{"id":"https://openalex.org/W4402828051","doi":"https://doi.org/10.32604/cmc.2024.054558","title":"PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data","display_name":"PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4402828051","doi":"https://doi.org/10.32604/cmc.2024.054558"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2024.054558","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.054558","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-1/TSP_CMC_54558/TSP_CMC_54558.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-1/TSP_CMC_54558/TSP_CMC_54558.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020478652","display_name":"Gang Long","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gang Long","raw_affiliation_strings":["Faculty of Computing , Harbin Institute of Technology , Harbin , 150000 , China"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing , Harbin Institute of Technology , Harbin , 150000 , China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087988450","display_name":"Zhaoxin Zhang","orcid":"https://orcid.org/0000-0002-9209-1717"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoxin Zhang","raw_affiliation_strings":["Faculty of Computing , Harbin Institute of Technology , Harbin , 150000 , China"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing , Harbin Institute of Technology , Harbin , 150000 , China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020478652"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.7272,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73081488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"81","issue":"1","first_page":"327","last_page":"343"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12535","display_name":"Machine Learning and Data Classification","score":0.9444000124931335,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8503197431564331},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.6897827386856079},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4945025146007538},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4894191324710846},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4354189932346344},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.352629691362381},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.11009827256202698}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8503197431564331},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.6897827386856079},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4945025146007538},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4894191324710846},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4354189932346344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.352629691362381},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.11009827256202698},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2024.054558","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.054558","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-1/TSP_CMC_54558/TSP_CMC_54558.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2024.054558","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.054558","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-1/TSP_CMC_54558/TSP_CMC_54558.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402828051.pdf","grobid_xml":"https://content.openalex.org/works/W4402828051.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1995443851","https://openalex.org/W2077488147","https://openalex.org/W2793988933","https://openalex.org/W2808472075","https://openalex.org/W2901866350","https://openalex.org/W2907760128","https://openalex.org/W3009006131","https://openalex.org/W3095840026","https://openalex.org/W3105087971","https://openalex.org/W3153226991","https://openalex.org/W3159333674","https://openalex.org/W3213920537","https://openalex.org/W4225526013","https://openalex.org/W4226039588","https://openalex.org/W4226060502","https://openalex.org/W4292264335","https://openalex.org/W4302275147","https://openalex.org/W4327750468","https://openalex.org/W4380854647","https://openalex.org/W4381748186","https://openalex.org/W4387757641","https://openalex.org/W4388019116","https://openalex.org/W4389665308","https://openalex.org/W4399268507","https://openalex.org/W4399360342","https://openalex.org/W6617744952","https://openalex.org/W6638545294","https://openalex.org/W6640963894","https://openalex.org/W6748171980","https://openalex.org/W6750729320","https://openalex.org/W6758344442","https://openalex.org/W6779174293","https://openalex.org/W6783155939","https://openalex.org/W6784767544","https://openalex.org/W6838484501","https://openalex.org/W6847544921","https://openalex.org/W6847573028","https://openalex.org/W6850515824","https://openalex.org/W6855873624","https://openalex.org/W6862876385","https://openalex.org/W6866789927","https://openalex.org/W6869680079"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2033914206"],"abstract_inverted_index":{"Network":[0],"anomaly":[1,15],"detection":[2,16],"plays":[3],"a":[4],"vital":[5],"role":[6],"in":[7],"safeguarding":[8],"network":[9,14],"security.":[10],"However,":[11],"the":[12,22,38],"existing":[13],"task":[17],"is":[18,28],"typically":[19],"based":[20],"on":[21,42],"one-class":[23],"zero-positive":[24],"scenario.":[25],"This":[26],"approach":[27],"susceptible":[29],"to":[30],"o...":[31],"|":[32],"Find,":[33],"read":[34],"and":[35],"cite":[36],"all":[37],"research":[39],"you":[40],"need":[41],"Tech":[43],"Science":[44],"Press":[45]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2025-10-10T00:00:00"}
