{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T04:53:02Z","timestamp":1743915182275,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892163","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["SeqA-ITD: User Behavior Sequence Augmentation for Insider Threat Detection at Multiple Time Granularities"],"prefix":"10.1109","author":[{"given":"Fangtao","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Xiu","family":"Ma","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Weiqing","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Recurrent neural network language models for open vocabulary event-level cyber anomaly detection","author":"tuor","year":"0","journal-title":"Workshops at the Thirtieth AAAI Conference on Artificial Intelligence"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3217871.3217872"},{"key":"ref12","article-title":"Adsage: Anomaly detection in sequences of attributed graph edges applied to insider threat detection at fine-grained level","author":"garchery","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995964"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412161"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631538"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020931"},{"key":"ref17","article-title":"Multi-class classification based anomaly detection of insider activities","author":"gayathri","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00038"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94268-1_28"},{"journal-title":"Insider Threat Tools","year":"2018","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020760"},{"journal-title":"A seqgan for polyphonic music generation","year":"2017","author":"lee","key":"ref27"},{"key":"ref3","first-page":"43","article-title":"Insider threat detection with deep neural network","author":"yuan","year":"0","journal-title":"International Conference on Computational Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00092"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app10144945"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005589"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102221"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI50040.2020.00102"},{"key":"ref9","article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","author":"tuor","year":"0","journal-title":"Workshops at the Thirtieth AAAI Conference on Artificial Intelligence"},{"journal-title":"Insider Threats Report","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref22","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref21","first-page":"1322","article-title":"Adasyn: Adaptive synthetic sampling approach for imbalanced learning","author":"he","year":"0","journal-title":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)"},{"key":"ref24","article-title":"Creative gans for generating poems, lyrics, and metaphors","author":"saeed","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1230"},{"key":"ref25","article-title":"Maximum-likelihood augmented discrete generative adversarial networks","author":"che","year":"2017","journal-title":"ArXiv Preprint"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892163.pdf?arnumber=9892163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:58:41Z","timestamp":1667516321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892163","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}