{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T22:27:44Z","timestamp":1773181664443,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006133","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-OE0000779"],"award-info":[{"award-number":["DE-OE0000779"]}],"id":[{"id":"10.13039\/100006133","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["1564250, 1946391"],"award-info":[{"award-number":["1564250, 1946391"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3412161","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T05:31:03Z","timestamp":1603085463000},"page":"2289-2292","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Few-shot Insider Threat Detection"],"prefix":"10.1145","author":[{"given":"Shuhan","family":"Yuan","sequence":"first","affiliation":[{"name":"Utah State University, Logan, UT, USA"}]},{"given":"Panpan","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Arkansas, Fayetteville, AR, USA"}]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Arkansas, Fayetteville, AR, USA"}]},{"given":"Hanghang","family":"Tong","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL-HLT","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2019 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL-HLT 2019. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL-HLT 2019."},{"key":"e_1_3_2_2_2_1","volume-title":"2013 IEEE Security and Privacy Workshops.","author":"Glasser J.","unstructured":"J. Glasser and B. Lindauer . 2013. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data . In 2013 IEEE Security and Privacy Workshops. J. Glasser and B. Lindauer. 2013. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data. In 2013 IEEE Security and Privacy Workshops."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783367"},{"key":"e_1_3_2_2_4_1","volume-title":"Zemel","author":"Snell Jake","year":"2017","unstructured":"Jake Snell , Kevin Swersky , and Richard S . Zemel . 2017 . Prototypical Networks for Few-shot Learning. In NIPS. Jake Snell, Kevin Swersky, and Richard S. Zemel. 2017. Prototypical Networks for Few-shot Learning. In NIPS."},{"key":"e_1_3_2_2_5_1","volume-title":"Hospedales","author":"Sung Flood","year":"2017","unstructured":"Flood Sung , Yongxin Yang , Li Zhang , Tao Xiang , Philip H. S. Torr , and Timothy M . Hospedales . 2017 . Learning to Compare : Relation Network for Few-Shot Learning. In CVPR. Flood Sung, Yongxin Yang, Li Zhang, Tao Xiang, Philip H. S. Torr, and Timothy M. Hospedales. 2017. Learning to Compare: Relation Network for Few-Shot Learning. In CVPR."},{"key":"e_1_3_2_2_6_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention Is All You Need. In NIPS.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention Is All You Need. In NIPS."}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","location":"Virtual Event Ireland","acronym":"CIKM '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412161","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412161","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:54Z","timestamp":1750197774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":6,"alternative-id":["10.1145\/3340531.3412161","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3412161","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}