{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:46:36Z","timestamp":1773153996907,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T00:00:00Z","timestamp":1732060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MSIT(Ministry of Science and ICT), Korea","award":["IITP-2024-RS-2023-00259967"],"award-info":[{"award-number":["IITP-2024-RS-2023-00259967"]}]},{"name":"National Research Foundation of Korea(NRF)","award":["RS-2023-00217689, 2022R1I1A3055233"],"award-info":[{"award-number":["RS-2023-00217689, 2022R1I1A3055233"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,20]]},"DOI":"10.1145\/3698038.3698533","type":"proceedings-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T06:32:43Z","timestamp":1731565963000},"page":"111-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Zero-SAD: Zero-Shot Learning Using Synthetic Abnormal Data for Abnormal Behavior Detection on Private Cloud"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7728-2278","authenticated-orcid":false,"given":"Jae-Seok","family":"Kim","sequence":"first","affiliation":[{"name":"Pusan National University, Busan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9467-5146","authenticated-orcid":false,"given":"Joonho","family":"Seo","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5097-3439","authenticated-orcid":false,"given":"Seon-Jin","family":"Hwang","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8580-6887","authenticated-orcid":false,"given":"Jinmyeong","family":"Shin","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-5082","authenticated-orcid":false,"given":"Yoon-Ho","family":"Choi","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107202"},{"key":"e_1_3_2_1_2_1","volume-title":"Amazon Web Services. Retrieved","year":"2024","unstructured":"Amazon. 2024. Amazon Web Services. Retrieved May 2, 2024 from https:\/\/aws.amazon.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2024. AWS Shield. Retrieved May 2 2024 from https:\/\/aws.amazon.com\/shield\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Jinwon An and Sungzoon Cho. 2015. Variational Autoencoder based Anomaly Detection using Reconstruction Probability. https:\/\/api.semanticscholar.org\/CorpusID:36663713"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Gundeep Arora Vinay Verma Ashish Mishra and Piyush Rai. 2017. Generalized Zero-Shot Learning via Synthesized Examples. https:\/\/doi.org\/10.1109\/CVPR.2018.00450","DOI":"10.1109\/CVPR.2018.00450"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of ICML workshop on unsupervised and transfer learning. JMLR Workshop and Conference Proceedings, 37--49","author":"Baldi Pierre","year":"2012","unstructured":"Pierre Baldi. 2012. Autoencoders, unsupervised learning, and deep architectures. In Proceedings of ICML workshop on unsupervised and transfer learning. JMLR Workshop and Conference Proceedings, 37--49."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1219092.1219093"},{"key":"e_1_3_2_1_8_1","unstructured":"Soumick Chatterjee Alessandro Sciarra Max D\u00fcnnwald Shubham Agrawal Pavan Tummala Disha Setlur Aman Kalra Aishwarya Jauhari Steffen Oeltze-Jafra Oliver Speck and Andreas N\u00fcrnberger. 2021. Unsupervised reconstruction based anomaly detection using a Variational Auto Encoder."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Hao Chen Ruizhi Xiao and Shuyuan Jin. 2020. Real-time detection of cloud tenant malicious behavior based on CNN. In 2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications Big Data & Cloud Computing Sustainable Computing & Communications Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). 998--1005. https:\/\/doi.org\/10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00151","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00151"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188913.1188915"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"MITRE Corporation","year":"2024","unstructured":"MITRE Corporation. 2024. Common Vulnerabilities and Exposures (CVE). Retrieved June 13, 2024 from https:\/\/www.cve.org\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"MITRE Corporation","year":"2024","unstructured":"MITRE Corporation. 2024. MITRE ATT&CK. Retrieved June 13, 2024 from https:\/\/attack.mitre.org\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3225753"},{"key":"e_1_3_2_1_16_1","unstructured":"T. P. Lillicrap et al. 2015. Continuous Control with Deep Reinforcement Learning. arXiv preprint arXiv:1509.02971 (2015)."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of the 35th ICML (2018","author":"Fujimoto S.","year":"1802","unstructured":"S. Fujimoto, H. V. Hoof, and D. Meger. 2018. Addressing Function Approximation Error in Actor-Critic Methods. Proc. of the 35th ICML (2018). arXiv:1802.09477 [cs.LG]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.45"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2024. Cloud Armor. Retrieved May 2 2024 from https:\/\/cloud.google.com\/security\/products\/armor"},{"key":"e_1_3_2_1_20_1","volume-title":"Google Cloud Platform. Retrieved","year":"2024","unstructured":"Google. 2024. Google Cloud Platform. Retrieved May 2, 2024 from https:\/\/cloud.google.com\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jiayi Guo Chaofei Wang You Wu Eric Zhang Kai Wang Xingqian Xu Shiji Song Humphrey Shi and Gao Huang. 2023. Zero-shot Generative Model Adaptation via Image-specific Prompt Learning. arXiv:2304.03119 [cs.CV] https:\/\/arxiv.org\/abs\/2304.03119","DOI":"10.1109\/CVPR52729.2023.01106"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027736"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053558"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of the 2021 IEEE\/RSJ IROS. Prague, Czech Republic.","author":"Meng L.","unstructured":"L. Meng, R. Gorbet, and D. Kuli\u0107. 2021. Memory-based Deep Reinforcement Learning for POMDPs. In Proc. of the 2021 IEEE\/RSJ IROS. Prague, Czech Republic."},{"key":"e_1_3_2_1_25_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. arXiv:1301.3781 [cs.CL] https:\/\/arxiv.org\/abs\/1301.3781"},{"key":"e_1_3_2_1_26_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. arXiv:1310.4546 [cs.CL] https:\/\/arxiv.org\/abs\/1310.4546"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118297"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved","year":"2024","unstructured":"Oracle. 2024. Oracle VM VirtualBox. Retrieved April 11, 2024 from https:\/\/www.virtualbox.org\/"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3191696"},{"key":"e_1_3_2_1_30_1","volume-title":"Retrieved","author":"Audit Project The Linux","year":"2024","unstructured":"The Linux Audit Project. 2024. Audit. Retrieved January 21, 2024 from https:\/\/github.com\/linux-audit"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"2161","author":"Romera-Paredes Bernardino","year":"2015","unstructured":"Bernardino Romera-Paredes and Philip Torr. 2015. An embarrassingly simple approach to zero-shot learning. In Proceedings of the 32nd International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 37), Francis Bach and David Blei (Eds.). PMLR, Lille, France, 2152--2161. https:\/\/proceedings.mlr.press\/v37\/romera-paredes15.html"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"4402","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep One-Class Classification. In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 80), Jennifer Dy and Andreas Krause (Eds.). PMLR, 4393--4402. https:\/\/proceedings.mlr.press\/v80\/ruff18a.html"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108519"},{"key":"e_1_3_2_1_34_1","volume-title":"Retrieved","year":"2024","unstructured":"Ubuntu. 2024. Linux system calls. Retrieved Jan 21, 2024 from https:\/\/manpages.ubuntu.com\/manpages\/focal\/en\/man2\/syscalls.2.html"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","unstructured":"M. Wang Z. Zhang J. Liu L. Duan and C. Liu. 2020. Deep Unsupervised Workload Sequence Anomaly Detection with Fusion of Spatial and Temporal Features in the Cloud. In 2020 IEEE 13th International Conference on Cloud Computing (CLOUD). IEEE Computer Society Los Alamitos CA USA 141--148. https:\/\/doi.org\/10.1109\/CLOUD49709.2020.00032","DOI":"10.1109\/CLOUD49709.2020.00032"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Yulong Wang Xingshu Chen Qixu Wang Run Yang and Bangzhou Xin. 2022. Unsupervised Anomaly Detection for Container Cloud Via BILSTM-Based Variational Auto-Encoder. In ICASSP 2022 - 2022 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). 3024--3028. https:\/\/doi.org\/10.1109\/ICASSP43922.2022.9747341","DOI":"10.1109\/ICASSP43922.2022.9747341"},{"key":"e_1_3_2_1_37_1","volume-title":"Retrieved","year":"2024","unstructured":"Wikipedia. 2024. Kernel Density Estimation. Retrieved April 13, 2024 from https:\/\/en.wikipedia.org\/wiki\/Kernel_density_estimation"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD55607.2022.00039"}],"event":{"name":"SoCC '24: ACM Symposium on Cloud Computing","location":"Redmond WA USA","acronym":"SoCC '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698038.3698533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3698038.3698533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:57:56Z","timestamp":1755889076000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698038.3698533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,20]]},"references-count":39,"alternative-id":["10.1145\/3698038.3698533","10.1145\/3698038"],"URL":"https:\/\/doi.org\/10.1145\/3698038.3698533","relation":{},"subject":[],"published":{"date-parts":[[2024,11,20]]},"assertion":[{"value":"2024-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}