{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:05:14Z","timestamp":1774940714548,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100017683","name":"Dalian Science and Technology Innovation Fund","doi-asserted-by":"publisher","award":["2024JB11GX001"],"award-info":[{"award-number":["2024JB11GX001"]}],"id":[{"id":"10.13039\/501100017683","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Liaoning Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2024-BS-015"],"award-info":[{"award-number":["2024-BS-015"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Liaoning Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2025-BS-0212"],"award-info":[{"award-number":["2025-BS-0212"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013804","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3132023523"],"award-info":[{"award-number":["3132023523"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112221","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T23:40:20Z","timestamp":1773531620000},"page":"112221","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Intrusion detection for low-altitude wireless networks: Diffusion-enhanced spatiotemporal graph network with dual self-attention"],"prefix":"10.1016","volume":"281","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6158-574X","authenticated-orcid":false,"given":"Runze","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3901-6790","authenticated-orcid":false,"given":"Zijian","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9601-5192","authenticated-orcid":false,"given":"Xianshi","family":"Su","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7740-1791","authenticated-orcid":false,"given":"Munan","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4037-3149","authenticated-orcid":false,"given":"Tony Q.S.","family":"Quek","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2026.112221_bib0001","doi-asserted-by":"crossref","DOI":"10.1109\/TCCN.2025.3601015","article-title":"Toward realization of low-Altitude economy networks: core architecture, integrated technologies, and future directions","author":"Wang","year":"2025","journal-title":"IEEE Trans. Cognit. Commun. Netw."},{"issue":"5","key":"10.1016\/j.comnet.2026.112221_bib0002","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/3530812","article-title":"Machine learning-Enabled IoT security: open issues and challenges under advanced persistent threats","volume":"55","author":"Chen","year":"2023","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.comnet.2026.112221_bib0003","first-page":"22","article-title":"Survey of intrusion detection systems: techniques, datasets and challenges","volume":"1","author":"Khraisat","year":"2018","journal-title":"Cybersecurity"},{"issue":"2","key":"10.1016\/j.comnet.2026.112221_bib0004","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2026.112221_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103821","article-title":"A survey on graph neural networks for intrusion detection systems: methods, trends and challenges","volume":"141","author":"Zhong","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0006","series-title":"Proceedings of the 5Th International Conference on Emerging Networking Experiments and Technologies","first-page":"241-252","article-title":"Exploiting dynamicity in graph-Based traffic analysis: techniques and applications","author":"Iliofotou","year":"2009"},{"key":"10.1016\/j.comnet.2026.112221_bib0007","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1109\/TIFS.2023.3331240","article-title":"TMG-GAN: Generative adversarial networks-Based imbalanced learning for network intrusion detection","volume":"19","author":"Ding","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.110030","article-title":"Anomal-E: a self-supervised network intrusion detection system based on graph neural networks","volume":"258","author":"Caville","year":"2022","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.comnet.2026.112221_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103285","article-title":"NE-GConv: A lightweight node edge graph convolutional network for intrusion detection","volume":"130","author":"Altaf","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0010","article-title":"Unified deep learning approach for efficient intrusion detection system using integrated spatial-temporal features","volume":"226","author":"Kanna","year":"2021","journal-title":"Knowl. Based Syst."},{"issue":"1","key":"10.1016\/j.comnet.2026.112221_bib0011","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/TDSC.2018.2884928","article-title":"Deep learning and visualization for identifying malware families","volume":"18","author":"Sun","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2026.112221_bib0012","doi-asserted-by":"crossref","first-page":"5668","DOI":"10.1109\/TIFS.2024.3402148","article-title":"Online self-Supervised deep learning for intrusion detection systems","volume":"19","author":"Nak\u0131p","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0013","doi-asserted-by":"crossref","first-page":"1720","DOI":"10.1109\/TIFS.2020.3042049","article-title":"Self-Configurable cyber-Physical intrusion detection for smart homes using reinforcement learning","volume":"16","author":"Heartfield","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103570","article-title":"MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network","volume":"139","author":"Sun","year":"2024","journal-title":"Comput. Secur."},{"issue":"15","key":"10.1016\/j.comnet.2026.112221_bib0015","doi-asserted-by":"crossref","first-page":"26146","DOI":"10.1109\/JIOT.2024.3393122","article-title":"CCID-CAN: Cross-Chain intrusion detection on CAN bus for autonomous vehicles","volume":"11","author":"Sun","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112221_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2022.101940","article-title":"Anomaly detection method for vehicular network based on collaborative deep support vector data description","volume":"56","author":"Mai","year":"2023","journal-title":"Phys. Commun."},{"issue":"12","key":"10.1016\/j.comnet.2026.112221_bib0017","doi-asserted-by":"crossref","first-page":"12012","DOI":"10.1109\/TKDE.2021.3118815","article-title":"A comprehensive survey on graph anomaly detection with deep learning","volume":"35","author":"Ma","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.comnet.2026.112221_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110495","article-title":"Applying self-supervised learning to network intrusion detection for network flows with graph neural network","volume":"248","author":"Xu","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2026.112221_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111606","article-title":"Enhancing intrusion detection performance using GCN-LOF: a hybrid graph-based anomaly detection approach","volume":"271","author":"Qin","year":"2025","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2026.112221_bib0020","series-title":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1-9","article-title":"E-GraphSAGE: A graph neural network based intrusion detection system for IoT","author":"Lo","year":"2022"},{"key":"10.1016\/j.comnet.2026.112221_bib0021","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1109\/TIFS.2022.3228493","article-title":"Application of a dynamic line graph neural network for intrusion detection with semisupervised learning","volume":"18","author":"Duan","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0022","doi-asserted-by":"crossref","first-page":"4851","DOI":"10.1109\/TIFS.2024.3385321","article-title":"Practical cyber attack detection with continuous temporal graph in dynamic network system","volume":"19","author":"Duan","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0023","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1109\/TIFS.2022.3191493","article-title":"Wrongdoing monitor: a graph-Based behavioral anomaly detection in cyber security","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111552","article-title":"Efficient intrusion detection via heterogeneous graph attention networks and parallel provenance analysis","volume":"270","author":"Wu","year":"2025","journal-title":"Comput. Netw."},{"issue":"11","key":"10.1016\/j.comnet.2026.112221_bib0025","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1145\/3732282","article-title":"Data augmentation on graphs: a technical survey","volume":"57","author":"Zhou","year":"2025","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"10.1016\/j.comnet.2026.112221_bib0026","doi-asserted-by":"crossref","first-page":"7555","DOI":"10.1109\/TCSS.2024.3403503","article-title":"Counterfactual data augmentation with denoising diffusion for graph anomaly detection","volume":"11","author":"Xiao","year":"2024","journal-title":"IEEE Trans. Comput. Social Syst."},{"key":"10.1016\/j.comnet.2026.112221_bib0027","series-title":"2022 IEEE International Conference on Data Mining (ICDM)","first-page":"259","article-title":"DAGAD: Data augmentation for graph anomaly detection","author":"Liu","year":"2022"},{"issue":"12","key":"10.1016\/j.comnet.2026.112221_bib0028","doi-asserted-by":"crossref","first-page":"12721","DOI":"10.1109\/TKDE.2023.3271771","article-title":"Improving generalizability of graph anomaly detection models via data augmentation","volume":"35","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.comnet.2026.112221_bib0029","doi-asserted-by":"crossref","DOI":"10.1016\/j.dcan.2025.05.013","article-title":"CGGM: A conditional graph generation model with adaptive sparsity for node anomaly detection in IoT networks","author":"Li","year":"2025","journal-title":"Digital Commun. Netw."},{"issue":"4","key":"10.1016\/j.comnet.2026.112221_bib0030","doi-asserted-by":"crossref","DOI":"10.1145\/3626235","article-title":"Diffusion models: a comprehensive survey of methods and applications","volume":"56","author":"Yang","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comnet.2026.112221_bib0031","unstructured":"K. Liu, H. Zhang, Z. Hu, F. Wang, P.S. Yu, Data Augmentation for Supervised Graph Outlier Detection via Latent Diffusion Models, 2024, arXiv: 2312.17679."},{"key":"10.1016\/j.comnet.2026.112221_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121533","article-title":"Controlled graph neural networks with denoising diffusion for anomaly detection","volume":"237","author":"Li","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.comnet.2026.112221_bib0033","series-title":"ICC 2024 - IEEE International Conference on Communications","first-page":"2047","article-title":"Local augmentation with functionality-Preservation for semi-Supervised graph intrusion detection","author":"He","year":"2024"},{"key":"10.1016\/j.comnet.2026.112221_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.130829","article-title":"Anomaly detection in attributed networks via local multi-order contrastive learning and global topology awareness","volume":"650","author":"Li","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.comnet.2026.112221_bib0035","series-title":"Proceedings of the 29Th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"1965-1977","article-title":"3D-IDS: Doubly disentangled dynamic intrusion detection","author":"Qiu","year":"2023"},{"key":"10.1016\/j.comnet.2026.112221_bib0036","series-title":"Proceedings of the 34Th International Conference on Neural Information Processing Systems","first-page":"574","article-title":"Denoising diffusion probabilistic models","author":"Ho","year":"2020"},{"key":"10.1016\/j.comnet.2026.112221_bib0037","series-title":"WSDM \u201920: Proceedings of the 13Th International Conference on Web Search and Data Mining","first-page":"519-527","article-title":"DySAT: deep neural representation learning on dynamic graphs via self-Attention networks","author":"Sankar","year":"2020"},{"key":"10.1016\/j.comnet.2026.112221_bib0038","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.future.2020.07.042","article-title":"Genetic convolutional neural network for intrusion detection systems","volume":"113","author":"Nguyen","year":"2020","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.comnet.2026.112221_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102632","article-title":"Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing","volume":"115","author":"Zola","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2026.112221_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110966","article-title":"TS-IDS: Traffic-aware self-supervised learning for IoT network intrusion detection","volume":"279","author":"Nguyen","year":"2023","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.comnet.2026.112221_bib0041","doi-asserted-by":"crossref","DOI":"10.1007\/s10922-025-09926-z","article-title":"DIFT: A diffusion-Transformer for intrusion detection of IoT with imbalanced learning","volume":"33","author":"Wang","year":"2025","journal-title":"J. Netw. Syst. Manag."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002331?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002331?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:33:35Z","timestamp":1774935215000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626002331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":41,"alternative-id":["S1389128626002331"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112221","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Intrusion detection for low-altitude wireless networks: Diffusion-enhanced spatiotemporal graph network with dual self-attention","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112221","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112221"}}