{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T06:07:15Z","timestamp":1767334035674,"version":"3.48.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/milcom64451.2025.11310724","type":"proceedings-article","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:35:33Z","timestamp":1767292533000},"page":"1494-1499","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Abnormal Network Traffic Detection via Efficient Data Generation Leveraging LLM"],"prefix":"10.1109","author":[{"given":"Changming","family":"Li","sequence":"first","affiliation":[{"name":"Rutgers University,Department of Electrical and Computer Engineering,NJ,USA"}]},{"given":"Zejun","family":"Xu","sequence":"additional","affiliation":[{"name":"Rutgers University,Department of Electrical and Computer Engineering,NJ,USA"}]},{"given":"Qiufan","family":"Ji","sequence":"additional","affiliation":[{"name":"NJIT,Department of Computer Science,Newark,NJ,USA"}]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[{"name":"NJIT,Department of Computer Science,Newark,NJ,USA"}]},{"given":"Cong","family":"Shi","sequence":"additional","affiliation":[{"name":"NJIT,Department of Computer Science,Newark,NJ,USA"}]},{"given":"Michael","family":"DeLucia","sequence":"additional","affiliation":[{"name":"Adelphi,Army Research Laboratory,MD,USA"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University,Department of Electrical and Computer Engineering,NJ,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110999"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref3","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection","volume-title":"Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS)","author":"Ring"},{"issue":"8","key":"ref4","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020856"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-64064-3_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2017.8314974"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.161"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0965-7_53"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663424"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-018-9564-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104160"},{"volume-title":"Principal component analysis for special types of data","year":"2002","author":"Jolliffe","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(01)00203-9"},{"article-title":"Language models are realistic tabular data generators","year":"2022","author":"Borisov","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3728894"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"year":"2018","key":"ref21","article-title":"Cic-ids 2018: Canadian institute for cybersecurity intrusion detection dataset"}],"event":{"name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2025,10,6]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2025,10,10]]}},"container-title":["MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11309822\/11309347\/11310724.pdf?arnumber=11310724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T06:02:22Z","timestamp":1767333742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11310724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/milcom64451.2025.11310724","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}