{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:44:50Z","timestamp":1764175490791,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["No.2022YFB2902200"],"award-info":[{"award-number":["No.2022YFB2902200"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599238","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"1965-1977","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["3D-IDS: Doubly Disentangled Dynamic Intrusion Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2332-8386","authenticated-orcid":false,"given":"Chenyang","family":"Qiu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5690-1000","authenticated-orcid":false,"given":"Yingsheng","family":"Geng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2720-6840","authenticated-orcid":false,"given":"Junrui","family":"Lu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2948-5527","authenticated-orcid":false,"given":"Kaida","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7034-4202","authenticated-orcid":false,"given":"Shitong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4110-4500","authenticated-orcid":false,"given":"Ya","family":"Su","sequence":"additional","affiliation":[{"name":"HUAWEI Technologies Co., Ltd., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1987-2736","authenticated-orcid":false,"given":"Guoshun","family":"Nan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2554-3151","authenticated-orcid":false,"given":"Can","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2445-1987","authenticated-orcid":false,"given":"Junsong","family":"Fu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1720-220X","authenticated-orcid":false,"given":"Qimei","family":"Cui","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9518-1622","authenticated-orcid":false,"given":"Xiaofeng","family":"Tao","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.03.006"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"e_1_3_2_2_4_1","volume-title":"Representation learning: A review and new perspectives","author":"Bengio Yoshua","year":"2013","unstructured":"Yoshua Bengio , Aaron Courville , and Pascal Vincent . 2013. Representation learning: A review and new perspectives . IEEE transactions on pattern analysis and machine intelligence 35, 8 ( 2013 ), 1798--1828. Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. IEEE transactions on pattern analysis and machine intelligence 35, 8 (2013), 1798--1828."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450023"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4962-0"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cophys.2020.07.014"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110030"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.12709\/mest.05.05.02.03"},{"key":"e_1_3_2_2_10_1","volume-title":"International Conference on Machine Learning. PMLR, 1407--1418","author":"Chamberlain Ben","year":"2021","unstructured":"Ben Chamberlain , James Rowbottom , Maria I Gorinova , Michael Bronstein , Stefan Webb , and Emanuele Rossi . 2021 . Grand: Graph neural diffusion . In International Conference on Machine Learning. PMLR, 1407--1418 . Ben Chamberlain, James Rowbottom, Maria I Gorinova, Michael Bronstein, Stefan Webb, and Emanuele Rossi. 2021. Grand: Graph neural diffusion. In International Conference on Machine Learning. PMLR, 1407--1418."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5754"},{"key":"e_1_3_2_2_12_1","volume-title":"International Conference on Machine Learning. PMLR, 3648--3661","author":"Chen Qi","year":"2022","unstructured":"Qi Chen , Yifei Wang , Yisen Wang , Jiansheng Yang , and Zhouchen Lin . 2022 . Optimization-induced graph implicit nonlinear diffusion . In International Conference on Machine Learning. PMLR, 3648--3661 . Qi Chen, Yifei Wang, Yisen Wang, Jiansheng Yang, and Zhouchen Lin. 2022. Optimization-induced graph implicit nonlinear diffusion. In International Conference on Machine Learning. PMLR, 3648--3661."},{"volume-title":"Spectral graph theory","author":"Chung Fan RK","key":"e_1_3_2_2_13_1","unstructured":"Fan RK Chung . 1997. Spectral graph theory . Vol. 92 . American Mathematical Soc . Fan RK Chung. 1997. Spectral graph theory. Vol. 92. American Mathematical Soc."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0"},{"key":"e_1_3_2_2_15_1","volume-title":"Dynamic Graph Representation Learning via Graph Transformer Networks. arXiv preprint arXiv:2111.10447","author":"Cong Weilin","year":"2021","unstructured":"Weilin Cong , Yanhong Wu , Yuandong Tian , Mengting Gu , Yinglong Xia , Mehrdad Mahdavi , and Chun-cheng Jason Chen . 2021. Dynamic Graph Representation Learning via Graph Transformer Networks. arXiv preprint arXiv:2111.10447 ( 2021 ). Weilin Cong, Yanhong Wu, Yuandong Tian, Mengting Gu, Yinglong Xia, Mehrdad Mahdavi, and Chun-cheng Jason Chen. 2021. Dynamic Graph Representation Learning via Graph Transformer Networks. arXiv preprint arXiv:2111.10447 (2021)."},{"key":"e_1_3_2_2_16_1","volume-title":"International conference on machine learning. PMLR, 1436--1445","author":"Creager Elliot","year":"2019","unstructured":"Elliot Creager , David Madras , J\u00f6rn-Henrik Jacobsen , Marissa Weis , Kevin Swersky , Toniann Pitassi , and Richard Zemel . 2019 . Flexibly fair representation learning by disentanglement . In International conference on machine learning. PMLR, 1436--1445 . Elliot Creager, David Madras, J\u00f6rn-Henrik Jacobsen, Marissa Weis, Kevin Swersky, Toniann Pitassi, and Richard Zemel. 2019. Flexibly fair representation learning by disentanglement. In International conference on machine learning. PMLR, 1436--1445."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971776"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406247"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/epi.13670"},{"key":"e_1_3_2_2_23_1","volume-title":"Explaining explanations: An approach to evaluating interpretability of machine learning. arXiv preprint arXiv:1806.00069","author":"Gilpin Leilani H","year":"2018","unstructured":"Leilani H Gilpin , David Bau , Ben Z Yuan , Ayesha Bajwa , Michael Specter , and Lalana Kagal . 2018. Explaining explanations: An approach to evaluating interpretability of machine learning. arXiv preprint arXiv:1806.00069 ( 2018 ), 118. Leilani H Gilpin, David Bau, Ben Z Yuan, Ayesha Bajwa, Michael Specter, and Lalana Kagal. 2018. Explaining explanations: An approach to evaluating interpretability of machine learning. arXiv preprint arXiv:1806.00069 (2018), 118."},{"key":"e_1_3_2_2_24_1","volume-title":"On the Transfer of Inductive Bias from Simulation to the Real World: a New Disentanglement Dataset. Advances in Neural Information Processing Systems 32 20","author":"Gondal Muhammad W","year":"2020","unstructured":"Muhammad W Gondal , Manuel W\u00fcthrich , \u00d0or\u0111e Miladinovi\u0107 , Francesco Locatello , Martin Breidt , Valentin Volchkov , Joel Akpo , Olivier Bachem , Bernhard Sch\u00f6lkopf , and Stefan Bauer . 2020. On the Transfer of Inductive Bias from Simulation to the Real World: a New Disentanglement Dataset. Advances in Neural Information Processing Systems 32 20 ( 2020 ), 15661--15672. Muhammad W Gondal, Manuel W\u00fcthrich, \u00d0or\u0111e Miladinovi\u0107, Francesco Locatello, Martin Breidt, Valentin Volchkov, Joel Akpo, Olivier Bachem, Bernhard Sch\u00f6lkopf, and Stefan Bauer. 2020. On the Transfer of Inductive Bias from Simulation to the Real World: a New Disentanglement Dataset. Advances in Neural Information Processing Systems 32 20 (2020), 15661--15672."},{"key":"e_1_3_2_2_25_1","first-page":"11984","article-title":"Implicit graph neural networks","volume":"33","author":"Gu Fangda","year":"2020","unstructured":"Fangda Gu , Heng Chang , Wenwu Zhu , Somayeh Sojoudi , and Laurent El Ghaoui . 2020 . Implicit graph neural networks . Advances in Neural Information Processing Systems 33 (2020), 11984 -- 11995 . Fangda Gu, Heng Chang, Wenwu Zhu, Somayeh Sojoudi, and Laurent El Ghaoui. 2020. Implicit graph neural networks. Advances in Neural Information Processing Systems 33 (2020), 11984--11995.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351053"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539389"},{"key":"e_1_3_2_2_28_1","volume-title":"Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584","author":"Hamilton William L","year":"2017","unstructured":"William L Hamilton , Rex Ying , and Jure Leskovec . 2017. Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584 ( 2017 ). William L Hamilton, Rex Ying, and Jure Leskovec. 2017. Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584 (2017)."},{"key":"e_1_3_2_2_29_1","volume-title":"International conference on learning representations.","author":"Higgins Irina","year":"2017","unstructured":"Irina Higgins , Loic Matthey , Arka Pal , Christopher Burgess , Xavier Glorot , Matthew Botvinick , Shakir Mohamed , and Alexander Lerchner . 2017 . beta-vae: Learning basic visual concepts with a constrained variational framework . In International conference on learning representations. Irina Higgins, Loic Matthey, Arka Pal, Christopher Burgess, Xavier Glorot, Matthew Botvinick, Shakir Mohamed, and Alexander Lerchner. 2017. beta-vae: Learning basic visual concepts with a constrained variational framework. In International conference on learning representations."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01253-w"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan10030058"},{"key":"e_1_3_2_2_32_1","volume-title":"A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form","author":"Ioulianou Philokypros","year":"2018","unstructured":"Philokypros Ioulianou , Vasileios Vasilakis , Ioannis Moscholios , and Michael Logothetis . 2018. A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form ( 2018 ). Philokypros Ioulianou, Vasileios Vasilakis, Ioannis Moscholios, and Michael Logothetis. 2018. A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form (2018)."},{"key":"e_1_3_2_2_33_1","volume-title":"Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849","author":"Kalander Marcus","year":"2020","unstructured":"Marcus Kalander , Min Zhou , Chengzhi Zhang , Hanling Yi , and Lujia Pan . 2020. Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849 ( 2020 ). Marcus Kalander, Min Zhou, Chengzhi Zhang, Hanling Yi, and Lujia Pan. 2020. Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849 (2020)."},{"key":"e_1_3_2_2_34_1","volume-title":"Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849","author":"Kalander Marcus","year":"2020","unstructured":"Marcus Kalander , Min Zhou , Chengzhi Zhang , Hanling Yi , and Lujia Pan . 2020. Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849 ( 2020 ). Marcus Kalander, Min Zhou, Chengzhi Zhang, Hanling Yi, and Lujia Pan. 2020. Spatio-temporal hybrid graph convolutional network for traffic forecasting in telecommunication networks. arXiv preprint arXiv:2009.09849 (2020)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24107"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856705"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685361"},{"key":"e_1_3_2_2_40_1","volume-title":"Dostupn\u00e9 z: https:\/\/github. com\/ahlashkari\/CICFlowMeter\/blob\/master\/ReadMe. txt","author":"Lashkari Arash Habibi","year":"2017","unstructured":"Arash Habibi Lashkari , Y Zang , G Owhuo , MSI Mamun , and GD Gil . 2017. CICFlowMeter. GitHub.[vid. 2021-08-10]. Dostupn\u00e9 z: https:\/\/github. com\/ahlashkari\/CICFlowMeter\/blob\/master\/ReadMe. txt ( 2017 ). Arash Habibi Lashkari, Y Zang, G Owhuo, MSI Mamun, and GD Gil. 2017. CICFlowMeter. GitHub.[vid. 2021-08-10]. Dostupn\u00e9 z: https:\/\/github. com\/ahlashkari\/CICFlowMeter\/blob\/master\/ReadMe. txt (2017)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/9783527828470"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.078"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"e_1_3_2_2_47_1","volume-title":"International Conference on Machine Learning. PMLR, 6348--6359","author":"Locatello Francesco","year":"2020","unstructured":"Francesco Locatello , Ben Poole , Gunnar R\u00e4tsch , Bernhard Sch\u00f6lkopf , Olivier Bachem , and Michael Tschannen . 2020 . Weakly-supervised disentanglement without compromises . In International Conference on Machine Learning. PMLR, 6348--6359 . Francesco Locatello, Ben Poole, Gunnar R\u00e4tsch, Bernhard Sch\u00f6lkopf, Olivier Bachem, and Michael Tschannen. 2020. Weakly-supervised disentanglement without compromises. In International Conference on Machine Learning. PMLR, 6348--6359."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148944"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106301"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467443"},{"key":"e_1_3_2_2_51_1","volume-title":"Proceedings of the eResearch Australasia Conference","author":"Moustafa Nour","year":"2019","unstructured":"Nour Moustafa . 2019 . New generations of internet of things datasets for cyberse-curity applications based machine learning: TON_IoT datasets . In Proceedings of the eResearch Australasia Conference , Brisbane, Australia. 21--25. Nour Moustafa. 2019. New generations of internet of things datasets for cyberse-curity applications based machine learning: TON_IoT datasets. In Proceedings of the eResearch Australasia Conference, Brisbane, Australia. 21--25."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"volume-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS)","author":"Moustafa Nour","key":"e_1_3_2_2_53_1","unstructured":"Nour Moustafa and Jill Slay . 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS) . IEEE , 1--6. Nour Moustafa and Jill Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS). IEEE, 1--6."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5985"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.56205"},{"key":"e_1_3_2_2_57_1","volume-title":"Graph neural ordinary differential equations. arXiv preprint arXiv:1911.07532","author":"Poli Michael","year":"2019","unstructured":"Michael Poli , Stefano Massaroli , Junyoung Park , Atsushi Yamashita , Hajime Asama , and Jinkyoo Park . 2019. Graph neural ordinary differential equations. arXiv preprint arXiv:1911.07532 , 2019 (2019). Michael Poli, Stefano Massaroli, Junyoung Park, Atsushi Yamashita, Hajime Asama, and Jinkyoo Park. 2019. Graph neural ordinary differential equations. arXiv preprint arXiv:1911.07532, 2019 (2019)."},{"key":"e_1_3_2_2_58_1","first-page":"15","article-title":"DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey","volume":"14","author":"Prasad K Munivara","year":"2014","unstructured":"K Munivara Prasad . 2014 . DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey . Global Journal of Computer Science and Technology 14 , E7 (2014), 15 -- 32 . K Munivara Prasad. 2014. DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey. Global Journal of Computer Science and Technology 14, E7 (2014), 15--32.","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_3_2_2_59_1","volume-title":"Learning deep disentangled embeddings with the f-statistic loss. Advances in neural information processing systems 31","author":"Ridgeway Karl","year":"2018","unstructured":"Karl Ridgeway and Michael C Mozer . 2018. Learning deep disentangled embeddings with the f-statistic loss. Advances in neural information processing systems 31 ( 2018 ). Karl Ridgeway and Michael C Mozer. 2018. Learning deep disentangled embeddings with the f-statistic loss. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_2_60_1","volume-title":"Gui Yun Tian, and Jonathon Chambers","author":"Roopak Monika","year":"2019","unstructured":"Monika Roopak , Gui Yun Tian, and Jonathon Chambers . 2019 . Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE , 0452--0457. Monika Roopak, Gui Yun Tian, and Jonathon Chambers. 2019. Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE, 0452--0457."},{"key":"e_1_3_2_2_61_1","volume-title":"Temporal graph networks for deep learning on dynamic graphs. arXiv preprint arXiv:2006.10637","author":"Rossi Emanuele","year":"2020","unstructured":"Emanuele Rossi , Ben Chamberlain , Fabrizio Frasca , Davide Eynard , Federico Monti , and Michael Bronstein . 2020. Temporal graph networks for deep learning on dynamic graphs. arXiv preprint arXiv:2006.10637 ( 2020 ). Emanuele Rossi, Ben Chamberlain, Fabrizio Frasca, Davide Eynard, Federico Monti, and Michael Bronstein. 2020. Temporal graph networks for deep learning on dynamic graphs. arXiv preprint arXiv:2006.10637 (2020)."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284655"},{"key":"e_1_3_2_2_63_1","volume-title":"Big Data Technologies and Applications: 10th EAI International Conference, BDTA","author":"Sarhan Mohanad","year":"2020","unstructured":"Mohanad Sarhan , Siamak Layeghy , Nour Moustafa , and Marius Portmann . 2021. Netflow datasets for machine learning-based network intrusion detection systems . In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020 , and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10. Springer , 117--135. Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, and Marius Portmann. 2021. Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10. Springer, 117--135."},{"key":"e_1_3_2_2_64_1","volume-title":"An explainable machine learning-based network intrusion detection system for enabling generalisability in securing IoT networks. arXiv preprint arXiv:2104.07183","author":"Sarhan Mohanad","year":"2021","unstructured":"Mohanad Sarhan , Siamak Layeghy , and Marius Portmann . 2021. An explainable machine learning-based network intrusion detection system for enabling generalisability in securing IoT networks. arXiv preprint arXiv:2104.07183 ( 2021 ). Mohanad Sarhan, Siamak Layeghy, and Marius Portmann. 2021. An explainable machine learning-based network intrusion detection system for enabling generalisability in securing IoT networks. arXiv preprint arXiv:2104.07183 (2021)."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2022.100359"},{"key":"e_1_3_2_2_66_1","volume-title":"Towards a standard feature set for network intrusion detection system datasets. Mobile networks and applications","author":"Sarhan Mohanad","year":"2022","unstructured":"Mohanad Sarhan , Siamak Layeghy , and Marius Portmann . 2022. Towards a standard feature set for network intrusion detection system datasets. Mobile networks and applications ( 2022 ), 1--14. Mohanad Sarhan, Siamak Layeghy, and Marius Portmann. 2022. Towards a standard feature set for network intrusion detection system datasets. Mobile networks and applications (2022), 1--14."},{"key":"e_1_3_2_2_67_1","volume-title":"Explaining adaboost. Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik","author":"Schapire Robert E","year":"2013","unstructured":"Robert E Schapire . 2013. Explaining adaboost. Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik ( 2013 ), 37--52. Robert E Schapire. 2013. Explaining adaboost. Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik (2013), 37--52."},{"key":"e_1_3_2_2_68_1","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin , Arash Habibi Lashkari , and Ali A Ghorbani . 2018 . Toward generating a new intrusion detection dataset and intrusion traffic characterization . ICISSp 1 (2018), 108 -- 116 . Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018), 108--116.","journal-title":"ICISSp"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100301"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5438"},{"key":"e_1_3_2_2_71_1","volume-title":"International Conference on Machine Learning. PMLR, 6056--6065","author":"Suter Raphael","year":"2019","unstructured":"Raphael Suter , Djordje Miladinovic , Bernhard Sch\u00f6lkopf , and Stefan Bauer . 2019 . Robustly disentangled causal mechanisms: Validating deep representations for interventional robustness . In International Conference on Machine Learning. PMLR, 6056--6065 . Raphael Suter, Djordje Miladinovic, Bernhard Sch\u00f6lkopf, and Stefan Bauer. 2019. Robustly disentangled causal mechanisms: Validating deep representations for interventional robustness. In International Conference on Machine Learning. PMLR, 6056--6065."},{"key":"e_1_3_2_2_72_1","volume-title":"International Conference on Machine Learning. PMLR, 10401--10412","author":"Tr\u00e4uble Frederik","year":"2021","unstructured":"Frederik Tr\u00e4uble , Elliot Creager , Niki Kilbertus , Francesco Locatello , Andrea Dittadi , Anirudh Goyal , Bernhard Sch\u00f6lkopf , and Stefan Bauer . 2021 . On disentangled representations learned from correlated data . In International Conference on Machine Learning. PMLR, 10401--10412 . Frederik Tr\u00e4uble, Elliot Creager, Niki Kilbertus, Francesco Locatello, Andrea Dittadi, Anirudh Goyal, Bernhard Sch\u00f6lkopf, and Stefan Bauer. 2021. On disentangled representations learned from correlated data. In International Conference on Machine Learning. PMLR, 10401--10412."},{"key":"e_1_3_2_2_73_1","volume-title":"2017 international conference on system science and engineering (ICSSE). IEEE, 210--214","author":"Van Nguyen Thanh","year":"2017","unstructured":"Nguyen Thanh Van , Tran Ngoc Thinh , 2017 . An anomaly-based network intrusion detection system using deep learning . In 2017 international conference on system science and engineering (ICSSE). IEEE, 210--214 . Nguyen Thanh Van, Tran Ngoc Thinh, et al. 2017. An anomaly-based network intrusion detection system using deep learning. In 2017 international conference on system science and engineering (ICSSE). IEEE, 210--214."},{"key":"e_1_3_2_2_74_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107 , Guillem Cucurull , Arantxa Casanova , Adriana Romero , Pietro Lio , and Yoshua Bengio . 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 ( 2017 ). Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_2_75_1","volume-title":"Machine learning basics. Deep learning","author":"Wang H","year":"2016","unstructured":"H Wang , ZeZXeZBe PJ Lei , X Zhang , B Zhou , and J Peng . 2016. Machine learning basics. Deep learning ( 2016 ), 98--164. H Wang, ZeZXeZBePJ Lei, X Zhang, B Zhou, and J Peng. 2016. Machine learning basics. Deep learning (2016), 98--164."},{"key":"e_1_3_2_2_76_1","volume-title":"Mountain View, CA","author":"Wueest Candid","year":"2014","unstructured":"Candid Wueest . 2014. Targeted attacks against the energy sector. Symantec Security Response , Mountain View, CA ( 2014 ). Candid Wueest. 2014. Targeted attacks against the energy sector. Symantec Security Response, Mountain View, CA (2014)."},{"key":"e_1_3_2_2_77_1","volume-title":"Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962","author":"Xu Da","year":"2020","unstructured":"Da Xu , Chuanwei Ruan , Evren Korpeoglu , Sushant Kumar , and Kannan Achan . 2020. Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962 ( 2020 ). Da Xu, Chuanwei Ruan, Evren Korpeoglu, Sushant Kumar, and Kannan Achan. 2020. Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962 (2020)."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"M. Yoon B. Hooi K. Shin and C. Faloutsos. 2019. Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach. ACM (2019).  M. Yoon B. Hooi K. Shin and C. Faloutsos. 2019. Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach. ACM (2019).","DOI":"10.1145\/3292500.3330946"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMeCG.2009.114"},{"key":"e_1_3_2_2_80_1","unstructured":"Shijie Zhou Zhimeng Guo Charu Aggarwal Xiang Zhang and Suhang Wang. 2022. Link Prediction on Heterophilic Graphs via Disentangled Representation Learning. arXiv preprint arXiv:2208.01820 (2022)  Shijie Zhou Zhimeng Guo Charu Aggarwal Xiang Zhang and Suhang Wang. 2022. Link Prediction on Heterophilic Graphs via Disentangled Representation Learning. arXiv preprint arXiv:2208.01820 (2022)"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Long Beach CA USA","acronym":"KDD '23"},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599238","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:15Z","timestamp":1750182675000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599238"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":80,"alternative-id":["10.1145\/3580305.3599238","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599238","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}