{"id":"https://openalex.org/W3008331621","doi":"https://doi.org/10.1109/globecom38437.2019.9014099","title":"A Multi-View Deep Learning Model for Encrypted Website Service Classification","display_name":"A Multi-View Deep Learning Model for Encrypted Website Service Classification","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3008331621","doi":"https://doi.org/10.1109/globecom38437.2019.9014099","mag":"3008331621"},"language":"en","primary_location":{"id":"doi:10.1109/globecom38437.2019.9014099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9014099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007588076","display_name":"Kaiqi Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaiqi Liang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052269317","display_name":"Gaopeng Gou","orcid":"https://orcid.org/0000-0002-3533-4874"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaopeng Gou","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023971852","display_name":"Cuicui Kang","orcid":"https://orcid.org/0009-0006-8285-0843"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cuicui Kang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353359","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0003-3094-8153"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083369457","display_name":"Min Yang","orcid":"https://orcid.org/0000-0001-7345-5071"},"institutions":[{"id":"https://openalex.org/I4210145761","display_name":"Shenzhen Institutes of Advanced Technology","ror":"https://ror.org/04gh4er46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210145761"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yang","raw_affiliation_strings":["Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210145761"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101652862","display_name":"Yu Guo","orcid":"https://orcid.org/0000-0002-5489-8288"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Guo","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5007588076"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.60329097,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"3361","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7914082407951355},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6184775829315186},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5731968879699707},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5421439409255981},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5387471914291382},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5274049639701843},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.526009202003479},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5231417417526245},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.503051221370697},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.48773035407066345},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46087533235549927},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.45852982997894287},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41280290484428406},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3856213688850403},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36122679710388184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0897304117679596}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7914082407951355},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6184775829315186},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5731968879699707},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5421439409255981},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5387471914291382},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5274049639701843},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.526009202003479},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5231417417526245},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.503051221370697},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.48773035407066345},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46087533235549927},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.45852982997894287},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41280290484428406},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3856213688850403},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36122679710388184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0897304117679596},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom38437.2019.9014099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9014099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1538131130","https://openalex.org/W1775772884","https://openalex.org/W2008279017","https://openalex.org/W2064675550","https://openalex.org/W2122226347","https://openalex.org/W2131774270","https://openalex.org/W2149280729","https://openalex.org/W2149600645","https://openalex.org/W2150702922","https://openalex.org/W2171634548","https://openalex.org/W2272516773","https://openalex.org/W2605422749","https://openalex.org/W2754353227","https://openalex.org/W2783301790","https://openalex.org/W2903379676","https://openalex.org/W2915004662","https://openalex.org/W2963065250","https://openalex.org/W2963270948","https://openalex.org/W3103367901","https://openalex.org/W4294065829","https://openalex.org/W6632100814","https://openalex.org/W6682188453","https://openalex.org/W6693724512","https://openalex.org/W6719796978"],"related_works":["https://openalex.org/W2931688134","https://openalex.org/W2377919138","https://openalex.org/W2378857091","https://openalex.org/W2999756192","https://openalex.org/W103652678","https://openalex.org/W3017323575","https://openalex.org/W2179036394","https://openalex.org/W4206905835","https://openalex.org/W1568303756","https://openalex.org/W2613715541"],"abstract_inverted_index":{"This":[0],"paper":[1,84],"presents":[2],"a":[3,63,87,113],"multi-view":[4,29,72],"deep":[5,30,49,73],"learning":[6,31,50,74],"model":[7,32,51,75],"for":[8],"encrypted":[9],"traffic":[10,89,95],"classification":[11,90,130,134],"which":[12,93,117],"uses":[13],"different":[14,20,38,106],"neural":[15],"network":[16],"structures":[17],"to":[18,25],"process":[19],"types":[21,39],"of":[22,37,40,62,105,121,127],"features.":[23],"Compared":[24],"previous":[26],"work,":[27],"our":[28,48],"can":[33,118],"make":[34],"full":[35],"use":[36],"features":[41],"extracted":[42],"from":[43,58],"the":[44,53,59,70,80,94,97,103,125],"flow.":[45],"We":[46,67],"evaluate":[47],"in":[52,92],"real-":[54],"world":[55],"datasets":[56],"acquired":[57],"website":[60,99,107,110,115,128,133],"servers":[61],"large":[64],"internet":[65],"corporation.":[66],"found":[68],"that":[69],"proposed":[71],"gets":[76],"better":[77],"performance":[78],"than":[79],"state-of-the-art.":[81],"Moreover,":[82],"this":[83],"focuses":[85],"on":[86,102],"new":[88],"scenario":[91],"under":[96],"specific":[98,114],"is":[100,131],"classified":[101],"basis":[104],"services.":[108],"Each":[109],"service":[111,129],"represents":[112],"function":[116],"be":[119],"composed":[120],"several":[122],"webpages.":[123],"Therefore,":[124],"granularity":[126],"between":[132],"and":[135],"webpage":[136],"classification.":[137]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
