{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:06:07Z","timestamp":1737522367839,"version":"3.33.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:00:00Z","timestamp":1728172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:00:00Z","timestamp":1728172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,6]]},"DOI":"10.1109\/smc54092.2024.10830942","type":"proceedings-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:39:20Z","timestamp":1737398360000},"page":"1992-1997","source":"Crossref","is-referenced-by-count":0,"title":["KI-Mix: Enhancing Cyber Threat Detection in Incomplete Supervision Setting Through Knowledge-informed Pseudo-anomaly Generation"],"prefix":"10.1109","author":[{"given":"Gang","family":"Yang","sequence":"first","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology,Wuhan,China"}]},{"given":"Bo","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology,Wuhan,China"}]},{"given":"Linna","family":"Fan","sequence":"additional","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology,Wuhan,China"}]},{"given":"Xia","family":"Tao","sequence":"additional","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology,Wuhan,China"}]},{"given":"Jun","family":"He","sequence":"additional","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology,Wuhan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref2","first-page":"4393","article-title":"Deep one-class classiffcation","volume-title":"International conference on machine learning","author":"Ruff","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3657647"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489605"},{"key":"ref7","article-title":"Deep semisupervised anomaly detection","volume-title":"International Conference on Learning Representations","author":"Ruff","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599302"},{"key":"ref10","first-page":"4489","article-title":"Automatic unsupervised outlier model selection","volume":"34","author":"Yue","year":"2021","journal-title":"Neural Information Processing Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3079836"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1_79"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00612"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2024.3497801"},{"key":"ref15","article-title":"Contrastive mixup: Self-and semi-supervised learning for tabular domain","author":"Darabi","year":"2021","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103194"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0010908400003120"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114551"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3533048"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.26615\/978-954-452-072-4_077"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.305"}],"event":{"name":"2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","start":{"date-parts":[[2024,10,6]]},"location":"Kuching, Malaysia","end":{"date-parts":[[2024,10,10]]}},"container-title":["2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10830919\/10830920\/10830942.pdf?arnumber=10830942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:57:30Z","timestamp":1737442650000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10830942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/smc54092.2024.10830942","relation":{},"subject":[],"published":{"date-parts":[[2024,10,6]]}}}