{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:57Z","timestamp":1750309557282,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Industrial Technology Infrastructure Public Service Platform Project Public Service Platform for Urban Rail Transit Equipment Signal System Testing and Safety Evaluation","award":["No. 2022-233-225"],"award-info":[{"award-number":["No. 2022-233-225"]}]},{"name":"science and technology innovation project of Hunan Province","award":["No.2023RC4014"],"award-info":[{"award-number":["No.2023RC4014"]}]},{"name":"Ministry of Industry and Information Technology of China, and National Key Research and Development Program of China","award":["No.2022YFB43012, No.2023YFB3307500"],"award-info":[{"award-number":["No.2022YFB43012, No.2023YFB3307500"]}]},{"name":"NSFC Program","award":["No. 6212780016, 62021002"],"award-info":[{"award-number":["No. 6212780016, 62021002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714960","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"1166-1181","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FG-CIBGC: A Unified Framework for Fine-Grained and Class-Incremental Behavior Graph Classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9218-9421","authenticated-orcid":false,"given":"Zhibin","family":"Ni","sequence":"first","affiliation":[{"name":"KLISS, School of Software, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6366-9421","authenticated-orcid":false,"given":"Pan","family":"Fan","sequence":"additional","affiliation":[{"name":"KLISS, School of Software, Tsinghua University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5703-8029","authenticated-orcid":false,"given":"Shengzhuo","family":"Dai","sequence":"additional","affiliation":[{"name":"KLISS, School of Software, Tsinghua University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0123-6632","authenticated-orcid":false,"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[{"name":"KLISS, School of Software, Tsinghua University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9608-5808","authenticated-orcid":false,"given":"Hai","family":"Wan","sequence":"additional","affiliation":[{"name":"KLISS, School of Software, Tsinghua University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6168-7016","authenticated-orcid":false,"given":"Xibin","family":"Zhao","sequence":"additional","affiliation":[{"name":"KLISS, School of Software, Tsinghua University, BeiJing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614899"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411953"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00067"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_2_1_5_1","first-page":"1877","article-title":"Language Models are Few-Shot Learners","volume":"33","author":"Brown Tom","year":"2020","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, Rewon Child, Aditya Ramesh, Daniel Ziegler, Jeffrey Wu, Clemens Winter, Chris Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish, Alec Radford, Ilya Sutskever, and Dario Amodei. 2020. Language Models are Few-Shot Learners. In Advances in Neural Information Processing Systems, Vol. 33. 1877--1901.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_6_1","unstructured":"DARPA. 2014. Transparent Computing Engagement 3 Data Release. https: \/\/github.com\/darpa-i2o\/Transparent-Computing\/blob\/master\/README-E3.md"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3056071"},{"key":"e_1_3_2_1_8_1","volume-title":"Back-Propagating System Dependency Impact for Attack Investigation. In USENIX Security Symposium. 2461--2478","author":"Fang Pengcheng","year":"2022","unstructured":"Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, and Xusheng Xiao. 2022. Back-Propagating System Dependency Impact for Attack Investigation. In USENIX Security Symposium. 2461--2478."},{"key":"e_1_3_2_1_9_1","volume-title":"2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 859--863","author":"Fariha Asma","year":"2024","unstructured":"Asma Fariha, Vida Gharavian, Masoud Makrehchi, Shahryar Rahnamayan, Sanaa Alwidian, and Akramul Azim. 2024. Log Anomaly Detection by Leveraging LLMBased Parsing and Embedding with Attention Mechanism. In 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 859--863."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium. 639--656","author":"Gao Peng","year":"2018","unstructured":"Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R Kulkarni, and Prateek Mittal. 2018. SAQL: A stream-based query system for Real-Time abnormal system behavior detection. In USENIX Security Symposium. 639--656."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24830"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00096"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium. 487--504","author":"Hossain Md Nahid","year":"2017","unstructured":"Md Nahid Hossain, Sadegh M Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R Sekar, Scott Stoller, and VN Venkatakrishnan. 2017. SLEUTH: Realtime attack scenario reconstruction from COTS audit data. In USENIX Security Symposium. 487--504."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00064"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179405"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567990"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643733"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516731"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2773081"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17049"},{"key":"e_1_3_2_1_23_1","volume-title":"TP-GNN: Continuous Dynamic Graph Neural Network for Graph Classification. In 2024 IEEE 40th International Conference on Data Engineering (ICDE). IEEE, 2848--2861","author":"Liu Jie","year":"2024","unstructured":"Jie Liu, Jiamou Liu, Kaiqi Zhao, Yanni Tang, and Wu Chen. 2024. TP-GNN: Continuous Dynamic Graph Neural Network for Graph Classification. In 2024 IEEE 40th International Conference on Data Engineering (ICDE). IEEE, 2848--2861."},{"key":"e_1_3_2_1_24_1","volume-title":"What Makes Good In-Context Examples for GPT-3? arXiv preprint arXiv:2101.06804","author":"Liu Jiachang","year":"2021","unstructured":"Jiachang Liu, Dinghan Shen, Yizhe Zhang, Bill Dolan, Lawrence Carin, and Weizhu Chen. 2021. What Makes Good In-Context Examples for GPT-3? arXiv preprint arXiv:2101.06804 (2021)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570446"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643916.3644408"},{"key":"e_1_3_2_1_27_1","volume-title":"Gradient episodic memory for continual learning. Advances in Neural Information Processing Systems 30","author":"Lopez-Paz David","year":"2017","unstructured":"David Lopez-Paz and Marc'Aurelio Ranzato. 2017. Gradient episodic memory for continual learning. Advances in Neural Information Processing Systems 30 (2017)."},{"key":"e_1_3_2_1_28_1","volume-title":"International conference on machine learning. PMLR, 4212--4221","author":"Ma Jianxin","year":"2019","unstructured":"Jianxin Ma, Peng Cui, Kun Kuang, XinWang, andWenwu Zhu. 2019. Disentangled graph convolutional networks. In International conference on machine learning. PMLR, 4212--4221."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939783"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363217"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00026"},{"key":"e_1_3_2_1_32_1","volume-title":"Wong Swee Liang, and Yuan Yidi","author":"Pan Jonathan","year":"2024","unstructured":"Jonathan Pan, Wong Swee Liang, and Yuan Yidi. 2024. RAGLog: Log Anomaly Detection using Retrieval Augmented Generation. In 2024 IEEE World Forum on Public Safety Technology (WFPST). IEEE, 169--174."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991122"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614932"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663841"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772862"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3652106"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243763"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623326"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639155"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412754"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833632"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978378"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24445"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24549"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833669"},{"key":"e_1_3_2_1_48_1","volume-title":"LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. In MILCOM IEEE Military Communications Conference. 292--297","author":"Zhang Huan","year":"2022","unstructured":"Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, and Dan Meng. 2022. LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. In MILCOM IEEE Military Communications Conference. 292--297."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3186909"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671810"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16602"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3201379"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14778\/2856318.2856320"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:54Z","timestamp":1750295934000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":53,"alternative-id":["10.1145\/3696410.3714960","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714960","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}