{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:42:27Z","timestamp":1740102147431,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T00:00:00Z","timestamp":1691625600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T00:00:00Z","timestamp":1691625600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020487","name":"Nature","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020487","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,10]]},"DOI":"10.1109\/iccc57788.2023.10233382","type":"proceedings-article","created":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T17:28:28Z","timestamp":1693934908000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Entity Interactivity-Aware Graph Encoder-Decoder Networks for Explainable Relation Prediction against Advanced Persistent Threats"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Yang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronics, Information and Electrical Engineering,Shanghai,China,200240"}]},{"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[{"name":"Muroran Institute of Technology,Department of Information and Electronic Engineering,Muroran,Hokkaido,Japan,050-0071"}]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[{"name":"Muroran Institute of Technology,Department of Information and Electronic Engineering,Muroran,Hokkaido,Japan,050-0071"}]},{"given":"Gaolei","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronics, Information and Electrical Engineering,Shanghai,China,200240"}]},{"given":"Chaofeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Advanced Institute of Industrial Technology,School of Information and Electronic Engineering,Tokyo,Japan,140-0011"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3041999"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2832853"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2981314"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"102938","DOI":"10.1016\/j.cose.2022.102938","article-title":"Attack dynamics: An automatic attack graph generation framework based on system topology, capec, cwe, and cve databases","volume":"123","author":"hankin","year":"2022","journal-title":"Computers & Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1792\/1\/012011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313562"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC54830.2022.9929997"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"article-title":"How powerful are graph neural networks?","year":"2018","author":"xu","key":"ref21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3173996"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3131266"},{"key":"ref17","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2017","journal-title":"5th International Conference on Learning Representations ICLR 2017 Toulon France April 24-26 2017 Conference Track Proceedings"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","article-title":"The graph neural network model","volume":"20","author":"scarselli","year":"2008","journal-title":"IEEE Transactions on Neural Networks"},{"key":"ref19","article-title":"Inductive representation learning on large graphs","volume":"30","author":"hamilton","year":"2017","journal-title":"Advances in neural information processing systems"},{"article-title":"Graph attention networks","year":"2017","author":"veli?kovi?","key":"ref18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-industry.54"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets58706.2023.10216058"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2871866"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.01.001"},{"key":"ref5","first-page":"757","article-title":"Explainable intelligence-driven defense mechanism against advanced persistent threats: A joint edge game and AI approach","volume":"19","author":"li","year":"2022","journal-title":"IEEE Trans Dependable Secur Comput"}],"event":{"name":"2023 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2023,8,10]]},"location":"Dalian, China","end":{"date-parts":[[2023,8,12]]}},"container-title":["2023 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10233255\/10233122\/10233382.pdf?arnumber=10233382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:55:50Z","timestamp":1695664550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10233382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccc57788.2023.10233382","relation":{},"subject":[],"published":{"date-parts":[[2023,8,10]]}}}