{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:24:15Z","timestamp":1770229455858,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819698714","type":"print"},{"value":"9789819698721","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9872-1_25","type":"book-chapter","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T14:34:47Z","timestamp":1753281287000},"page":"300-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection"],"prefix":"10.1007","author":[{"given":"Chunbo","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chunmiao","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Mengyao","family":"Han","sequence":"additional","affiliation":[]},{"given":"Xuying","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Wenli","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani, A., Myneni, S., Chowdhary, A., et al.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21(2), 1851\u20131877 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"25_CR2","unstructured":"Equifax Information Leakage (2017). https:\/\/en.wikipedia.org\/wiki\/Equifax"},{"key":"25_CR3","unstructured":"SolarWinds Hack (2020). https:\/\/en.wikipedia.org\/wiki\/SolarWinds"},{"issue":"6","key":"25_CR4","first-page":"2658","volume":"18","author":"Y Xie","year":"2019","unstructured":"Xie, Y., Wu, Y., Feng, D., et al.: P-Gaussian: provenance-based Gaussian distribution for detecting intrusion behavior variants using high efficient and real time memory databases. IEEE Trans. Dependable Secure Comput. 18(6), 2658\u20132674 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Milajerdi, S.M., Eshete, B., Gjomemo, R., et al.: Poirot: aligning attack behavior with kernel audit records for cyber threat hunting. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1795\u20131812 (2019)","DOI":"10.1145\/3319535.3363217"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"3972","DOI":"10.1109\/TIFS.2022.3208815","volume":"17","author":"S Wang","year":"2022","unstructured":"Wang, S., Wang, Z., Zhou, T., et al.: THREATRACE: detecting and tracing host-based threats in node level through provenance graph learning. IEEE Trans. Inf. Forensics Secur. 17, 3972\u20133987 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR7","unstructured":"Rehman, M.U., Ahmadi, H., Hassan, W.U.: FLASH: a comprehensive approach to intrusion detection via provenance graph representation learning. In: 2024 IEEE Symposium on Security and Privacy (SP), p. 139 (2024)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Luo, B., Zhang, Y., Li, Q., et al.: Detecting APT-exploited processes through semantic fusion and interaction prediction. Comput. Mater. Continua 78(2) (2024)","DOI":"10.32604\/cmc.2023.045739"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Lv, Q., Liang, J., et al.: KAIROS: practical intrusion detection and investigation using whole-system provenance. In: Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), pp. 3533\u20133551. IEEE (2024)","DOI":"10.1109\/SP54263.2024.00005"},{"key":"25_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104159","volume":"148","author":"J Ren","year":"2025","unstructured":"Ren, J., Geng, R.: Provenance-based APT campaigns detection via masked graph representation learning. Comput. Secur. 148, 104159 (2025)","journal-title":"Comput. Secur."},{"key":"25_CR11","unstructured":"Jia, Z., Xiong, Y., Nan, Y., et al.: MAGIC: detecting advanced persistent threats via masked graph representation learning. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 5197\u20135214 (2024)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Guo, H., Tang, R., Ye, Y., et al.: DeepFM: a factorization-machine based neural network for CTR prediction. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI 2017), pp. 1725\u20131731 (2017)","DOI":"10.24963\/ijcai.2017\/239"},{"key":"25_CR13","unstructured":"DARPA Transparent Computing Program Engagement 3 Data Release (2020). https:\/\/github.com\/darpa-i2o\/Transparent-Computing"},{"key":"25_CR14","unstructured":"Bates, A., Tian, D.J., Butler, K.R.B., et al.: Trustworthy whole-system provenance for the Linux kernel. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 319\u2013334 (2015)"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Hou, Z., Liu, X., Cen, Y., et al.: GraphMAE: self-supervised masked graph autoencoders. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 594\u2013604 (2022)","DOI":"10.1145\/3534678.3539321"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Jin, W., Ma, Y., Liu, X., et al.: Graph structure learning for robust graph neural networks. In: Proceedings of the 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 66\u201374 (2020)","DOI":"10.1145\/3394486.3403049"},{"key":"25_CR17","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., et al.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"15438","DOI":"10.1109\/ACCESS.2024.3357887","volume":"12","author":"M Kim","year":"2024","unstructured":"Kim, M., Choi, H.S., Kim, J.: Explicit feature interaction-aware graph neural network. IEEE Access 12, 15438\u201315446 (2024)","journal-title":"IEEE Access"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Hou, Z., Wang, J., Liu, X., et al.: GraphMAE2: a decoding-enhanced masked self-supervised graph learner. In: Proceedings of the ACM Web Conference 2023 (TheWebConf), pp. 737\u2013746 (2023)","DOI":"10.1145\/3543507.3583379"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Tan, Q., Liu, N., Huang, X., et al.: S2GAE: self-supervised graph autoencoders are generalizable learners with graph masking. In: Proceedings of the 16th ACM International Conference on Web Search and Data Mining (WSDM), pp. 787\u2013795 (2023)","DOI":"10.1145\/3539597.3570404"},{"key":"25_CR21","unstructured":"Bernhardsson, E.: Annoy: Approximate Nearest Neighbors in High Dimensional Spaces. Spotify (2013). https:\/\/spotify.github.io\/annoy\/"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Liu, F., Wen, Y., Zhang, D., et al.: Log2Vec: a heterogeneous graph embedding based approach for detecting cyber threats within enterprise. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1777\u20131794 (2019)","DOI":"10.1145\/3319535.3363224"},{"key":"25_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K.I., et al.: The pascal visual object classes (VOC) challenge. Int. J. Comput. Vis. 88, 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vis."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9872-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T06:22:58Z","timestamp":1770186178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9872-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698714","9789819698721"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9872-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}