996-9790"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christos Faloutsos","raw_affiliation_strings":["Carnegie Mellon University,Computer Science,Pittsburgh,USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University,Computer Science,Pittsburgh,USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090310268","display_name":"Jason Hong","orcid":"https://orcid.org/0000-0002-9856-9654"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matt Fredrikson","raw_affiliation_strings":["Carnegie Mellon University,Computer Science,Pittsburgh,USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University,Computer Science,Pittsburgh,USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102764461"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7302184,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"934","last_page":"941"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7163000106811523,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.7163000106811523,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.14219999313354492,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.023399999365210533,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7530999779701233},{"id":"https://openalex.org/keywords/novelty-detection","display_name":"Novelty detection","score":0.6607999801635742},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.5516999959945679},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5439000129699707},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.42570000886917114},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3961000144481659},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3887999951839447},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.33500000834465027}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7954000234603882},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7530999779701233},{"id":"https://openalex.org/C2778924833","wikidata":"https://www.wikidata.org/wiki/Q7064603","display_name":"Novelty detection","level":3,"score":0.6607999801635742},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6097999811172485},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.5516999959945679},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5439000129699707},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5393000245094299},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.42570000886917114},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3961000144481659},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3887999951839447},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.33500000834465027},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.3239000141620636},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.3165000081062317},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.3093000054359436},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.3077999949455261},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.30379998683929443},{"id":"https://openalex.org/C4641261","wikidata":"https://www.wikidata.org/wiki/Q11681085","display_name":"Face detection","level":4,"score":0.2946000099182129},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.25859999656677246}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom66490.2025.00108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5817944407463074,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1553801604","https://openalex.org/W2010065958","https://openalex.org/W2795033129","https://openalex.org/W2895752198","https://openalex.org/W2901114541","https://openalex.org/W2904509905","https://openalex.org/W2963744743","https://openalex.org/W2969751262","https://openalex.org/W2969904462","https://openalex.org/W2973628901","https://openalex.org/W3113047382","https://openalex.org/W3193105927","https://openalex.org/W3196688193","https://openalex.org/W3206784242","https://openalex.org/W3212677680","https://openalex.org/W4221082121","https://openalex.org/W4303857474","https://openalex.org/W4312942615","https://openalex.org/W4320058142"],"related_works":[],"abstract_inverted_index":{"Cybersecurity":[0],"analysts":[1,263],"face":[2],"an":[3],"escalating":[4],"threat":[5,85,131],"landscape":[6],"where":[7],"zero-day":[8,84,234],"malware":[9,33,80,102,124,179,207],"families":[10,40,103],"emerge":[11],"daily,":[12],"requiring":[13,170],"automated":[14],"detection":[15,34,49,82,106,163,198,231,250],"systems":[16,35,251],"that":[17,55,69,127,143,165,186,239],"can":[18],"identify":[19],"previously":[20],"unseen":[21],"threats":[22,109,271],"while":[23,151,228],"maintaining":[24,152,229],"low":[25],"false":[26,59,226],"positive":[27],"rates":[28,232],"in":[29,272],"operational":[30,91,188],"environments.":[31,275],"Existing":[32],"excel":[36],"at":[37],"classifying":[38],"known":[39,101],"but":[41],"struggle":[42],"with":[43,257,264],"novel":[44,108,156,221],"variants,":[45],"often":[46],"treating":[47],"novelty":[48,162],"as":[50],"a":[51,66,111,137,160,265],"separate":[52],"post-processing":[53],"step":[54],"leads":[56],"to":[57,129,253],"excessive":[58],"alarms":[60,227],"and":[61,83,104,158,217],"missed":[62],"threats.We":[63],"present":[64],"CentroidEmbed,":[65],"unified":[67],"framework":[68],"integrates":[70],"prototype":[71,241],"learning":[72,242],"directly":[73],"within":[74,110,243],"graph":[75],"neural":[76,244],"networks":[77],"for":[78,96,148,220,233,268],"robust":[79],"family":[81,125,150,222],"identification.":[86],"Our":[87],"approach":[88,213],"addresses":[89],"critical":[90],"challenges":[92],"by":[93],"jointly":[94],"optimizing":[95],"both":[97],"accurate":[98],"classification":[99,255],"of":[100,107,173],"reliable":[105],"single":[112],"model":[113],"architecture.":[114],"The":[115],"system":[116],"introduces":[117],"three":[118],"key":[119],"security-focused":[120,197],"innovations:":[121],"(1)":[122],"learnable":[123],"centroids":[126],"adapt":[128],"evolving":[130],"patterns":[132],"through":[133],"gradient-based":[134],"refinement,":[135],"(2)":[136],"specialized":[138],"cosine-based":[139],"triplet":[140],"center":[141],"loss":[142],"creates":[144,246],"distinct":[145],"behavioral":[146],"signatures":[147],"each":[149],"separation":[153],"from":[154],"potential":[155],"threats,":[157],"(3)":[159],"parallel":[161],"component":[164],"identifies":[166],"suspicious":[167],"samples":[168,208],"without":[169],"prior":[171],"knowledge":[172],"specific":[174],"attack":[175],"vectors.Evaluated":[176],"on":[177],"real-world":[178],"datasets":[180],"using":[181],"temporally":[182],"realistic":[183],"chronological":[184],"splits":[185],"simulate":[187],"deployment":[189],"scenarios,":[190],"CentroidEmbed":[191],"demonstrates":[192],"substantial":[193],"improvements":[194],"over":[195,205],"existing":[196],"methods.":[199],"On":[200],"the":[201],"BODMAS":[202],"corpus":[203],"containing":[204],"57,000":[206],"across":[209],"500+":[210],"families,":[211],"our":[212],"achieves":[214],"77.2%":[215],"precision":[216],"55.6%":[218],"recall":[219],"detection,":[223,260],"significantly":[224],"reducing":[225],"high":[230],"threats.":[235],"These":[236],"results":[237],"demonstrate":[238],"integrating":[240],"architectures":[245],"more":[247],"operationally":[248],"viable":[249],"compared":[252],"conventional":[254],"approaches":[256],"post-hoc":[258],"anomaly":[259],"providing":[261],"security":[262],"practical":[266],"tool":[267],"identifying":[269],"emerging":[270],"dynamic":[273],"cyber":[274]},"counts_by_year":[],"updated_date":"2026-02-06T02:01:19.302388","created_date":"2026-02-03T00:00:00"}
