{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T20:42:30Z","timestamp":1777322550397,"version":"3.51.4"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62471030"],"award-info":[{"award-number":["62471030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62571025"],"award-info":[{"award-number":["62571025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Major Key Project of PCL","doi-asserted-by":"publisher","award":["PCL2025A08"],"award-info":[{"award-number":["PCL2025A08"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2026.3682506","type":"journal-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:48:02Z","timestamp":1775764082000},"page":"7399-7415","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Topology-Aware Access Control With Adaptively Enhanced Knowledge Distillation"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3811-5618","authenticated-orcid":false,"given":"Yikun","family":"Li","sequence":"first","affiliation":[{"name":"State Key Laboratory of Advanced Rail Autonomous Operation and the School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7521-5880","authenticated-orcid":false,"given":"Ying","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Advanced Rail Autonomous Operation and the School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2626-4883","authenticated-orcid":false,"given":"Weiting","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7203-1418","authenticated-orcid":false,"given":"Yu","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9715-1773","authenticated-orcid":false,"given":"Jianhui","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7454-0905","authenticated-orcid":false,"given":"Wei","family":"Quan","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8906-813X","authenticated-orcid":false,"given":"Hongke","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3269772"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2025.3570438"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.003.2300475"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3238751"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3087447"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3502493"},{"key":"ref8","first-page":"1231","article-title":"Zeta: A scalable and robust east-west communication framework in large-scale clouds","volume-title":"Proc. 19th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Zhang"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1600804"},{"key":"ref10","first-page":"81","article-title":"BASTION: A security enforcement network stack for container networks","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Nam"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3000674"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2808691"},{"key":"ref13","first-page":"1771","article-title":"NetVigil: Robust and low-cost anomaly detection for east-west data center security","volume-title":"Proc. 21st USENIX Symp. Networked Syst. Design Implement.","author":"Hsieh"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00114"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179320"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3413752"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484645"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3171740"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3054331"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.035"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3283527"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.74"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3070843"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.123.2100773"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472889"},{"key":"ref27","first-page":"51","article-title":"Azure accelerated networking: SmartNICs in the public cloud","volume-title":"Proc. 15th USENIX Symp. Networked Syst. Design Implement.","author":"Firestone"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796936"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3364757"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3472716.3472846"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3324640"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ASEW60602.2023.00018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3452785"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103706"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN61486.2024.10637533"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3429522"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3135885"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3471615"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSN57253.2022.00155"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"issue":"5","key":"ref42","first-page":"1129","article-title":"Survey on access control technologies for cloud computing","volume":"26","author":"Wang","year":"2015","journal-title":"J. Softw."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2749699"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3452150"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800324"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-014-3160-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3649680"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2300358"},{"key":"ref49","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512096"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.091"},{"key":"ref52","volume-title":"Amazon Access Samples","author":"Montanez","year":"2011"},{"key":"ref53","volume-title":"Amazon.com\u2014Employee Access Challenge","author":"Hamner","year":"2013"},{"key":"ref54","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. 33rd Annu. Conf. Neural Inf. Process. Syst.","volume":"32","author":"Paszke"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482014"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2015.7387396"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11478494.pdf?arnumber=11478494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T19:51:05Z","timestamp":1777319465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11478494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/tccn.2026.3682506","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}