{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:14Z","timestamp":1756271414889,"version":"3.44.0"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012338","name":"Alan Turing Institute","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11129983","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"166-173","source":"Crossref","is-referenced-by-count":0,"title":["Abstract Attack Intention Inference Using Low-Rank Gated Arithmetic Interactive Attention"],"prefix":"10.1109","author":[{"given":"Wanrong","family":"Yang","sequence":"first","affiliation":[{"name":"University of Liverpool,Department of Computer Sciences,Liverpool,UK"}]},{"given":"Manhui","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Liverpool,IT Services,Liverpool,UK"}]},{"given":"Dominik","family":"Wojtczak","sequence":"additional","affiliation":[{"name":"University of Liverpool,Department of Computer Sciences,Liverpool,UK"}]}],"member":"263","reference":[{"issue":"7","key":"ref1","doi-asserted-by":"crossref","DOI":"10.3390\/fi15070243","article-title":"Machine learning for network intrusion detection\u2014a comparative study","volume":"15","author":"Al Lail","year":"2023","journal-title":"Future Internet"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.cose.2022.102861"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.3390\/fi15070243"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICREST.2019.8644161"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TETCI.2017.2772792"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.jisa.2022.103405"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.18280\/ria.340410"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.eswa.2021.115524"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.32628\/cseit228329"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.33166\/AETiC.2021.05.025"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.procs.2024.03.285"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.32604\/cmc.2023.043752"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/312129.312212"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/CISDA.2009.5356528"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MilCIS.2015.7348942"},{"year":"2017","journal-title":"Datasets\u2014 research\u2014 canadian institute for cybersecurity\u2014 unb","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.5220\/0006639801080116"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CCST.2019.8888419"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.physa.2023.129313"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CyberSecPODS.2019.8885333"},{"key":"ref21","article-title":"Training-free generalization on heterogeneous tabular data via meta-representation","author":"Ye","year":"2023","journal-title":"arXiv preprint arXiv:2311.00055"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CSCE60160.2023.00247"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TNNLS.2022.3229161"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.asoc.2023.110748"},{"key":"ref25","article-title":"When do neural nets outperform boosted trees on tabular data?","volume":"36","author":"McElfresh","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref26","article-title":"A closer look at deep learning on tabular data","author":"Ye","year":"2024","journal-title":"arXiv preprint arXiv:2407.00956"},{"key":"ref27","article-title":"Better by default: Strong pre-tuned mlps and boosted trees on tabular data","author":"Holzm\u00fcller","year":"2024","journal-title":"arXiv preprint arXiv:2407.04491"},{"key":"ref28","first-page":"507","article-title":"Why do tree-based models still outperform deep learning on typical tabular data?","volume":"35","author":"Grinsztajn","year":"2022","journal-title":"Advances in neural information processing systems"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.14428\/esann\/2023.ES2023-156"},{"key":"ref30","first-page":"41 956","article-title":"A performance-driven benchmark for feature selection in tabular deep learning","volume":"36","author":"Cherepanova","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref31","article-title":"Transfer learning with deep tabular models","author":"Levin","year":"2022","journal-title":"arXiv preprint arXiv:2206.15306"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-031-62162-8_1"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.cosrev.2024.100631"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/ACCESS.2024.3369906"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.future.2019.05.041"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.scs.2021.102994"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.32604\/cmes.2024.052112"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.3390\/info14100550"},{"key":"ref39","article-title":"Iot security: botnet detection in iot using machine learning","author":"Pokhrel","year":"2021","journal-title":"arXiv preprint arXiv:2104.02231"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/CogMI52975.2021.00031"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/JIOT.2020.3002255"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.future.2020.02.017"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/NCA.2019.8935007"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/MPRV.2018.03367731"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/ACCESS.2019.2959047"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.3390\/s23135941"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ICCCN.2013.6614127"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1145\/997150.997156"},{"issue":"5","key":"ref50","first-page":"390","article-title":"A survey on various cyber attacks and their classification","volume":"15","author":"Uma","year":"2013","journal-title":"Int. J. Netw. Secur"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1145\/948109.948144"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1007\/978-3-642-17342-4_5"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/SAHCN.2007.4292831"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.5555\/3241189.3241275"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.48550\/ARXIV.1706.03762"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1145\/3292500.3330701"},{"key":"ref57","article-title":"Saint: Improved neural networks for tabular data via row attention and contrastive pre-training","author":"Somepalli","year":"2021","journal-title":"arXiv preprint arXiv:2106.01342"},{"key":"ref58","article-title":"Tabtransformer: Tabular data modeling using contextual embeddings","author":"Huang","year":"2020","journal-title":"arXiv preprint arXiv:2012.06678"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1145\/3357384.3357925"},{"key":"ref60","first-page":"18 932","article-title":"Revisiting deep learning models for tabular data","volume":"34","author":"Gorishniy","year":"2021","journal-title":"Advances in neural information processing systems"},{"key":"ref61","article-title":"Transformers with stochastic competition for tabular data modelling","author":"Voskou","year":"2024","journal-title":"arXiv preprint arXiv:2407.13238"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11129983.pdf?arnumber=11129983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:55:02Z","timestamp":1756270502000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11129983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11129983","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}