{"id":"https://openalex.org/W4414539736","doi":"https://doi.org/10.1109/icc52391.2025.11161683","title":"MADE: a Masked Autoencoder Based Desensitization Framework for Encrypted Traffic","display_name":"MADE: a Masked Autoencoder Based Desensitization Framework for Encrypted Traffic","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414539736","doi":"https://doi.org/10.1109/icc52391.2025.11161683"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11161683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113276391","display_name":"Shilin Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shilin Xie","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048294684","display_name":"Xueshu Li","orcid":"https://orcid.org/0000-0002-0881-5381"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fenghua Li","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101841697","display_name":"N. Jiang","orcid":"https://orcid.org/0009-0001-0996-5445"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Jiang Jiang","raw_affiliation_strings":["School of Artificial Intelligence, Nanjing University,China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Nanjing University,China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100532286","display_name":"Suxiang Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Suxiang Wu","raw_affiliation_strings":["Zhejiang University,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100660344","display_name":"Jilong Wang","orcid":"https://orcid.org/0000-0002-4493-5145"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jilong Wang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5113276391"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13575629,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4086","last_page":"4091"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9502999782562256,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9502999782562256,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9380999803543091,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8148999810218811},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7293000221252441},{"id":"https://openalex.org/keywords/desensitization","display_name":"Desensitization (medicine)","score":0.6328999996185303},{"id":"https://openalex.org/keywords/downstream","display_name":"Downstream (manufacturing)","score":0.478300005197525},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.41179999709129333},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3154999911785126}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8148999810218811},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7293000221252441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7257000207901001},{"id":"https://openalex.org/C2779779143","wikidata":"https://www.wikidata.org/wiki/Q3493547","display_name":"Desensitization (medicine)","level":3,"score":0.6328999996185303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4993000030517578},{"id":"https://openalex.org/C2776207758","wikidata":"https://www.wikidata.org/wiki/Q5303302","display_name":"Downstream (manufacturing)","level":2,"score":0.478300005197525},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.41179999709129333},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39899998903274536},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3970000147819519},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3154999911785126},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2937000095844269},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.29280000925064087},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.2809999883174896},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.27649998664855957}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11161683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322392","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,77],"recent":[1],"years,":[2],"encryption":[3],"algorithms":[4],"have":[5],"become":[6],"widely":[7],"adopted":[8],"as":[9,61,68,118,120],"a":[10,56,101],"trusted":[11],"means":[12],"of":[13,63,123],"securing":[14],"data":[15,140],"transmission,":[16],"effectively":[17],"safeguarding":[18],"against":[19],"unauthorized":[20],"access.":[21],"However,":[22],"providing":[23],"raw":[24],"encrypted":[25,53,84],"traffic":[26,54,66,85,97,112,126,146],"directly":[27],"to":[28,38,50,70,109,137,142],"researchers":[29],"can":[30],"still":[31],"pose":[32],"privacy":[33],"risks,":[34],"making":[35],"it":[36],"essential":[37],"implement":[39],"desensitization":[40,86,98,160],"measures":[41],"before":[42],"sharing":[43],"such":[44],"data.":[45],"The":[46],"main":[47],"challenge":[48],"is":[49,132],"desensitize":[51],"the":[52,64,72,96,116,121,124,145,152],"in":[55,144],"privacyprotection":[57],"way":[58],"while":[59],"preserving":[60],"much":[62],"original":[65],"characteristics":[67],"possible":[69],"ensure":[71],"downstream":[73,128],"tasks":[74],"run":[75],"properly.":[76],"this":[78],"paper,":[79],"we":[80],"propose":[81],"MADE,":[82],"an":[83],"framework":[87,94,161],"based":[88],"on":[89],"Masked":[90],"AutoEncoder":[91],"(MAE).":[92],"This":[93],"transforms":[95],"task":[99],"into":[100],"classifier-guided":[102],"image":[103],"reconstruction":[104],"problem,":[105],"using":[106],"supervised":[107],"signals":[108],"achieve":[110],"state-aware":[111],"reconstruction,":[113],"which":[114,139],"ensures":[115],"utility":[117],"well":[119],"safety":[122],"desensitized":[125],"for":[127],"tasks.":[129],"Moreover,":[130],"MADE":[131],"highly":[133],"scalable,":[134],"permitting":[135],"users":[136],"customize":[138],"attributes":[141],"preserve":[143],"being":[147],"processed,":[148],"simply":[149],"by":[150],"modifying":[151],"classifier.":[153],"Experimental":[154],"results":[155],"reveal":[156],"that":[157],"our":[158],"proposed":[159],"not":[162],"only":[163],"outperforms":[164],"baseline":[165],"methods":[166],"but":[167],"also":[168],"exhibits":[169],"high":[170],"applicability":[171],"across":[172],"various":[173],"scenarios.":[174]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
