{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T13:38:42Z","timestamp":1775741922229,"version":"3.50.1"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112226","type":"journal-article","created":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T15:52:07Z","timestamp":1774194727000},"page":"112226","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Enhancing network intrusion detection with adaptive spatial convolution and salient contrastive learning"],"prefix":"10.1016","volume":"281","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3679-3332","authenticated-orcid":false,"given":"Jian","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2017-4599","authenticated-orcid":false,"given":"Xinling","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1987-9516","authenticated-orcid":false,"given":"Yun","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8298-3294","authenticated-orcid":false,"given":"Cunrui","family":"Ying","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0220-7053","authenticated-orcid":false,"given":"Yun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8929-9733","authenticated-orcid":false,"given":"Neng","family":"Han","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"03","key":"10.1016\/j.comnet.2026.112226_bib0001","doi-asserted-by":"crossref","first-page":"1542","DOI":"10.30574\/wjarr.2025.25.3.0909","article-title":"The role of cybersecurity in safeguarding finance in a digital era","volume":"25","author":"Adejumo","year":"2025","journal-title":"World J. Adv. Res. Rev."},{"issue":"1","key":"10.1016\/j.comnet.2026.112226_bib0002","doi-asserted-by":"crossref","first-page":"30","DOI":"10.3390\/fi17010030","article-title":"A survey on cybersecurity in IoT","volume":"17","author":"Dritsas","year":"2025","journal-title":"Future Internet"},{"key":"10.1016\/j.comnet.2026.112226_bib0003","article-title":"Addressing cybersecurity challenges in robotics: a comprehensive overview","volume":"3","author":"Tanimu","year":"2025","journal-title":"Cyber Secur. Appl."},{"issue":"2","key":"10.1016\/j.comnet.2026.112226_bib0004","doi-asserted-by":"crossref","DOI":"10.3390\/computers14020049","article-title":"Analysing cyber attacks and cyber security vulnerabilities in the university sector","volume":"14","author":"Lallie","year":"2025","journal-title":"Computers"},{"key":"10.1016\/j.comnet.2026.112226_bib0005","doi-asserted-by":"crossref","first-page":"2157","DOI":"10.1109\/TIFS.2025.3537827","article-title":"Vulseye: detect smart contract vulnerabilities via stateful directed graybox fuzzing","volume":"20","author":"Liang","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112226_bib0006","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1109\/TDSC.2024.3429271","article-title":"WAFBooster: automatic boosting of WAF security against mutated malicious payloads","volume":"22","author":"Wu","year":"2025","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2026.112226_bib0007","series-title":"AI for Large Scale Communication Networks","first-page":"107","article-title":"Comparative analysis of traditional vs. AI-driven network security","author":"Choudhury","year":"2025"},{"issue":"3","key":"10.1016\/j.comnet.2026.112226_bib0008","doi-asserted-by":"crossref","DOI":"10.3390\/computers14030087","article-title":"Overview on intrusion detection systems for computers networking security","volume":"14","author":"Diana","year":"2025","journal-title":"Computers"},{"key":"10.1016\/j.comnet.2026.112226_bib0009","series-title":"Journal of Physics: Conference Series","first-page":"012042","article-title":"Intrusion detection system techniques: a review","volume":"1874","author":"Sulaiman","year":"2021"},{"key":"10.1016\/j.comnet.2026.112226_bib0010","doi-asserted-by":"crossref","first-page":"3204","DOI":"10.1109\/TIFS.2025.3551643","article-title":"A-NIDS: Adaptive network intrusion detection system based on clustering and stacked CTGAN","volume":"20","author":"Zha","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112226_bib0011","doi-asserted-by":"crossref","first-page":"11792","DOI":"10.1109\/ACCESS.2025.3526711","article-title":"Deep learning-based intrusion detection system for detecting IoT botnet attacks: a review","volume":"13","author":"Al-Shurbaji","year":"2025","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.comnet.2026.112226_bib0012","doi-asserted-by":"crossref","first-page":"2717","DOI":"10.1007\/s11831-023-10059-2","article-title":"A systematic literature review on swarm intelligence based intrusion detection system: past, present and future","volume":"31","author":"Reddy","year":"2024","journal-title":"Arch. Comput. Methods Eng."},{"issue":"1","key":"10.1016\/j.comnet.2026.112226_bib0013","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3687124","article-title":"Survey on federated learning for intrusion detection system: concept, architectures, aggregation strategies, challenges, and future directions","volume":"57","author":"Khraisat","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comnet.2026.112226_bib0014","doi-asserted-by":"crossref","first-page":"6685","DOI":"10.1109\/TIFS.2024.3413592","article-title":"Rethinking membership inference attacks against transfer learning","volume":"19","author":"Wu","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112226_bib0015","doi-asserted-by":"crossref","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","article-title":"CNN-LSTM: Hybrid deep neural network for network intrusion detection system","volume":"10","author":"Halbouni","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112226_bib0016","series-title":"2020 Eighth International Conference on Advanced Cloud and Big Data (CBD)","first-page":"243","article-title":"A novel network intrusion detection system based on CNN","author":"Chen","year":"2020"},{"issue":"16","key":"10.1016\/j.comnet.2026.112226_bib0017","doi-asserted-by":"crossref","DOI":"10.3390\/app12168162","article-title":"A survey of CNN-based network intrusion detection","volume":"12","author":"Mohammadpour","year":"2022","journal-title":"Appl. Sci."},{"key":"10.1016\/j.comnet.2026.112226_bib0018","doi-asserted-by":"crossref","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","article-title":"RTIDS: a robust transformer-based approach for intrusion detection system","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112226_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.rineng.2025.104826","article-title":"DeepTransIDS: transformer-based deep learning model for detecting DDoS attacks on 5G NIDD","volume":"26","author":"Harshdeep","year":"2025","journal-title":"Results in Engineering"},{"key":"10.1016\/j.comnet.2026.112226_bib0020","first-page":"12","article-title":"GMCWAE: a representation learning technique for network intrusion detection in IoT","author":"Bian","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112226_bib0021","series-title":"2024 25Th International Symposium on Quality Electronic Design (ISQED)","first-page":"1","article-title":"Always be pre-training: representation learning for network intrusion detection with GNNs","author":"Gu","year":"2024"},{"key":"10.1016\/j.comnet.2026.112226_bib0022","doi-asserted-by":"crossref","first-page":"16912","DOI":"10.1109\/JIOT.2025.3533092","article-title":"A novel lightweight IoT intrusion detection model based on self-knowledge distillation","volume":"12","author":"Wang","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112226_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2025.104300","article-title":"MTRC: A self-supervised network intrusion detection framework based on multiple transformers enabled data reconstruction with contrastive learning","author":"Wang","year":"2025","journal-title":"J. Netw. Computer Appl."},{"key":"10.1016\/j.comnet.2026.112226_bib0024","doi-asserted-by":"crossref","first-page":"4215","DOI":"10.1109\/TDSC.2025.3544106","article-title":"Feco: boosting intrusion detection capability in iot networks via contrastive learning","volume":"22","author":"Wang","year":"2025","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2026.112226_bib0025","series-title":"Lisa","first-page":"229","article-title":"Snort: lightweight intrusion detection for networks","volume":"99","author":"Roesch","year":"1999"},{"key":"10.1016\/j.comnet.2026.112226_bib0026","unstructured":"R. Chalapathy, S. Chawla, Deep learning for anomaly detection: A survey, (2019) arXiv: 1901.03407."},{"issue":"03","key":"10.1016\/j.comnet.2026.112226_bib0027","doi-asserted-by":"crossref","DOI":"10.1142\/S0218126624500488","article-title":"NIDS-FLGDP: network intrusion detection algorithm based on Gaussian differential privacy federated learning","volume":"33","author":"Du","year":"2024","journal-title":"J. Circ. Syst. Computers"},{"key":"10.1016\/j.comnet.2026.112226_bib0028","unstructured":"S. Cammarasana, G. Patan\u00e8, Optimal Weighted Convolution for Classification and Denosing, (2025) arXiv: 2505.24558."},{"key":"10.1016\/j.comnet.2026.112226_bib0029","unstructured":"A. Khan, L. Asmatullah, A. Malik, S. Khan, H. Asif, A Survey on Self-supervised Contrastive Learning for Multimodal Text-Image Analysis, (2025) arXiv: 2503.11101."},{"issue":"1","key":"10.1016\/j.comnet.2026.112226_bib0030","doi-asserted-by":"crossref","DOI":"10.1007\/s10994-024-06674-0","article-title":"A survey on self-supervised learning for non-sequential tabular data","volume":"114","author":"Wang","year":"2025","journal-title":"Mach. Learn."},{"issue":"4","key":"10.1016\/j.comnet.2026.112226_bib0031","doi-asserted-by":"crossref","first-page":"4232","DOI":"10.1109\/TNSM.2022.3218843","article-title":"Contrastive learning enhanced intrusion detection","volume":"19","author":"Yue","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.comnet.2026.112226_bib0032","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1109\/TIFS.2025.3530702","article-title":"TCG\u2212IDS : robust network intrusion detection via temporal contrastive graph learning","volume":"20","author":"Wu","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112226_bib0033","unstructured":"X. Guo, Y. Wang, T. Du, Y. Wang, Contranorm: A contrastive learning perspective on oversmoothing and beyond, (2023) arXiv: 2303.06562."},{"issue":"9","key":"10.1016\/j.comnet.2026.112226_bib0034","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","article-title":"Spatial pyramid pooling in deep convolutional networks for visual recognition","volume":"37","author":"He","year":"2015","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.comnet.2026.112226_bib0035","unstructured":"M. Lin, Q. Chen, S. Yan, Network in network, (2013) arXiv: 1312.4400."},{"issue":"2018","key":"10.1016\/j.comnet.2026.112226_bib0036","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"ICISSp"},{"key":"10.1016\/j.comnet.2026.112226_bib0037","series-title":"2015 Military Communications and Information Systems Conference (MilCIS)","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"},{"key":"10.1016\/j.comnet.2026.112226_bib0038","series-title":"2021 International Conference on Computer Communication and Informatics (ICCCI)","first-page":"1","article-title":"Intrusion detection system using MLP and chaotic neural networks","author":"Shettar","year":"2021"},{"key":"10.1016\/j.comnet.2026.112226_bib0039","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.comnet.2026.112226_bib0040","first-page":"18932","article-title":"Revisiting deep learning models for tabular data","volume":"34","author":"Gorishniy","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.comnet.2026.112226_bib0041","unstructured":"I. Loshchilov, F. Hutter, Decoupled weight decay regularization, (2017) arXiv: 1711.05101."},{"key":"10.1016\/j.comnet.2026.112226_bib0042","unstructured":"P. Goyal, P. Doll\u00e1r, R. Girshick, P. Noordhuis, L. Wesolowski, A. Kyrola, A. Tulloch, Y. Jia, K. He, Accurate, large minibatch sgd: Training imagenet in 1 hour, (2017) 6000\u20136010. arXiv: 1706.02677."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002380?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002380?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:36:49Z","timestamp":1775738209000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626002380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":42,"alternative-id":["S1389128626002380"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112226","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing network intrusion detection with adaptive spatial convolution and salient contrastive learning","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112226","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112226"}}