{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:08Z","timestamp":1755780008849,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T00:00:00Z","timestamp":1700784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,24]]},"DOI":"10.1145\/3656766.3656843","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T18:34:34Z","timestamp":1717266874000},"page":"452-457","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["GPT Method Based Traffic Anomaly Detection for Space-ground Integrated Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1458-6793","authenticated-orcid":false,"given":"Yuqiao","family":"Hou","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and \rSchool of Cyber Security, Univ. of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8514-148X","authenticated-orcid":false,"given":"Yuxiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8477-4081","authenticated-orcid":false,"given":"Jiankai","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4220-9967","authenticated-orcid":false,"given":"Liming","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8579-5544","authenticated-orcid":false,"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"volume-title":"Space-and-ground integration network [M]","year":"2015","key":"e_1_3_2_1_1_1","unstructured":"LIU L X. Space-and-ground integration network [M]. Beijing: Science Press, 2015."},{"key":"e_1_3_2_1_2_1","first-page":"s3","author":"Alec Radford","year":"2018","unstructured":"Alec Radford, Karthik Narasimhan, Tim Salimans, Improving Language Understandingby Generative Pre-Training. 2018. https:\/\/s3-us-west-2.amazonaws.com\/openai-assets\/research-covers\/language-unsupervised\/language_understanding_paper.pdf","journal-title":"Improving Language Understandingby Generative Pre-Training."},{"key":"e_1_3_2_1_3_1","volume-title":"Language Models are Unsupervised Multitask Learners","author":"Alec Radford","year":"2019","unstructured":"Alec Radford, Jeffrey Wu, Rewon Child, Language Models are Unsupervised Multitask Learners. 2019. https:\/\/cdn.openai.com\/better-language-models\/language_models_are_unsupervised_multitask_learners.pdf"},{"key":"e_1_3_2_1_4_1","first-page":"43","volume-title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks [C]\/\/Proceedings of the IEEE International Conference on Intelligence and Security Informatics","author":"Wang M.","year":"2017","unstructured":"W. Wang, M.Zhu, J. Wang, X. Zeng, and Z. Yang. End-to-end encrypted traffic classification with one-dimensional convolution neural networks [C]\/\/Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2017, pp.43-48."},{"key":"e_1_3_2_1_5_1","volume-title":"A survey of techniques for internet traffic classification using machine learning [C]\/\/Proceedings of the IEEE Communications Surveys & Tutorials","author":"Nguyen G.","year":"2008","unstructured":"T. T. T. Nguyen and G. Armitage. A survey of techniques for internet traffic classification using machine learning [C]\/\/Proceedings of the IEEE Communications Surveys & Tutorials, 2008, 10(4): 56-76."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2"},{"key":"e_1_3_2_1_7_1","volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling [J]. arXiv preprint arXiv:1412.3555","author":"Chung J","year":"2014","unstructured":"Chung J, Gulcehre C, Cho K H, Empirical evaluation of gated recurrent neural networks on sequence modeling [J]. arXiv preprint arXiv:1412.3555, 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Computer network intrusion detection using sequential LSTM neural networks autoencoders [C]\/\/2018 26th signal processing and communications applications conference (SIU)","author":"Mirza A H","year":"2018","unstructured":"Mirza A H, Cosan S. Computer network intrusion detection using sequential LSTM neural networks autoencoders [C]\/\/2018 26th signal processing and communications applications conference (SIU). IEEE, 2018: 1-4."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"volume-title":"IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE","author":"Wang S","key":"e_1_3_2_1_10_1","unstructured":"Wang S, Xia C, Wang T. A novel intrusion detector based on deep learning hybrid methods [C]\/\/2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE, 2019: 300-305."},{"issue":"1","key":"e_1_3_2_1_11_1","first-page":"57","volume":"2020","author":"Traffic Prediction LSTM","unstructured":"PAN C, WANG Y, YANG L, Traffic Prediction of Space-Integrated-Ground Information Network Based on Improved LSTM Algorithm [J]. Space-Integrated-Ground Information Networks, 2020 (1): 57-65.","journal-title":"Space-Integrated-Ground Information Networks"},{"key":"e_1_3_2_1_12_1","volume-title":"deep and inductive anomalydetection [C]\/\/Joint European Conference on Machine Learning and KnowledgeDiscovery in Databases","author":"Chalapathy R","year":"2017","unstructured":"Chalapathy R,Menon A K, Chawla S. Robust, deep and inductive anomalydetection [C]\/\/Joint European Conference on Machine Learning and KnowledgeDiscovery in Databases. Springer, Cham, 2017: 36-51."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3054609"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"e_1_3_2_1_15_1","volume-title":"Attention is all you need [J]. Advances in neural information processing systems","author":"Vaswani A","year":"2017","unstructured":"Vaswani A, Shazeer N, Parmar N, Attention is all you need [J]. Advances in neural information processing systems, 2017, 30."},{"key":"e_1_3_2_1_16_1","first-page":"2988","volume-title":"Proceedings of the IEEE international conference on computer vision","author":"Tsung-Yi Lin","year":"2017","unstructured":"Tsung-Yi Lin, Priya Goyal, Ross Girshick, Kaiming He, and Piotr Dollar. Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision, pages 2980\u20132988, 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"A formal security analysis of the signal messaging protocol [C]\/\/2017 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Cohn-Gordon K","year":"2017","unstructured":"Cohn-Gordon K, Cremers C, Dowling B, A formal security analysis of the signal messaging protocol [C]\/\/2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017: 451-466."},{"key":"e_1_3_2_1_18_1","unstructured":"Revathi S Malathi A .A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection [J].ESRSA Publications 2013 (12)."},{"key":"e_1_3_2_1_19_1","volume-title":"Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security, 31(3):357\u2013374","author":"Ali Shiravi","year":"2012","unstructured":"Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali A Ghorbani. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security, 31(3):357\u2013374, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"}],"event":{"name":"ICBAR 2023: 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management","acronym":"ICBAR 2023","location":"Chengdu China"},"container-title":["Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656843","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656766.3656843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:12:55Z","timestamp":1755778375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,24]]},"references-count":20,"alternative-id":["10.1145\/3656766.3656843","10.1145\/3656766"],"URL":"https:\/\/doi.org\/10.1145\/3656766.3656843","relation":{},"subject":[],"published":{"date-parts":[[2023,11,24]]},"assertion":[{"value":"2024-06-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}