{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T01:15:50Z","timestamp":1771550150734,"version":"3.50.1"},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s11704-025-50797-z","type":"journal-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:31:54Z","timestamp":1771547514000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SecGuard: multi-dimensional provenance analysis for self-supervised APT detection"],"prefix":"10.1007","volume":"20","author":[{"given":"Chen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yunchun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mingyuan","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,20]]},"reference":[{"key":"50797_CR1","volume-title":"Proceedings of the 27th Annual Network and Distributed System Security Symposium","author":"X Han","year":"2020","unstructured":"Han X, Pasquier T F J M, Bates A, Mickens J, Seltzer M I. Unicorn: runtime provenance-based detector for advanced persistent threats. In: Proceedings of the 27th Annual Network and Distributed System Security Symposium. 2020"},{"key":"50797_CR2","doi-asserted-by":"publisher","first-page":"3972","DOI":"10.1109\/TIFS.2022.3208815","volume":"17","author":"S Wang","year":"2022","unstructured":"Wang S, Wang Z, Zhou T, Sun H, Yin X, Han D, Zhang H, Shi X, Yang J. THREATRACE: detecting and tracing host-based threats in node level through provenance graph learning. IEEE Transactions on Information Forensics and Security, 2022, 17: 3972\u20133987","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"50797_CR3","first-page":"291","volume-title":"Proceedings of the 33rd USENIX Conference on Security Symposium","author":"Z Jia","year":"2024","unstructured":"Jia Z, Xiong Y, Nan Y, Zhang Y, Zhao J, Wen M. MAGIC: detecting advanced persistent threats via masked graph representation learning. In: Proceedings of the 33rd USENIX Conference on Security Symposium. 2024, 291"},{"key":"50797_CR4","doi-asserted-by":"publisher","first-page":"3552","DOI":"10.1109\/SP54263.2024.00139","volume-title":"Proceedings of 2024 IEEE Symposium on Security and Privacy (SP)","author":"M U Rehman","year":"2024","unstructured":"Rehman M U, Ahmadi H, Hassan W U. Flash: a comprehensive approach to intrusion detection via provenance graph representation learning. In: Proceedings of 2024 IEEE Symposium on Security and Privacy (SP). 2024, 3552\u20133570"},{"key":"50797_CR5","first-page":"68","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","author":"K Mukherjee","year":"2023","unstructured":"Mukherjee K, Wiedemeier J, Wang T, Wei J, Chen F, Kim M, Kantarcioglu M, Jee K. Evading provenance-based ML detectors with adversarial system actions. In: Proceedings of the 32nd USENIX Conference on Security Symposium. 2023, 68"},{"key":"50797_CR6","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1145\/2939672.2939783","volume-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"E Manzoor","year":"2016","unstructured":"Manzoor E, Milajerdi S M, Akoglu L. Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2016, 1035\u20131044"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-025-50797-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-025-50797-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-025-50797-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:31:55Z","timestamp":1771547515000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-025-50797-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,20]]},"references-count":6,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["50797"],"URL":"https:\/\/doi.org\/10.1007\/s11704-025-50797-z","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,20]]},"assertion":[{"value":"9 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests or financial conflicts to disclose.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2012816"}}