{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:08:19Z","timestamp":1772644099578,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Natural Science Basic Research Program of Shaanxi","award":["2025JC-YBMS-696"],"award-info":[{"award-number":["2025JC-YBMS-696"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276198"],"award-info":[{"award-number":["62276198"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2035, Grants U22A2096"],"award-info":[{"award-number":["U22A2035, Grants U22A2096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62036007"],"award-info":[{"award-number":["62036007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306227"],"award-info":[{"award-number":["62306227"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific and Technological Innovation Teams in Shaanxi Province","award":["2025RS-CXTD-011"],"award-info":[{"award-number":["2025RS-CXTD-011"]}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2022QNRC001"],"award-info":[{"award-number":["2022QNRC001"]}]},{"name":"Shaanxi Province Core Technology Research and Development Project","award":["2024QY2-GJHX-11"],"award-info":[{"award-number":["2024QY2-GJHX-11"]}]},{"name":"Open Research Project of Key Laboratory of Artificial Intelligence Ministry of Education","award":["AI202401"],"award-info":[{"award-number":["AI202401"]}]},{"DOI":"10.13039\/501100018925","name":"Overseas Expertise Introduction Center for Discipline Innovation of Food Nutrition and Human Health","doi-asserted-by":"publisher","award":["B16037"],"award-info":[{"award-number":["B16037"]}],"id":[{"id":"10.13039\/501100018925","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Baidu Open Fund"},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["QTZX23083"],"award-info":[{"award-number":["QTZX23083"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["QTZX23042"],"award-info":[{"award-number":["QTZX23042"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYTS24142"],"award-info":[{"award-number":["ZYTS24142"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"innovation capability support plan in Shaanxi Province","award":["2025ZC-KJXX-22"],"award-info":[{"award-number":["2025ZC-KJXX-22"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tnsm.2025.3591533","type":"journal-article","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T18:05:01Z","timestamp":1753207501000},"page":"5106-5117","source":"Crossref","is-referenced-by-count":6,"title":["Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9613-5511","authenticated-orcid":false,"given":"Zhangxuan","family":"Dang","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Yu","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0627-8933","authenticated-orcid":false,"given":"Xinglin","family":"Lian","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-2514","authenticated-orcid":false,"given":"Chunlei","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Qiuyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Artificial General Intelligence, Amazon, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7985-0037","authenticated-orcid":false,"given":"Xinbo","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Electronic Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3743"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s20051452"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322187"},{"key":"ref6","article-title":"Multi-view multi-label anomaly network traffic classification based on MLP-mixer neural network","author":"Zheng","year":"2022","journal-title":"arXiv:2210.16719"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2015.7391760"},{"issue":"1","key":"ref9","first-page":"1","article-title":"Towards an unsupervised method for network anomaly detection in large datasets","volume":"33","author":"Bhuyan","year":"2014","journal-title":"Comput. Inform."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07156-x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3397719"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.111215"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom63139.2024.00357"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714621"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685899"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2019.8936224"},{"key":"ref21","article-title":"Classification-based anomaly detection for general data","author":"Bergman","year":"2020","journal-title":"arXiv:2005.02359"},{"key":"ref22","first-page":"1","article-title":"Deep anomaly detection using geometric transformations","volume-title":"Proc. 32nd Conf. Neural Inf. Process. Syst.","volume":"31","author":"Golan"},{"key":"ref23","first-page":"1","article-title":"Using self-supervised learning can improve model robustness and uncertainty","volume-title":"Proc. 33rd Conf. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Hendrycks"},{"key":"ref24","article-title":"Improved regularization of convolutional neural networks with cutout","author":"DeVries","year":"2017","journal-title":"arXiv:1708.04552"},{"key":"ref25","first-page":"1","article-title":"Glow: Generative flow with invertible 1x1 convolutions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Kingma"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/app12094184"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107810"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.07.012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"ref34","article-title":"AnoSeg: Anomaly segmentation network using self-supervised learning","author":"Song","year":"2021","journal-title":"arXiv:2110.03396"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105835"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412842"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115782"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS49938.2020.9237728"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN52240.2021.9522215"},{"key":"ref40","article-title":"Generating practical adversarial network traffic flows using NIDSGAN","author":"Zolbayar","year":"2022","journal-title":"arXiv:2203.06694"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CNS53000.2021.9705040"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC50213.2020.00018"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001494"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544251"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511976"},{"key":"ref46","article-title":"Density estimation using real NVP","author":"Dinh","year":"2016","journal-title":"arXiv:1605.08803"},{"key":"ref47","first-page":"1","article-title":"Improved variational inference with inverse autoregressive flow","volume-title":"Proc. 30th Conf. Neural Inf. Process. Syst.","volume":"29","author":"Kingma"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2992934"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref51","volume-title":"DataCon open Dataset-DataCon2020-encrypted malicious traffic Dataset direction open Dataset","year":"2021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"ref54","article-title":"Student-teacher feature pyramid matching for unsupervised anomaly detection","author":"Wang","year":"2021","journal-title":"arXiv:2103.04257"},{"key":"ref55","article-title":"Fastflow: Unsupervised anomaly detection and localization via 2D normalizing flows","author":"Yu","year":"2021","journal-title":"arXiv:2111.07677"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"ref57","article-title":"Probabilistic modeling of deep features for out-of-distribution and adversarial detection","author":"Ahuja","year":"2019","journal-title":"arXiv:1909.11786"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897283"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87839-9_1"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11194281\/11089989.pdf?arnumber=11089989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:38:09Z","timestamp":1759945089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11089989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":62,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3591533","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}