{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:14:44Z","timestamp":1773155684670,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Major Key Project of PCL","award":["No. PCL2023A06-4"],"award-info":[{"award-number":["No. PCL2023A06-4"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No. 2022YFB3105000"],"award-info":[{"award-number":["No. 2022YFB3105000"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Key Lab of Software Defined Networking","award":["No. ZDSYS20140509172959989"],"award-info":[{"award-number":["No. ZDSYS20140509172959989"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671708","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:54:55Z","timestamp":1724561695000},"page":"3551-3562","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2394-2995","authenticated-orcid":false,"given":"Jingyu","family":"Xiao","sequence":"first","affiliation":[{"name":"Peng Cheng Laboratory &amp; Tsinghua Shenzhen International Graduate School, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5815-5520","authenticated-orcid":false,"given":"Zhiyao","family":"Xu","sequence":"additional","affiliation":[{"name":"Xi'an University of Electronic Science and Technology, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7892-0021","authenticated-orcid":false,"given":"Qingsong","family":"Zou","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School &amp; Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6071-473X","authenticated-orcid":false,"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9016-5594","authenticated-orcid":false,"given":"Dan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Peng Cheng Laborotary, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3427-7011","authenticated-orcid":false,"given":"Dong","family":"Fang","sequence":"additional","affiliation":[{"name":"Tencent, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0754-2817","authenticated-orcid":false,"given":"Ruoyu","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9156-0251","authenticated-orcid":false,"given":"Wenxin","family":"Tang","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1353-2028","authenticated-orcid":false,"given":"Kang","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7535-7950","authenticated-orcid":false,"given":"Xudong","family":"Zuo","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8960-9271","authenticated-orcid":false,"given":"Penghui","family":"Hu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4260-1395","authenticated-orcid":false,"given":"Yong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School &amp; Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6820-4286","authenticated-orcid":false,"given":"Zixuan","family":"Weng","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3666-5798","authenticated-orcid":false,"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68887-5_7"},{"key":"e_1_3_2_2_2_1","unstructured":"Jiawang Bai Kuofeng Gao Shaobo Min Shu-Tao Xia Zhifeng Li and Wei Liu. 2024. BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP. In CVPR."},{"key":"e_1_3_2_2_3_1","volume-title":"Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Celik Z. Berkay","year":"2018","unstructured":"Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 1687--1704. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/celik"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326937.3341261"},{"key":"e_1_3_2_2_5_1","volume-title":"Bu Sung Lee, and Chiew Tong Lau.","author":"Chen Zhaomin","year":"2018","unstructured":"Zhaomin Chen, Chai Kiat Yeo, Bu Sung Lee, and Chiew Tong Lau. 2018. Autoencoder-based network anomaly detection. In 2018 Wireless telecommunications symposium (WTS). IEEE, 1--5."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338840.3355641"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833620"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474255"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186058"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00050"},{"key":"e_1_3_2_2_12_1","volume-title":"HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 4223--4240. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/fu-chenglong"},{"key":"e_1_3_2_2_13_1","unstructured":"Kuofeng Gao Yang Bai Jindong Gu Shu-Tao Xia Philip Torr Zhifeng Li and Wei Liu. 2024. Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images. In ICLR."},{"key":"e_1_3_2_2_14_1","unstructured":"Kuofeng Gao Yang Bai Jindong Gu Yong Yang and Shu-Tao Xia. 2023. Backdoor Defense via Adaptively Splitting Poisoned Dataset. In CVPR."},{"key":"e_1_3_2_2_15_1","volume-title":"Energy-Latency Manipulation of Multi-modal Large Language Models via Verbose Samples. arXiv preprint arXiv:2404.16557","author":"Gao Kuofeng","year":"2024","unstructured":"Kuofeng Gao, Jindong Gu, Yang Bai, Shu-Tao Xia, Philip Torr, Wei Liu, and Zhifeng Li. 2024. Energy-Latency Manipulation of Multi-modal Large Language Models via Verbose Samples. arXiv preprint arXiv:2404.16557 (2024)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155459"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557226"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00035"},{"key":"e_1_3_2_2_21_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_22_1","volume-title":"Contextual Distillation Model for Diversified Recommendation. arXiv preprint arXiv:2406.09021","author":"Li Fan","year":"2024","unstructured":"Fan Li, Xu Si, Shisong Tang, Dingmin Wang, Kunyan Han, Bing Han, Guorui Zhou, Yang Song, and Hechang Chen. 2024. Contextual Distillation Model for Diversified Recommendation. arXiv preprint arXiv:2406.09021 (2024). https:\/\/arxiv.org\/abs\/2406.09021"},{"key":"e_1_3_2_2_23_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"key":"e_1_3_2_2_24_1","unstructured":"Knud Lasse Lueth. 2018. State of the IoT 2018: Number of IoT devices now at 7B - Market accelerating. https:\/\/iot-analytics.com\/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b\/."},{"key":"e_1_3_2_2_25_1","volume-title":"Advances in Neural Information Processing Systems (NIPS)","volume":"32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in Neural Information Processing Systems (NIPS), Vol. 32 (2019)."},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","author":"Rieger Phillip","year":"2023","unstructured":"Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, and Ahmad-Reza Sadeghi. 2023. ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. In Proceedings of the 32nd USENIX Conference on Security Symposium (Anaheim, CA, USA) (SEC '23). USENIX Association, USA, Article 241, 18 pages."},{"key":"e_1_3_2_2_27_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Sikder Amit Kumar","year":"2017","unstructured":"Amit Kumar Sikder, Hidayet Aksu, and A Selcuk Uluagac. 2017. 6thSense: A context-aware sensor-based attack detector for smart devices. In 26th USENIX Security Symposium (USENIX Security 17). 397--414."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359840"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409663"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357895"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511934"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599797"},{"key":"e_1_3_2_2_33_1","volume-title":"Advances in Neural Information Processing Systems (NIPS)","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems (NIPS), Vol. 30 (2017)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00053"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 1634--1642","author":"Xiao Jingyu","year":"2023","unstructured":"Jingyu Xiao, Qingsong Zou, Qing Li, Dan Zhao, Kang Li, Wenxin Tang, Runjie Zhou, and Yong Jiang. 2023. User Device Interaction Prediction via Relational Gated Graph Attention Network and Intent-aware Encoder. In Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 1634--1642."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3610906","article-title":"I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning","volume":"7","author":"Xiao Jingyu","year":"2023","unstructured":"Jingyu Xiao, Qingsong Zou, Qing Li, Dan Zhao, Kang Li, Zixuan Weng, Ruoyu Li, and Yong Jiang. 2023. I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMUWT\/UbiComp), Vol. 7, 3 (2023), 1--28.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMUWT\/UbiComp)"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00080"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580890"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Barcelona Spain","acronym":"KDD '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:00Z","timestamp":1750291560000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":38,"alternative-id":["10.1145\/3637528.3671708","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671708","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}