{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:09:48Z","timestamp":1772042988571,"version":"3.50.1"},"reference-count":38,"publisher":"Informa UK Limited","issue":"1","funder":[{"DOI":"10.13039\/501100013096","name":"State Grid Science and Technology Project","doi-asserted-by":"crossref","award":["No.5108-202224046A-1-1-ZN"],"award-info":[{"award-number":["No.5108-202224046A-1-1-ZN"]}],"id":[{"id":"10.13039\/501100013096","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2025,1,2]]},"DOI":"10.1080\/08874417.2023.2267510","type":"journal-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T20:12:55Z","timestamp":1697659975000},"page":"108-118","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":11,"title":["Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection"],"prefix":"10.1080","volume":"65","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6331-9383","authenticated-orcid":false,"given":"Peng","family":"Gao","sequence":"first","affiliation":[{"name":"NARI Group Corporation\/State Grid Electric Power Research Institute, Nanjing, China"},{"name":"Nanjing NARI Information &amp; Communication Technology co. ltd, Nanjing, China"}]},{"given":"Haotian","family":"Zhang","sequence":"additional","affiliation":[{"name":"NARI Group Corporation\/State Grid Electric Power Research Institute, Nanjing, China"},{"name":"Nanjing NARI Information &amp; Communication Technology co. ltd, Nanjing, China"}]},{"given":"Ming","family":"Wang","sequence":"additional","affiliation":[{"name":"State Grid Corporation of China, Beijing, China"}]},{"given":"Weiyong","family":"Yang","sequence":"additional","affiliation":[{"name":"NARI Group Corporation\/State Grid Electric Power Research Institute, Nanjing, China"},{"name":"Nanjing NARI Information &amp; Communication Technology co. ltd, Nanjing, China"}]},{"given":"Xinshen","family":"Wei","sequence":"additional","affiliation":[{"name":"NARI Group Corporation\/State Grid Electric Power Research Institute, Nanjing, China"},{"name":"Nanjing NARI Information &amp; Communication Technology co. ltd, Nanjing, China"}]},{"given":"Zhuo","family":"Lv","sequence":"additional","affiliation":[{"name":"State Grid Henan Electric Power Research Institute, Zhengzhou, China"}]},{"given":"Zengzhou","family":"Ma","sequence":"additional","affiliation":[{"name":"NARI Group Corporation\/State Grid Electric Power Research Institute, Nanjing, China"},{"name":"Nanjing NARI Information &amp; Communication Technology co. ltd, Nanjing, China"}]}],"member":"301","published-online":{"date-parts":[[2023,10,18]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"Lee C Iesiev A Usher M Harz D McMillen D. IBM X-force threat intelligence index. 2020."},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3133614"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213306"},{"key":"e_1_3_2_6_1","unstructured":"Hamilton WL Ying R Leskovec J. Representation learning on graphs: methods and applications. arXiv Preprint arXiv: 170905584. 2017."},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-00129-1_40"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7502294"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001486"},{"key":"e_1_3_2_10_1","unstructured":"Cai TT Frankle J Schwab DJ Morcos AS. Are all negatives created equal in contrastive instance discrimination? arXiv preprint arXiv:201006682. 2020."},{"key":"e_1_3_2_11_1","first-page":"5812","article-title":"Graph contrastive learning with augmentations","volume":"33","author":"You Y","year":"2020","unstructured":"You Y, Chen T, Sui Y, Chen T, Wang Z, Shen Y. Graph contrastive learning with augmentations. Adv Neural Inf Process Syst. 2020;33:5812\u201323.","journal-title":"Adv Neural Inf Process Syst"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17293"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449802"},{"key":"e_1_3_2_14_1","first-page":"4","article-title":"Deep graph infomax","volume":"2","author":"Velickovic P","year":"2019","unstructured":"Velickovic P, Fedus W, Hamilton WL, Li\u00f2 P, Bengio Y, Hjelm RD. Deep graph infomax. ICLR (Poster). 2019;2:4.","journal-title":"ICLR (Poster)"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330961"},{"key":"e_1_3_2_17_1","unstructured":"Rossi E Chamberlain BP Frasca F Eynard D Monti F Bronstein MM . Temporal graph networks for deep learning on dynamic graphs. ArXiv. 2020. abs\/2006.10637."},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103434"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109289"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22124621"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01332-y"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102177"},{"key":"e_1_3_2_23_1","unstructured":"Zhang L Jiang S-P Shen X Gupta BB Tian Z . PWG-IDS: an intrusion detection model for solving class imbalance in IIoT networks using generative adversarial networks. ArXiv. 2021. abs\/2110.03445."},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11192"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102899"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-022-00747-z"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991876"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3116085"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980136"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249084"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7126913"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120839"},{"key":"e_1_3_2_33_1","volume-title":"Insider threat test dataset","author":"Lindauer B","year":"2020","unstructured":"Lindauer B. Insider threat test dataset. Pittsburgh (PA): Carnegie Mellon University; 2020."},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1285"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243811"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.31"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995964"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939783"},{"key":"e_1_3_2_39_1","unstructured":"Kingma DP Ba J. Adam: a method for stochastic optimization. San Diego (CA): CoRR. 2014;abs\/1412.6980."}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2023.2267510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T18:47:43Z","timestamp":1736534863000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2023.2267510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,18]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,2]]}},"alternative-id":["10.1080\/08874417.2023.2267510"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2023.2267510","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}