{"id":"https://openalex.org/W4372263383","doi":"https://doi.org/10.1109/icassp49357.2023.10095124","title":"A Multi-Modal Approach For Context-Aware Network Traffic Classification","display_name":"A Multi-Modal Approach For Context-Aware Network Traffic Classification","publication_year":2023,"publication_date":"2023-05-05","ids":{"openalex":"https://openalex.org/W4372263383","doi":"https://doi.org/10.1109/icassp49357.2023.10095124"},"language":"en","primary_location":{"id":"doi:10.1109/icassp49357.2023.10095124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49357.2023.10095124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101924566","display_name":"Bo Pang","orcid":"https://orcid.org/0000-0002-7339-6830"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Pang","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003730869","display_name":"Yongquan Fu","orcid":"https://orcid.org/0000-0002-7564-5239"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongquan Fu","raw_affiliation_strings":["National University of Defense Technology,College of Computer,Changsha,China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101681574","display_name":"Siyuan Ren","orcid":"https://orcid.org/0000-0001-9265-3161"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siyuan Ren","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035174613","display_name":"Siqi Shen","orcid":"https://orcid.org/0000-0001-7479-0189"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siqi Shen","raw_affiliation_strings":["Xiamen University,Xiamen,China","Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Xiamen University,Xiamen,China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100423424","display_name":"Ye Wang","orcid":"https://orcid.org/0000-0001-7992-3892"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Wang","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069241620","display_name":"Qing Liao","orcid":"https://orcid.org/0000-0003-1012-5301"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Liao","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),Department of Computer Science and Technology,Shenzhen,China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004908542","display_name":"Yan Jia","orcid":"https://orcid.org/0000-0002-0024-676X"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Jia","raw_affiliation_strings":["Peng Cheng Laboratory,Shenzhen,China","Peng Cheng Laboratory, Shenzhen, China","Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory,Shenzhen,China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101924566"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":1.3965,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8445769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8295762538909912},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6459375619888306},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5857517719268799},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5123807191848755},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.48138120770454407},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.47814691066741943},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45344027876853943},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4483623504638672},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4332717955112457},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.42315608263015747},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.41143369674682617},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3255850672721863},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11509844660758972}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8295762538909912},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6459375619888306},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5857517719268799},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5123807191848755},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.48138120770454407},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.47814691066741943},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45344027876853943},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4483623504638672},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4332717955112457},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.42315608263015747},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.41143369674682617},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3255850672721863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11509844660758972},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp49357.2023.10095124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49357.2023.10095124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2343828539","https://openalex.org/W2560178266","https://openalex.org/W2606697812","https://openalex.org/W2743678626","https://openalex.org/W2765323781","https://openalex.org/W2896457183","https://openalex.org/W2916106175","https://openalex.org/W2963516518","https://openalex.org/W2964015378","https://openalex.org/W3129726290","https://openalex.org/W3145680685","https://openalex.org/W3161944108","https://openalex.org/W3172099915","https://openalex.org/W3189612867","https://openalex.org/W3208904656","https://openalex.org/W4224315052","https://openalex.org/W4294170691","https://openalex.org/W4297733535","https://openalex.org/W6682691769","https://openalex.org/W6726873649","https://openalex.org/W6745316256","https://openalex.org/W6755207826","https://openalex.org/W6760001035","https://openalex.org/W6791776128","https://openalex.org/W6799455637"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W2012465643","https://openalex.org/W2773751105","https://openalex.org/W2050261031","https://openalex.org/W4293863212"],"abstract_inverted_index":{"Network":[0],"traffic":[1,127],"classification":[2,55],"is":[3,121],"important":[4,27],"for":[5,53,98,123],"network":[6,109],"security":[7],"and":[8,33,67,78,95,107,120],"management.":[9],"State-of-the-art":[10],"classifiers":[11],"use":[12],"deep":[13,117],"learning":[14,118],"techniques":[15],"to":[16,48],"automatically":[17,82],"extract":[18],"feature":[19,62],"vectors":[20],"from":[21],"the":[22,30,51,54,73,87,93,99],"traffic,":[23],"which":[24],"however":[25],"lose":[26],"context":[28,52],"of":[29,126],"communication":[31],"sessions":[32],"encapsulated":[34],"text":[35],"semantics.":[36],"In":[37],"this":[38],"paper,":[39],"we":[40],"present":[41],"a":[42],"Multi-Modal":[43],"Classification":[44],"method":[45],"named":[46],"MTCM":[47,113],"systematically":[49],"exploit":[50],"task.":[56],"We":[57,80],"build":[58],"an":[59],"adaptive":[60],"context-aware":[61],"extraction":[63],"framework":[64],"over":[65],"varying-length":[66],"dynamic":[68],"packet":[69,100],"sequences,":[70],"based":[71],"on":[72],"attention-aware":[74],"graph":[75,94],"neural":[76],"networks":[77],"BERT.":[79],"next":[81],"fusion":[83],"multimodal":[84],"features":[85,97],"with":[86,104],"Multi-Layer":[88],"Perception":[89],"(MLP)":[90],"that":[91,112],"unifies":[92],"semantic":[96],"stream.":[101],"Extensive":[102],"evaluation":[103],"real-world":[105],"application":[106],"abnormal":[108],"datasets":[110],"show":[111],"outperforms":[114],"state-":[115],"of-the-art":[116],"methods,":[119],"robust":[122],"different":[124],"classes":[125],"data":[128],"sets.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
