{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:08:09Z","timestamp":1772122089798,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3101100"],"award-info":[{"award-number":["2021YFB3101100"]}]},{"name":"Primary Research &amp; Development Plan of Jiangsu Province","award":["BE2023025"],"award-info":[{"award-number":["BE2023025"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172235"],"award-info":[{"award-number":["62172235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"General Program of the National Science Foundation of China","award":["62302238"],"award-info":[{"award-number":["62302238"]}]},{"name":"Natural Science Research Project of Colleges and Universities in Jiangsu Province","award":["22KJB520004"],"award-info":[{"award-number":["22KJB520004"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M711689"],"award-info":[{"award-number":["2022M711689"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tii.2024.3393491","type":"journal-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T17:39:35Z","timestamp":1716226775000},"page":"10954-10965","source":"Crossref","is-referenced-by-count":9,"title":["AUTH: An Adversarial Autoencoder Based Unsupervised Insider Threat Detection Scheme for Multisource Logs"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9223-5776","authenticated-orcid":false,"given":"Xingjian","family":"Zhu","sequence":"first","affiliation":[{"name":"College of Automation &amp; College Of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1693-3000","authenticated-orcid":false,"given":"Jiankuo","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5846-4674","authenticated-orcid":false,"given":"Jin","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6134-9753","authenticated-orcid":false,"given":"Zhenguo","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Automation &amp; College Of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1213-8686","authenticated-orcid":false,"given":"Zhenjiang","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0085-1545","authenticated-orcid":false,"given":"Yanfei","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Internet of Things and Jiangsu Engineering Research Center of HPC and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1625-9316","authenticated-orcid":false,"given":"Moyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Hefei Yun Micro Electronics Company, Ltd, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3215231"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103614"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103456"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s22197409"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/23335777.2021.2023651"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107597"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.05.002"},{"key":"ref8","first-page":"217","article-title":"Rule-based anomaly pattern detection for detecting disease outbreaks","volume-title":"Proc. Amer. Assoc. Artif. Intell.","author":"Wong","year":"2004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995964"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00043"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103054"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118991"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/app10155208"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102221"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3150334"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/a15080283"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3297663"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3090362"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/208"},{"key":"ref20","article-title":"An insider threat indicator ontology","author":"Costa","year":"2016"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2019-0142"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2967721"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071928"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2019.00027"},{"key":"ref25","article-title":"Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment","volume":"105","author":"Asha","year":"2023","journal-title":"Comput. Elect. Eng."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3135639"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103066"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119925"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020760"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3245413"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126588"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005589"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3096215"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3216004"},{"key":"ref35","article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","author":"Bai","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3053563"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3078414"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.37"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"ref41","first-page":"62","article-title":"Peer group metadata-informed LSTM ensembles for insider threat detection","volume-title":"Proc. Thirty-First Int. Flairs Conf.","author":"Matterer","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36938-5_2"},{"key":"ref43","first-page":"33","article-title":"Proper use of ROC curves in intrusion\/anomaly detection","author":"Maxion","year":"2004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref46","first-page":"1","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zong","year":"2018"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053558"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107751"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/10666802\/10535047.pdf?arnumber=10535047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:53:27Z","timestamp":1725688407000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10535047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":48,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tii.2024.3393491","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}