{"id":"https://openalex.org/W4411551229","doi":"https://doi.org/10.1109/cscwd64889.2025.11033479","title":"ET-Former: Robust Transformer-Based Representation for Encrypted Traffic Classification","display_name":"ET-Former: Robust Transformer-Based Representation for Encrypted Traffic Classification","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4411551229","doi":"https://doi.org/10.1109/cscwd64889.2025.11033479"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd64889.2025.11033479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102009768","display_name":"Changhao Wu","orcid":"https://orcid.org/0000-0003-3162-9306"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Changhao Wu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100712546","display_name":"Lixin Zhao","orcid":"https://orcid.org/0009-0004-0566-791X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixin Zhao","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101522685","display_name":"Aimin Yu","orcid":"https://orcid.org/0000-0002-5521-4757"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aimin Yu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101775555","display_name":"Lijun Cai","orcid":"https://orcid.org/0000-0002-8538-5602"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lijun Cai","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101525319","display_name":"Dan Meng","orcid":"https://orcid.org/0000-0003-1980-9283"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Meng","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyberspace Security, University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102009768"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07801935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"44","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9563999772071838,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9434000253677368,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6819450259208679},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5990980863571167},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5038358569145203},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4302799105644226},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3298737108707428},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2857424020767212},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14572513103485107},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1316928267478943},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.06161242723464966}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6819450259208679},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5990980863571167},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5038358569145203},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4302799105644226},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3298737108707428},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2857424020767212},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14572513103485107},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1316928267478943},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.06161242723464966}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd64889.2025.11033479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2045732268","https://openalex.org/W2131757333","https://openalex.org/W2135579486","https://openalex.org/W2272516773","https://openalex.org/W2343828539","https://openalex.org/W2560100125","https://openalex.org/W2591712613","https://openalex.org/W2606697812","https://openalex.org/W2620689220","https://openalex.org/W2783320270","https://openalex.org/W2808420356","https://openalex.org/W2897202622","https://openalex.org/W2913746382","https://openalex.org/W2919493784","https://openalex.org/W2922705140","https://openalex.org/W2963403784","https://openalex.org/W2963516518","https://openalex.org/W2963704216","https://openalex.org/W2970390493","https://openalex.org/W3007562398","https://openalex.org/W3114936184","https://openalex.org/W3120227884","https://openalex.org/W3134226201","https://openalex.org/W3152879672","https://openalex.org/W4211242407","https://openalex.org/W4224315052","https://openalex.org/W4385245566","https://openalex.org/W6755207826","https://openalex.org/W6768021236","https://openalex.org/W6784333009"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Encrypted":[0],"traffic":[1,8,50,58,70,82,110],"classification":[2,46,111],"requires":[3],"capturing":[4],"robust":[5],"and":[6,16,25,40,87,120],"effective":[7],"representations":[9,55,78],"from":[10,83],"data":[11,36,51,86,97],"that":[12],"lack":[13],"explicit":[14],"patterns":[15],"clear":[17],"semantics,":[18],"which":[19],"is":[20],"crucial":[21],"for":[22,98],"network":[23],"management":[24],"cybersecurity.":[26],"Existing":[27],"methods":[28],"heavily":[29],"rely":[30],"on":[31],"large":[32],"amounts":[33],"of":[34,56,79,95,107],"labeled":[35,96],"or":[37],"expert-designed":[38],"features":[39,115],"struggle":[41],"to":[42,52],"generalize":[43],"across":[44],"different":[45],"scenarios.":[47],"Leveraging":[48],"unlabeled":[49,85],"learn":[53],"universal":[54,77],"encrypted":[57,81,109],"remains":[59],"a":[60,68,92],"key":[61],"challenge.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66],"propose":[67],"novel":[69],"representation":[71],"model":[72],"called":[73],"ET-Former.":[74],"ET-Former":[75,101],"learns":[76],"various":[80],"large-scale":[84],"can":[88],"be":[89],"fine-tuned":[90],"with":[91],"small":[93],"amount":[94],"specific":[99],"tasks.":[100],"achieves":[102],"state-of-the-art":[103],"performance":[104],"in":[105],"four":[106],"five":[108],"tasks,":[112],"demonstrating":[113],"exciting":[114],"such":[116],"as":[117],"robustness,":[118],"generalization,":[119],"accuracy.":[121]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
