{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:53:52Z","timestamp":1768031632040,"version":"3.49.0"},"reference-count":42,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.054558","type":"journal-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T20:40:12Z","timestamp":1727296812000},"page":"327-343","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data"],"prefix":"10.32604","volume":"81","author":[{"given":"Gang","family":"Long","sequence":"first","affiliation":[]},{"given":"Zhaoxin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1109\/TCE.2023.3342644","article-title":"Privacy-preserving federated learning approach for distributed malware attacks with intermittent clients and image representation","volume":"70","author":"Ullah","year":"Feb. 2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1109\/TCE.2023.3328320","article-title":"NIDS-VSB: Network intrusion detection system for VANET using spark-based big data optimization and transfer learning","volume":"70","author":"Ullah","year":"Feb. 2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","article-title":"IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic","volume":"10","author":"Ullah","year":"Feb. 2024","journal-title":"Digit. Commun. Netw."},{"key":"ref4","first-page":"1","article-title":"Using imbalanced triangle synthetic data for machine learning anomaly detection","volume":"58","author":"Luo","year":"Jan. 2019","journal-title":"Comput. Mater. Contin."},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117030","article-title":"A multi-stream deep neural network with late fuzzy fusion for real-world anomaly detection","volume":"201","author":"Thakare","year":"Sep. 2022","journal-title":"Expert. Syst. Appl."},{"key":"ref6","series-title":"IEEE INFOCOM 2023-IEEE Conf. on Comput. Commun.","first-page":"1","article-title":"Federated PCA on Grassmann manifold for anomaly detection in IoT networks","author":"Nguyen","year":"May 2023"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"6324","DOI":"10.1007\/s00034-023-02410-6","article-title":"Distributed estimation with novel adaptive data selection based on a cross-matching mechanism","volume":"42","author":"Wan","year":"Oct. 2023","journal-title":"Circuits Syst. Signal Process."},{"key":"ref8","first-page":"21394","article-title":"Personalized federated learning with Moreau envelopes","author":"Dinh","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref9","first-page":"1","article-title":"Poison-resilient anomaly detection: Mitigating poisoning attacks in semi-supervised encrypted traffic anomaly detection","volume":"1","author":"Wu","year":"May 2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2978","DOI":"10.1109\/TNSE.2022.3163144","article-title":"TSMAE: A novel anomaly detection approach for Internet of Things time series data using memory-augmented autoencoder","volume":"10","author":"Gao","year":"Sep.\u2013Oct. 2023","journal-title":"IEEE Trans. on Netw. Sci. Eng."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/TKDE.2018.2882404","article-title":"Anomaly detection using local kernel density estimation and context-based regression","volume":"32","author":"Hu","year":"Feb. 2020","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1109\/TCYB.2018.2804940","article-title":"Distributed online one-class support vector machine for anomaly detection over networks","volume":"49","author":"Miao","year":"Apr. 2019","journal-title":"IEEE Trans. Cybern."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"12181","DOI":"10.1109\/TKDE.2022.3159580","article-title":"ECOD: Unsupervised outlier detection using empirical cumulative distribution functions","volume":"35","author":"Li","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref14","series-title":"2020 IEEE Int. Conf. on Data Mining (ICDM)","first-page":"1118","article-title":"COPOD: Copula-based outlier detection","author":"Li","year":"2020"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2133360.2133363","article-title":"Isolation-based anomaly detection","volume":"6","author":"Liu","year":"2012","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref16","first-page":"463","article-title":"SUOD: Accelerating large-scale unsupervised heterogeneous outlier detection","volume":"3","author":"Zhao","year":"2021","journal-title":"Proc. of Mach. Learn. Syst."},{"key":"ref17","series-title":"Netw. Distrib. Syst. Security Symp.","first-page":"1","article-title":"Kitsune: An ensemble of autoencoders for online network intrusion detection","author":"Mirsky","year":"2018"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"3074","DOI":"10.1109\/TCYB.2018.2838668","article-title":"Learning neural representations for network anomaly detection","volume":"49","author":"Cao","year":"Aug. 2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref19","first-page":"1","article-title":"Mobile crowdsourcing task allocation based on dynamic self-attention GANs","volume":"79","author":"Wei","year":"Apr. 2024","journal-title":"Comput. Mater. Contin."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3439","DOI":"10.1109\/TCSVT.2023.3325451","article-title":"Multi-branch GAN-based abnormal events detection via context learning in surveillance videos","volume":"34","author":"Li","year":"May 2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref21","first-page":"387","article-title":"MGFN: Magnitude-contrastive glance-and-focus network for weakly-supervised video anomaly detection","volume":"37","author":"Chen","year":"2023","journal-title":"Proc. AAAI Conf. on Artif. Intell."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2024.111978","article-title":"VPE-WSVAD: Visual prompt exemplars for weakly-supervised video anomaly detection","volume":"299","author":"Su","year":"May 2024","journal-title":"Knowl.-Based Syst."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"3551","DOI":"10.1109\/TPWRD.2023.3279891","article-title":"Detection of foreign objects intrusion into transmission lines using diverse generation model","volume":"38","author":"Wu","year":"Oct. 2023","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"4119","DOI":"10.1109\/TNSM.2021.3125967","article-title":"Log sequence anomaly detection based on local information extraction and globally sparse transformer model","volume":"18","author":"Zhang","year":"Dec. 2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2064","DOI":"10.1109\/TNSM.2020.3034647","article-title":"HitAnomaly: Hierarchical transformers for anomaly detection in system log","volume":"17","author":"Huang","year":"Dec. 2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2200","DOI":"10.1109\/TII.2022.3199228","article-title":"Masked Swin Transformer Unet for industrial anomaly detection","volume":"19","author":"Jiang","year":"Feb. 2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref27","first-page":"1","article-title":"A recurrent latent variable model for sequential data","volume":"28","author":"Chung","year":"2015","journal-title":"Proc. NIPS"},{"key":"ref28","series-title":"Proc. ICLR","first-page":"1","article-title":"Auto-encoding variational Bayes","author":"Kingma","year":"Dec. 2013"},{"key":"ref29","first-page":"1310","article-title":"On the difficulty of training recurrent neural networks","volume":"28","author":"Pascanu","year":"2013","journal-title":"Int. Conf. on Mach. Learn."},{"key":"ref30","first-page":"1","article-title":"CatBoost: Unbiased boosting with categorical features","author":"Prokhorenkova","year":"2018","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref31","first-page":"1","article-title":"Resilient distributed information fusion under multiple malicious attacks","volume":"1","author":"Hua","year":"Jun. 2024","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2024.124392","article-title":"Anomalies cannot materialize or vanish out of thin air: A hierarchical multiple instance learning with position-scale awareness for video anomaly detection","volume":"254","author":"Su","year":"Jun. 2024","journal-title":"Expert. Syst. Appl."},{"key":"ref33","first-page":"5262","article-title":"Distributed estimation with adaptive cluster learning over asynchronous data fusion","volume":"59","author":"Hua","year":"Mar. 2023","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/TCSS.2020.2970805","article-title":"Deep representation learning with full center loss for credit card fraud detection","volume":"7","author":"Li","year":"Apr. 2020","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1109\/TCSS.2021.3074175","article-title":"Two-level attention model of representation learning for fraud detection","volume":"8","author":"Cao","year":"Dec. 2021","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref36","doi-asserted-by":"crossref","first-page":"5735","DOI":"10.1109\/TNNLS.2022.3208967","article-title":"Learning transactional behavioral representations for credit card fraud detection","volume":"35","author":"Xie","year":"Apr. 2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/TRPMS.2018.2890359","article-title":"Deep learning-based image segmentation on multimodal medical imaging","volume":"3","author":"Guo","year":"Mar. 2019","journal-title":"IEEE Trans. Radiat. Plasma Med. Sci."},{"key":"ref38","doi-asserted-by":"crossref","first-page":"56893","DOI":"10.1109\/ACCESS.2021.3072126","article-title":"Improving data generalization with variational autoencoders for network traffic anomaly detection","volume":"9","author":"Monshizadeh","year":"2021","journal-title":"IEEE Access"},{"key":"ref39","first-page":"1","article-title":"BAE: Anomaly detection algorithm based on clustering and autoencoder","volume":"11","author":"Wang","year":"2023","journal-title":"Mathematics"},{"key":"ref40","first-page":"1","article-title":"One-class LSTM network for anomalous network traffic detection","volume":"12","author":"Li","year":"May 2022","journal-title":"Appl. Sci."},{"key":"ref41","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","article-title":"An empirical comparison of botnet detection methods","volume":"45","author":"Garcia","year":"2014","journal-title":"Comput. Security"},{"key":"ref42","series-title":"2020 IEEE Int. Conf. Depend. Auton. Secure Comput., Int. Conf. Pervas. Intell. Comput., Int. Conf. Cloud Big Data Comput., Int. Conf. Cyber Sci. Technol. Cong. (DASC\/PiCom\/CBDCom\/CyberSciTech)","first-page":"63","article-title":"Detection of DoH tunnels using time-series classification of encrypted traffic","author":"Montazeri Shatoori","year":"2020"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_54558\/TSP_CMC_54558.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:34:12Z","timestamp":1741314852000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.054558","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-05-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}