{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:48:09Z","timestamp":1774352889328,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"he National Nature Science Foundation of China","award":["62372297,62202293,62303306,62302525"],"award-info":[{"award-number":["62372297,62202293,62303306,62302525"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645457","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1656-1667","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Divide, Conquer, and Coalesce: Meta Parallel Graph Neural Network for IoT Intrusion Detection at Scale"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7845-4995","authenticated-orcid":false,"given":"Hua","family":"Ding","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1805-0183","authenticated-orcid":false,"given":"Lixing","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0767-2307","authenticated-orcid":false,"given":"Shenghong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1037-3973","authenticated-orcid":false,"given":"Yang","family":"Bai","sequence":"additional","affiliation":[{"name":"Department of Automation, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8629-4622","authenticated-orcid":false,"given":"Pan","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2211-2137","authenticated-orcid":false,"given":"Zhe","family":"Qu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, Hunan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3203249"},{"key":"e_1_3_2_2_2_1","volume-title":"Residual Algorithms: Reinforcement Learning with Function Approximation. In Machine Learning Proceedings","author":"Baird Leemon","year":"1995","unstructured":"Leemon Baird. 1995. Residual Algorithms: Reinforcement Learning with Function Approximation. In Machine Learning Proceedings 1995. Elsevier, 30--37."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjst\/e2012-01703-3"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140344"},{"key":"e_1_3_2_2_6_1","volume-title":"Adversarially Trained Actor Critic for Offline Reinforcement Learning. In International Conference on Machine Learning. PMLR, 3852--3878","author":"Cheng Ching-An","year":"2022","unstructured":"Ching-An Cheng, Tengyang Xie, Nan Jiang, and Alekh Agarwal. 2022. Adversarially Trained Actor Critic for Offline Reinforcement Learning. In International Conference on Machine Learning. PMLR, 3852--3878."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Benoit Claise. 2004. Rfc 3954: Cisco Systems Netflow Services Export Version 9.","DOI":"10.17487\/rfc3954"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.935537"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3228493"},{"key":"e_1_3_2_2_11_1","first-page":"1","article-title":"The Internet of Things. How the Next Evolution of the Internet is Changing Everything, Whitepaper","volume":"1","author":"Evans Dave","year":"2011","unstructured":"Dave Evans. 2011. The Internet of Things. How the Next Evolution of the Internet is Changing Everything, Whitepaper, Cisco Internet Business Solutions Group (IBSG), Vol. 1 (2011), 1--12.","journal-title":"Cisco Internet Business Solutions Group (IBSG)"},{"key":"e_1_3_2_2_12_1","volume-title":"Soft Actor-critic: Off-policy Maximum Entropy Deep Reinforcement Learning with A Stochastic Actor. In International Conference on Machine Learning. PMLR","author":"Haarnoja Tuomas","year":"2018","unstructured":"Tuomas Haarnoja, Aurick Zhou, Pieter Abbeel, and Sergey Levine. 2018. Soft Actor-critic: Off-policy Maximum Entropy Deep Reinforcement Learning with A Stochastic Actor. In International Conference on Machine Learning. PMLR, 1861--1870."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.4153\/CMB-1965-051-3"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3042049"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2793284"},{"key":"e_1_3_2_2_16_1","volume-title":"Advances in Neural Information Processing Systems","volume":"25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet Classification with Deep Convolutional Neural Networks. Advances in Neural Information Processing Systems, Vol. 25 (2012)."},{"key":"e_1_3_2_2_17_1","volume-title":"E-graphsage: A Graph Neural Network Based Intrusion Detection System for Iot. In NOMS 2022--2022 IEEE\/IFIP Network Operations and Management Symposium. IEEE, 1--9.","author":"Lo Wai Weng","year":"2022","unstructured":"Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, and Marius Portmann. 2022. E-graphsage: A Graph Neural Network Based Intrusion Detection System for Iot. In NOMS 2022--2022 IEEE\/IFIP Network Operations and Management Symposium. IEEE, 1--9."},{"key":"e_1_3_2_2_18_1","volume-title":"A Deep Learning Framework for Graph Partitioning. ICLR","author":"Nazi Azade","year":"2019","unstructured":"Azade Nazi, Will Hang, Anna Goldie, Sujith Ravi, and Azalia Mirhoseini. 2019. A Deep Learning Framework for Graph Partitioning. ICLR (2019)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100755"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2022.100359"},{"key":"e_1_3_2_2_21_1","volume-title":"The Growth in Connected Iot Devices is Expected to Generate 79.4 zb of Data","author":"Shirer Michael","year":"2025","unstructured":"Michael Shirer and Carrie MacGillivray. 2019. The Growth in Connected Iot Devices is Expected to Generate 79.4 zb of Data in 2025, According to A New Idc Forecast. IDC. com. https:\/\/www. idc. com\/getdoc. jsp (2019)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"e_1_3_2_2_23_1","unstructured":"StereoLabs. 2023. ZED Box. https:\/\/www.stereolabs.com\/zed-box\/"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037903"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2884928"},{"key":"e_1_3_2_2_26_1","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton Richard S","year":"2018","unstructured":"Richard S Sutton and Andrew G Barto. 2018. Reinforcement Learning: An Introduction. MIT press."},{"key":"e_1_3_2_2_27_1","volume-title":"Applying Convolutional Neural Network for Network Intrusion Detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 1222--1228","author":"Vinayakumar R","year":"2017","unstructured":"R Vinayakumar, KP Soman, and Prabaharan Poornachandran. 2017. Applying Convolutional Neural Network for Network Intrusion Detection. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 1222--1228."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings, Part IV 20","author":"Xiao Qingsai","year":"2020","unstructured":"Qingsai Xiao, Jian Liu, Quiyun Wang, Zhengwei Jiang, Xuren Wang, and Yepeng Yao. 2020. Towards Network Anomaly Detection Using Graph Embedding. In Computational Science--ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3--5, 2020, Proceedings, Part IV 20. Springer, 156--169."},{"key":"e_1_3_2_2_30_1","first-page":"6683","article-title":"Bellman-consistent Pessimism for Offline Reinforcement Learning","volume":"34","author":"Xie Tengyang","year":"2021","unstructured":"Tengyang Xie, Ching-An Cheng, Nan Jiang, Paul Mineiro, and Alekh Agarwal. 2021. Bellman-consistent Pessimism for Offline Reinforcement Learning. Advances in Neural Information Processing Systems, Vol. 34 (2021), 6683--6694.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991876"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109724"},{"key":"e_1_3_2_2_33_1","volume-title":"Recurrent Neural Network Regularization. arXiv preprint arXiv:1409.2329","author":"Zaremba Wojciech","year":"2014","unstructured":"Wojciech Zaremba, Ilya Sutskever, and Oriol Vinyals. 2014. Recurrent Neural Network Regularization. arXiv preprint arXiv:1409.2329 (2014)."},{"key":"e_1_3_2_2_34_1","volume-title":"Automating Botnet Detection with Graph Neural Networks. arXiv preprint arXiv:2003.06344","author":"Zhou Jiawei","year":"2020","unstructured":"Jiawei Zhou, Zhiying Xu, Alexander M Rush, and Minlan Yu. 2020b. Automating Botnet Detection with Graph Neural Networks. arXiv preprint arXiv:2003.06344 (2020)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3022432"},{"key":"e_1_3_2_2_36_1","volume-title":"Graph-based Intrusion Detection System Using General Behavior Learning. In GLOBECOM 2022--2022 IEEE Global Communications Conference. IEEE, 2621--2626","author":"Zhu Huidi","year":"2022","unstructured":"Huidi Zhu and Jialiang Lu. 2022. Graph-based Intrusion Detection System Using General Behavior Learning. In GLOBECOM 2022--2022 IEEE Global Communications Conference. IEEE, 2621--2626."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2907269"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:32:41Z","timestamp":1755822761000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":37,"alternative-id":["10.1145\/3589334.3645457","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645457","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}