{"id":"https://openalex.org/W7119534288","doi":"https://doi.org/10.1186/s42400-025-00487-x","title":"XGA-E: an explainability-enhanced graph neural network for network traffic anomaly detection","display_name":"XGA-E: an explainability-enhanced graph neural network for network traffic anomaly detection","publication_year":2026,"publication_date":"2026-01-09","ids":{"openalex":"https://openalex.org/W7119534288","doi":"https://doi.org/10.1186/s42400-025-00487-x"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00487-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00487-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00487-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00487-x.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122388559","display_name":"Min Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I165745306","display_name":"Southwest Petroleum University","ror":"https://ror.org/03h17x602","country_code":"CN","type":"education","lineage":["https://openalex.org/I165745306"]},{"id":"https://openalex.org/I2802584641","display_name":"Leshan Normal University","ror":"https://ror.org/036cvz290","country_code":"CN","type":"education","lineage":["https://openalex.org/I2802584641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yang","raw_affiliation_strings":["School of Computer Science and Software Engineering, Southwest Petroleum University, Chengdu, 610500, Sichuan, China","School of Electronic Information and Artificial Intelligence, Leshan Normal University, Leshan, 614000, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Software Engineering, Southwest Petroleum University, Chengdu, 610500, Sichuan, China","institution_ids":["https://openalex.org/I165745306"]},{"raw_affiliation_string":"School of Electronic Information and Artificial Intelligence, Leshan Normal University, Leshan, 614000, Sichuan, China","institution_ids":["https://openalex.org/I2802584641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027614413","display_name":"Caiming Liu","orcid":"https://orcid.org/0000-0002-1355-2619"},"institutions":[{"id":"https://openalex.org/I165745306","display_name":"Southwest Petroleum University","ror":"https://ror.org/03h17x602","country_code":"CN","type":"education","lineage":["https://openalex.org/I165745306"]},{"id":"https://openalex.org/I2802584641","display_name":"Leshan Normal University","ror":"https://ror.org/036cvz290","country_code":"CN","type":"education","lineage":["https://openalex.org/I2802584641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Caiming Liu","raw_affiliation_strings":["Intelligent Network Security Detection and Evaluation Laboratory, Leshan Normal University, Leshan, 614000, Sichuan, China","School of Computer Science and Software Engineering, Southwest Petroleum University, Chengdu, 610500, Sichuan, China","School of Electronic Information and Artificial Intelligence, Leshan Normal University, Leshan, 614000, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Intelligent Network Security Detection and Evaluation Laboratory, Leshan Normal University, Leshan, 614000, Sichuan, China","institution_ids":["https://openalex.org/I2802584641"]},{"raw_affiliation_string":"School of Computer Science and Software Engineering, Southwest Petroleum University, Chengdu, 610500, Sichuan, China","institution_ids":["https://openalex.org/I165745306"]},{"raw_affiliation_string":"School of Electronic Information and Artificial Intelligence, Leshan Normal University, Leshan, 614000, Sichuan, China","institution_ids":["https://openalex.org/I2802584641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027614413"],"corresponding_institution_ids":["https://openalex.org/I165745306","https://openalex.org/I2802584641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08399412,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.20489999651908875,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.20489999651908875,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.1615999937057495,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.14149999618530273,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7815999984741211},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.6625000238418579},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5537999868392944},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4763999879360199},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.47099998593330383},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.36169999837875366},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.29280000925064087}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7815999984741211},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7239000201225281},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6625000238418579},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5537999868392944},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5411999821662903},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4948999881744385},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4763999879360199},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.47099998593330383},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.36169999837875366},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.359499990940094},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.29280000925064087},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.2879999876022339},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C5038329","wikidata":"https://www.wikidata.org/wiki/Q1142907","display_name":"Core network","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00487-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00487-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00487-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1bc1b3d80695490bba3a74a64db6bea2","is_oa":true,"landing_page_url":"https://doaj.org/article/1bc1b3d80695490bba3a74a64db6bea2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-17 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00487-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00487-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00487-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7353555560112,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7119534288.pdf","grobid_xml":"https://content.openalex.org/works/W7119534288.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W2765793020","https://openalex.org/W2907492528","https://openalex.org/W2962858109","https://openalex.org/W2963224980","https://openalex.org/W2990352665","https://openalex.org/W3000120900","https://openalex.org/W3036195893","https://openalex.org/W3038428620","https://openalex.org/W3089329725","https://openalex.org/W3122721099","https://openalex.org/W3140854437","https://openalex.org/W3152893301","https://openalex.org/W3161851957","https://openalex.org/W3208773001","https://openalex.org/W4223565507","https://openalex.org/W4285157251","https://openalex.org/W4307042912","https://openalex.org/W4313116287","https://openalex.org/W4313216104","https://openalex.org/W4313254192","https://openalex.org/W4313591247","https://openalex.org/W4324029729","https://openalex.org/W4366978252","https://openalex.org/W4367309662","https://openalex.org/W4367400392","https://openalex.org/W4378587122","https://openalex.org/W4386107654","https://openalex.org/W4386645116","https://openalex.org/W4387937774","https://openalex.org/W4388867311","https://openalex.org/W4390885796","https://openalex.org/W4396937673","https://openalex.org/W4400277664","https://openalex.org/W4402158010","https://openalex.org/W4406248372","https://openalex.org/W4412176033","https://openalex.org/W4413886826"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Graph":[1],"neural":[2,49],"network":[3,10,42,74,136],"(GNN)":[4],"have":[5],"demonstrated":[6],"excellent":[7],"performance":[8,25,111,134],"in":[9,128,135],"traffic":[11,43,75,85,137],"anomaly":[12,44,59,92,138],"detection":[13,24,45,60],"research.":[14],"However,":[15],"existing":[16,125],"GNN-based":[17],"approaches":[18],"often":[19],"lack":[20],"interpretability,":[21],"and":[22,56,69,90,108,131],"their":[23],"remains":[26],"to":[27,150],"be":[28],"improved.":[29],"To":[30,87],"address":[31],"these":[32],"challenges,":[33],"we":[34,94],"propose":[35],"XGA-E,":[36],"an":[37,101],"interpretability-enhanced":[38],"GNN":[39],"model":[40,97],"for":[41,72],"that":[46,122,147],"leverages":[47],"graph":[48],"networks,":[50],"explainable":[51],"artificial":[52],"intelligence":[53],"(XAI)":[54],"techniques,":[55],"gradient":[57],"boosting-based":[58],"classifiers.":[61],"We":[62,105],"developed":[63],"the":[64,129,141,151],"core":[65],"architecture":[66],"of":[67],"XGA-E":[68,107,123,142],"established":[70],"protocols":[71],"preprocessing":[73],"data,":[76],"based":[77],"on":[78,115],"which":[79],"graph-structured":[80],"representations":[81],"were":[82],"constructed":[83],"from":[84],"features.":[86],"enable":[88],"effective":[89],"interpretable":[91],"detection,":[93],"further":[95],"designed":[96],"training":[98],"procedures":[99],"alongside":[100],"interpretative":[102],"analysis":[103],"framework.":[104],"implemented":[106],"evaluated":[109],"its":[110],"through":[112],"simulation":[113],"experiments":[114],"a":[116],"public":[117],"dataset.":[118],"The":[119],"results":[120],"demonstrate":[121],"outperforms":[124],"models":[126],"reported":[127],"literature":[130],"exhibits":[132],"strong":[133],"detection.":[139],"Moreover,":[140],"interpreter":[143],"successfully":[144],"identifies":[145],"edges":[146],"are":[148],"critical":[149],"model\u2019s":[152],"decision-making":[153],"process.":[154]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-01-09T00:00:00"}
