{"id":"https://openalex.org/W7126389196","doi":"https://doi.org/10.1186/s13677-026-00847-z","title":"Self-supervised graph neural networks for network intrusion detection in cloud-edge collaboration environments","display_name":"Self-supervised graph neural networks for network intrusion detection in cloud-edge collaboration environments","publication_year":2026,"publication_date":"2026-01-31","ids":{"openalex":"https://openalex.org/W7126389196","doi":"https://doi.org/10.1186/s13677-026-00847-z"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-026-00847-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00847-z","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1186/s13677-026-00847-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124573075","display_name":"Haiyang Diao","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyang Diao","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124636872","display_name":"Xiang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124543178","display_name":"Wan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wan Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124673573","display_name":"Yan Sibyl Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yan Sibyl Yu","raw_affiliation_strings":["Business School, Macquarie University, Wallumattagal Campus, Macquarie Park, NSW, 2109, Australia"],"affiliations":[{"raw_affiliation_string":"Business School, Macquarie University, Wallumattagal Campus, Macquarie Park, NSW, 2109, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124559961","display_name":"Ye Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124671070","display_name":"Jing Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100356","display_name":"Ministry of Education","ror":"https://ror.org/018f7hf93","country_code":"CL","type":"government","lineage":["https://openalex.org/I4210100356"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CL","CN"],"is_corresponding":true,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["Ministry of Education, Engineering Research Center of Blockchain Application, Supervision and Management (Southeast University), No. 2 SEU Road, Nanjing, 211189, China","School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Blockchain Application, Supervision and Management (Southeast University), No. 2 SEU Road, Nanjing, 211189, China","institution_ids":["https://openalex.org/I4210100356"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, No. 2 SEU Road, Nanjing, 211189, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5124671070"],"corresponding_institution_ids":["https://openalex.org/I4210100356","https://openalex.org/I76569877"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30292379,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5957000255584717,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5957000255584717,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.14890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.09459999948740005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6621000170707703},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.592199981212616},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.548799991607666},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5133000016212463},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5091000199317932},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.40310001373291016},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.38440001010894775},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.3767000138759613}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7893999814987183},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6621000170707703},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.592199981212616},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.548799991607666},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5133000016212463},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5091000199317932},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49070000648498535},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.40310001373291016},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.38440001010894775},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3767000138759613},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3682999908924103},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3644999861717224},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.35580000281333923},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.3384999930858612},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.336899995803833},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3276999890804291},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3124000132083893},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3091999888420105},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3084000051021576},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3025999963283539},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.2728999853134155},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.26980000734329224},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.26260000467300415}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-026-00847-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00847-z","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b86c24c9178f4dd08ebe9bbc0f7998bd","is_oa":true,"landing_page_url":"https://doaj.org/article/b86c24c9178f4dd08ebe9bbc0f7998bd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-026-00847-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00847-z","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W12154863","https://openalex.org/W1501856433","https://openalex.org/W1988741337","https://openalex.org/W2027842533","https://openalex.org/W2119895316","https://openalex.org/W2530869753","https://openalex.org/W2739883206","https://openalex.org/W2795230915","https://openalex.org/W2807841289","https://openalex.org/W2888981281","https://openalex.org/W2897929085","https://openalex.org/W2900510321","https://openalex.org/W2906159207","https://openalex.org/W2907492528","https://openalex.org/W2981025625","https://openalex.org/W2982561893","https://openalex.org/W3012615229","https://openalex.org/W3036195893","https://openalex.org/W3102359135","https://openalex.org/W3120195926","https://openalex.org/W3127161477","https://openalex.org/W3152893301","https://openalex.org/W3191490876","https://openalex.org/W3206325220","https://openalex.org/W3208773001","https://openalex.org/W3211805421","https://openalex.org/W3217748719","https://openalex.org/W4205519045","https://openalex.org/W4285272834","https://openalex.org/W4307042912","https://openalex.org/W4312544884","https://openalex.org/W4319066192","https://openalex.org/W4362703719","https://openalex.org/W4362705493","https://openalex.org/W4386280890","https://openalex.org/W4386422321","https://openalex.org/W4386565855","https://openalex.org/W4391707528","https://openalex.org/W4396792110","https://openalex.org/W4400526084","https://openalex.org/W4401227907","https://openalex.org/W4401979950","https://openalex.org/W4402797215","https://openalex.org/W4403294788","https://openalex.org/W4406890294","https://openalex.org/W4413000711","https://openalex.org/W4413325576","https://openalex.org/W6963873055"],"related_works":[],"abstract_inverted_index":{"Cloud\u2013edge":[0],"collaboration":[1],"enables":[2],"intelligent":[3],"services":[4],"by":[5,48],"combining":[6],"powerful":[7],"cloud":[8],"computation":[9],"with":[10,157],"latency-sensitive":[11],"edge":[12,75],"analytics,":[13],"but":[14],"it":[15],"also":[16],"widens":[17],"the":[18],"attack":[19],"surface":[20],"as":[21],"distributed":[22,67],"nodes":[23,136],"exchange":[24],"model":[25],"updates":[26],"and":[27,34,51,64,74,84,113,116,137],"traffic":[28,82],"over":[29],"heterogeneous":[30],"networks,":[31],"heightening":[32],"privacy":[33,65],"security":[35],"risks.":[36],"Graph":[37,95],"neural":[38],"networks":[39],"(GNNs)":[40],"are":[41],"promising":[42],"for":[43,100],"network":[44],"intrusion":[45],"detection":[46],"(NID)":[47],"capturing":[49],"topological":[50],"feature":[52],"dependencies,":[53],"yet":[54],"most":[55],"approaches":[56],"rely":[57],"on":[58],"supervised,":[59],"centralized":[60],"training,":[61],"limiting":[62,85],"scalability":[63],"in":[66],"settings.":[68],"Additionally,":[69],"these":[70,89],"methods":[71],"aggregate":[72],"node":[73],"features":[76],"uniformly,":[77],"overlooking":[78],"differences":[79],"among":[80],"malicious":[81],"types":[83],"detection.":[86],"To":[87],"address":[88],"challenges,":[90],"this":[91],"paper":[92],"proposes":[93],"Self-Supervised":[94],"Multi-Head":[96],"Attention":[97],"Networks":[98],"(SSGMHAN)":[99],"NID.":[101],"The":[102],"proposed":[103],"method":[104],"employs":[105],"structure-aware":[106],"graph":[107],"contrastive":[108],"learning":[109],"to":[110,125],"form":[111],"positive":[112],"negative":[114],"pairs":[115],"learn":[117],"from":[118],"large-scale":[119],"unlabeled":[120],"traffic,":[121],"yielding":[122],"representations":[123],"robust":[124],"structural":[126],"perturbations.":[127],"A":[128],"multi-head":[129],"node\u2013edge":[130],"attention":[131],"module":[132],"dynamically":[133],"emphasizes":[134],"attack-specific":[135],"edges,":[138],"producing":[139],"more":[140],"expressive":[141],"embeddings.":[142],"On":[143],"three":[144],"benchmarks,":[145],"SSGMHAN":[146],"surpasses":[147],"state-of-the-art":[148],"unsupervised":[149],"NID":[150],"methods,":[151],"offering":[152],"an":[153],"effective":[154],"self-supervised":[155],"framework":[156],"attention-based":[158],"aggregation.":[159]},"counts_by_year":[],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2026-02-02T00:00:00"}
