{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:02:34Z","timestamp":1771074154785,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","funder":[{"name":"National Key R\\\\&D Project of China","award":["2023YFB3308501"],"award-info":[{"award-number":["2023YFB3308501"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,19]]},"DOI":"10.1145\/3788731.3788735","type":"proceedings-article","created":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T11:49:28Z","timestamp":1771069768000},"page":"22-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A-UEBA: An Anomaly Heterogeneity Learning Framework Based on Multi-Endpoint User and Entity Behavior Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6450-2005","authenticated-orcid":false,"given":"Xiaotong","family":"Chen","sequence":"first","affiliation":[{"name":"Southwest Jiaotong University, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4990-2381","authenticated-orcid":false,"given":"Linfu","family":"Sun","sequence":"additional","affiliation":[{"name":"Southwest Jiaotong University, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8114-5177","authenticated-orcid":false,"given":"He","family":"Wang","sequence":"additional","affiliation":[{"name":"Tiangong University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0183-2143","authenticated-orcid":false,"given":"Tong","family":"Gu","sequence":"additional","affiliation":[{"name":"Southwest Jiaotong University, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0360-4825","authenticated-orcid":false,"given":"Zhiqiang","family":"Jiang","sequence":"additional","affiliation":[{"name":"Southwest Jiaotong University, Chengdu, Sichuan, China"}]}],"member":"320","published-online":{"date-parts":[[2026,2,14]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Pierpaolo Artioli et\u00a0al. 2024. A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics. Frontiers in Big Data 7 (May 2024) 1375818.","DOI":"10.3389\/fdata.2024.1375818"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481955"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Varun Chandola Arindam Banerjee and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41 3 Article 15 (July 2009) 58\u00a0pages.","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01168"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Jingyang Cui Guanghua Zhang Zhenguo Chen and Naiwen Yu. 2022. Multi-homed abnormal behavior detection algorithm based on fuzzy particle swarm cluster in user and entity behavior analytics. Scientific Reports 12 1 (2022) 22349.","DOI":"10.1038\/s41598-022-26142-w"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Jingyang Cui Guanghua Zhang Zhenguo Chen and Naiwen Yu. 2022. Multi-homed abnormal behavior detection algorithm based on fuzzy particle swarm cluster in user and entity behavior analytics. Scientific Reports 12 1 (2022) 22349.","DOI":"10.1038\/s41598-022-26142-w"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Leyan Deng Defu Lian Zhenya Huang and Enhong Chen. 2022. Graph Convolutional Adversarial Networks for Spatiotemporal Anomaly Detection. IEEE Transactions on Neural Networks and Learning Systems 33 6 (2022) 2416\u20132428.","DOI":"10.1109\/TNNLS.2021.3136171"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"D.E. Denning. 1987. An Intrusion-Detection Model. IEEE Transactions on Software Engineering SE-13 2 (1987) 222\u2013232.","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"D.E. Denning. 1987. An Intrusion-Detection Model. IEEE Transactions on Software Engineering SE-13 2 (1987) 222\u2013232.","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Shiyuan Fu Xin Gao Feng Zhai Baofeng Li Bing Xue Jiahao Yu Zhihang Meng and Guangyao Zhang. 2024. A time series anomaly detection method based on series-parallel transformers with spatial and temporal association discrepancies. Information Sciences 657 (2024) 119978.","DOI":"10.1016\/j.ins.2023.119978"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Jinfang Jiang Guangjie Han Li liu Lei Shu and Mohsen Guizani. 2020. Outlier Detection Approaches Based on Machine Learning in the Internet-of-Things. IEEE Wireless Communications 27 3 (2020) 53\u201359.","DOI":"10.1109\/MWC.001.1900410"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3501247.3531592"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Matan Levi Itay Hazan Noga Agmon and Sagi Eden. 2022. Behavioral embedding for continuous user verification in global settings. Computers & Security 119 (2022) 102716.","DOI":"10.1016\/j.cose.2022.102716"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Datong Li Jun Lu Tongkang Zhang and Jinliang Ding. 2024. Self-Supervised Learning and Multisource Heterogeneous Information Fusion Based Quality Anomaly Detection for Heavy-Plate Shape. IEEE Transactions on Automation Science and Engineering 21 2 (2024) 1223\u20131234.","DOI":"10.1109\/TASE.2023.3265649"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS60453.2023.00055"},{"key":"e_1_3_3_2_17_2","unstructured":"Brian Lindauer. 2020. Insider Threat Test Dataset. Dataset."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Alejandro\u00a0G. Mart\u00edn Marta Beltr\u00e1n Alberto Fern\u00e1ndez-Isabel and Isaac Mart\u00edn de Diego. 2021. An approach to detect user behaviour anomalies within identity federations. Computers & Security 108 (2021) 102356.","DOI":"10.1016\/j.cose.2021.102356"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Guansong Pang Chunhua Shen Longbing Cao and Anton Van\u00a0Den Hengel. 2021. Deep Learning for Anomaly Detection: A Review. ACM Comput. Surv. 54 2 Article 38 (March 2021) 38\u00a0pages.","DOI":"10.1145\/3439950"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Guo Pu Lijuan Wang Jun Shen and Fang Dong. 2021. A hybrid unsupervised clustering-based anomaly detection method. Tsinghua Science and Technology 26 2 (2021) 146\u2013153.","DOI":"10.26599\/TST.2019.9010051"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurityHPSCIDS52275.2021.00025"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Gayathri R.G. Atul Sajjanhar and Yong Xiang. 2024. Hybrid deep learning model using SPCAGAN augmentation for insider threat analysis. Expert Systems with Applications 249 (2024) 123533.","DOI":"10.1016\/j.eswa.2024.123533"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SysSec.2011.16"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"R.S. Sandhu E.J. Coyne H.L. Feinstein and C.E. Youman. 1996. Role-based access control models. Computer 29 2 (1996) 38\u201347.","DOI":"10.1109\/2.485845"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3406601.3406610"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840805"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Cong Wang Yanru Xiao Xing Gao Li Li and Jun Wang. 2023. A Framework for Behavioral Biometric Authentication Using Deep Metric Learning on Mobile Devices. IEEE Transactions on Mobile Computing 22 1 (2023) 19\u201336.","DOI":"10.1109\/TMC.2021.3072608"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Kang Wei Jun Li Ming Ding Chuan Ma Hang Su Bo Zhang and H.\u00a0Vincent Poor. 2022. User-Level Privacy-Preserving Federated Learning: Analysis and Performance Optimization. IEEE Transactions on Mobile Computing 21 9 (2022) 3388\u20133401.","DOI":"10.1109\/TMC.2021.3056991"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE50968.2020.00112"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01668"}],"event":{"name":"EILM 2025: 2025 International Conference on Embodied Intelligence and Large Models","location":"Chengdu China","acronym":"EILM 2025"},"container-title":["Proceedings of the 2025 International Conference on Embodied Intelligence and Large Models"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3788731.3788735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T12:09:50Z","timestamp":1771070990000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3788731.3788735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,19]]},"references-count":29,"alternative-id":["10.1145\/3788731.3788735","10.1145\/3788731"],"URL":"https:\/\/doi.org\/10.1145\/3788731.3788735","relation":{},"subject":[],"published":{"date-parts":[[2025,12,19]]},"assertion":[{"value":"2026-02-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}