{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:31:46Z","timestamp":1772501506687,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T00:00:00Z","timestamp":1646352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,4]]},"DOI":"10.1145\/3529466.3529480","type":"proceedings-article","created":{"date-parts":[[2022,6,4]],"date-time":"2022-06-04T16:12:24Z","timestamp":1654359144000},"page":"178-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["One-Class Directed Heterogeneous Graph Neural Network for Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Zeqi","family":"Huang","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, School of Computer Science, Beijing University of Posts and Telecommunications, China"}]},{"given":"Yonghao","family":"Gu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, School of Computer Science, Beijing University of Posts and Telecommunications, China and Guangdong Provincial Key Laboratory of Information Security Technology, Sun Yat-Sen University, China"}]},{"given":"Qing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Beijing Fibrlink Communications Co.Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2022,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Significant Cyber Incidents. 2021. https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents  Significant Cyber Incidents. 2021. https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents"},{"key":"e_1_3_2_1_2_1","first-page":"715","volume-title":"CIKM","author":"Dong Boxiang","year":"2017","unstructured":"Boxiang Dong , Zhengzhang Chen , Wendy Hui Wang , Lu-An Tang , Kai Zhang , Ying Lin , Zhichun Li , and Haifeng Chen . Efficient discovery of anomaly event sequences in enterprise security systems . In CIKM , pages 707\u2013 715 , 2017 . Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, and Haifeng Chen. Efficient discovery of anomaly event sequences in enterprise security systems. In CIKM, pages 707\u2013715, 2017."},{"key":"e_1_3_2_1_3_1","first-page":"487","volume":"17","author":"Hossain Md Nahid","year":"2017","unstructured":"Md Nahid Hossain , Sadegh M. Milajerdi , Junao Wang , Birhanu Eshete , Rigel Gjomemo , R. Sekar , Scott Stoller and V.N. Venkatakrishnan . SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. In USENIX Security 17 , pages 487 - 504 , 2017 Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller and V.N. Venkatakrishnan. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. In USENIX Security 17, pages 487-504, 2017","journal-title":"In USENIX Security"},{"key":"e_1_3_2_1_4_1","first-page":"1795","author":"Milajerdi Sadegh M.","year":"2019","unstructured":"Sadegh M. Milajerdi , Birhanu Eshete , Rigel Gjomemo , and V.N. Venkatakrishnan . POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. In CCS.pages 1795 \u2013 1812 , 2019 . Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, and V.N. Venkatakrishnan. POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. In CCS.pages 1795\u20131812, 2019.","journal-title":"In CCS.pages"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00026"},{"key":"e_1_3_2_1_6_1","first-page":"953","volume-title":"AAAI","author":"Hu Binbin","unstructured":"Binbin Hu , Zhiqiang Zhang , Chuan Shi , Jun Zhou , Xiaolong Li , and Yuan Qi . Cash-out user detection based on attributed heterogeneous information network with a hierarchical attention mechanism . In AAAI , pages 946\u2013 953 . AAAI Press, 2019. Binbin Hu, Zhiqiang Zhang, Chuan Shi, Jun Zhou, Xiaolong Li, and Yuan Qi. Cash-out user detection based on attributed heterogeneous information network with a hierarchical attention mechanism. In AAAI, pages 946\u2013953. AAAI Press, 2019."},{"key":"e_1_3_2_1_7_1","first-page":"3734","volume-title":"Jiliang Tang. Multi-Scale One-Class Recurrent Neural Networks for Discrete Event Sequence Anomaly Detection. In KDD '21","author":"Wang Zhiwei","year":"2021","unstructured":"Zhiwei Wang , Zhengzhang Chen , Jingchao Ni , Hui Liu , Haifeng Chen , and Jiliang Tang. Multi-Scale One-Class Recurrent Neural Networks for Discrete Event Sequence Anomaly Detection. In KDD '21 , pages 3726\u2013 3734 , 2021 . Zhiwei Wang, Zhengzhang Chen, Jingchao Ni, Hui Liu, Haifeng Chen, and Jiliang Tang. Multi-Scale One-Class Recurrent Neural Networks for Discrete Event Sequence Anomaly Detection. In KDD '21, pages 3726\u20133734, 2021."},{"key":"e_1_3_2_1_8_1","first-page":"4393","volume-title":"ICML","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff , Robert Vandermeulen , Nico Goernitz , Lucas Deecke , Shoaib Ahmed Siddiqui , Alexander Binder , Emmanuel M\u00fcller and Marius Kloft . Deep One-Class Classification . In ICML , pages 4393 - 4402 , 2018 Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller and Marius Kloft. Deep One-Class Classification. In ICML, pages 4393-4402, 2018"},{"key":"e_1_3_2_1_9_1","first-page":"4829","volume-title":"EMNLP-IJCNLP","author":"Hu Linmei","year":"2019","unstructured":"Linmei Hu , Tianchi Yang , Chuan Shi , Houye Ji , and Xiaoli Li . Heterogeneous graph attention networks for semi-supervised short text classification . In EMNLP-IJCNLP , pages 4820\u2013 4829 , 2019 . Linmei Hu, Tianchi Yang, Chuan Shi, Houye Ji, and Xiaoli Li. Heterogeneous graph attention networks for semi-supervised short text classification. In EMNLP-IJCNLP, pages 4820\u20134829, 2019."},{"key":"e_1_3_2_1_10_1","first-page":"1806","volume-title":"CIKM","author":"Fu TaoYang","year":"2017","unstructured":"TaoYang Fu , WangChien Lee , and Zhen Lei . Hin2vec : Explore meta-paths in heterogeneous information networks for representation learning . In CIKM , pages 1797\u2013 1806 , 2017 . TaoYang Fu, WangChien Lee, and Zhen Lei. Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning. In CIKM, pages 1797\u20131806, 2017."},{"key":"e_1_3_2_1_11_1","first-page":"144","volume-title":"SIGKDD","author":"Dong Yuxiao","year":"2017","unstructured":"Yuxiao Dong , Nitesh\u223c V. Chawla , and Ananthram Swami . metapath2vec : Scalable representation learning for heterogeneous networks . In SIGKDD , pages 135\u2013 144 , 2017 . Yuxiao Dong, Nitesh\u223cV. Chawla, and Ananthram Swami. metapath2vec: Scalable representation learning for heterogeneous networks. In SIGKDD, pages 135\u2013144, 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"ICLR","author":"Mikolov Tom","year":"2013","unstructured":"Tom Mikolov , Kai Chen , Greg Corrado and Jeffrey Dean . Efficient Estimation of Word Representations in Vector Space . In ICLR , 2013 Tom Mikolov, Kai Chen, Greg Corrado and Jeffrey Dean. Efficient Estimation of Word Representations in Vector Space. In ICLR, 2013"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2068"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_16_1","volume-title":"Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. CoRR, abs\/1609.02907","author":"Thomas","year":"2016","unstructured":"Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. CoRR, abs\/1609.02907 , 2016 . Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. CoRR, abs\/1609.02907, 2016."},{"key":"e_1_3_2_1_17_1","volume-title":"NIPS","author":"Ying William","year":"2017","unstructured":"Hamilton, William L. and Ying , Rex and Leskovec , Jure. Inductive Representation Learning on Large Graphs . In NIPS , 2017 Hamilton, William L. and Ying, Rex and Leskovec, Jure. Inductive Representation Learning on Large Graphs. In NIPS, 2017"}],"event":{"name":"ICIAI 2022: 2022 the 6th International Conference on Innovation in Artificial Intelligence","location":"Guangzhou China","acronym":"ICIAI 2022"},"container-title":["2022 the 6th International Conference on Innovation in Artificial Intelligence (ICIAI)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529466.3529480","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529466.3529480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:25Z","timestamp":1750188685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529466.3529480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,4]]},"references-count":17,"alternative-id":["10.1145\/3529466.3529480","10.1145\/3529466"],"URL":"https:\/\/doi.org\/10.1145\/3529466.3529480","relation":{},"subject":[],"published":{"date-parts":[[2022,3,4]]},"assertion":[{"value":"2022-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}