Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The architecture of TICL.

The complete workflow proceeds as follows: 1) Sample edges in the original graph and perform edge interpolation; 2) Using augmented data for contrastive learning; 3) Input the original graph into the GNN model to update the edge attributes; 4) Combining contrastive learning with the edge information learned by the GNN model for traffic detection.

More »

Fig 1 Expand

Table 1.

Summary of dataset properties.

More »

Table 1 Expand

Table 2.

Performance of the intrusion detection task for different training set split ratios, expressed as macro-f1 and standard deviation.

More »

Table 2 Expand

Fig 2.

Performance comparison of different methods under various data partitioning schemes.

More »

Fig 2 Expand

Table 3.

Performance of the intrusion detection task in the migration scenario, expressed as macro f1 and standard deviation.

More »

Table 3 Expand

Fig 3.

Impact of different sampling sizes in the interpolation method on model performance.

More »

Fig 3 Expand

Fig 4.

Impact of different graph construction method on model performance.

More »

Fig 4 Expand

Fig 5.

Impact of different graph ratio on model performance.

More »

Fig 5 Expand