{"id":"https://openalex.org/W4283205753","doi":"https://doi.org/10.1109/infocom48880.2022.9796878","title":"TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers","display_name":"TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers","publication_year":2022,"publication_date":"2022-05-02","ids":{"openalex":"https://openalex.org/W4283205753","doi":"https://doi.org/10.1109/infocom48880.2022.9796878"},"language":"en","primary_location":{"id":"doi:10.1109/infocom48880.2022.9796878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom48880.2022.9796878","pdf_url":null,"source":{"id":"https://openalex.org/S4363607980","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102482644","display_name":"Rui Ning","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rui Ning","raw_affiliation_strings":["School of Cybersecurity"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074327315","display_name":"Chunsheng Xin","orcid":"https://orcid.org/0000-0001-5575-2849"},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chunsheng Xin","raw_affiliation_strings":["School of Cybersecurity","Department of ECE, Old Dominion University, Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity","institution_ids":[]},{"raw_affiliation_string":"Department of ECE, Old Dominion University, Norfolk, VA, USA","institution_ids":["https://openalex.org/I81365321"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061078522","display_name":"Hongyi Wu","orcid":"https://orcid.org/0000-0001-8596-1342"},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongyi Wu","raw_affiliation_strings":["School of Cybersecurity","Department of ECE, Old Dominion University, Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity","institution_ids":[]},{"raw_affiliation_string":"Department of ECE, Old Dominion University, Norfolk, VA, USA","institution_ids":["https://openalex.org/I81365321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102482644"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4109,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.90645537,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1429","last_page":"1438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.962054967880249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7172797918319702},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6390266418457031},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6235438585281372},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6161620020866394},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43440765142440796},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4289226233959198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2027115523815155}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.962054967880249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7172797918319702},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6390266418457031},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6235438585281372},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6161620020866394},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43440765142440796},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4289226233959198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2027115523815155}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom48880.2022.9796878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom48880.2022.9796878","pdf_url":null,"source":{"id":"https://openalex.org/S4363607980","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5099999904632568}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1731081199","https://openalex.org/W1945616565","https://openalex.org/W2012095206","https://openalex.org/W2055261595","https://openalex.org/W2120955848","https://openalex.org/W2131774270","https://openalex.org/W2144354855","https://openalex.org/W2165797144","https://openalex.org/W2187089797","https://openalex.org/W2194775991","https://openalex.org/W2294710185","https://openalex.org/W2343828539","https://openalex.org/W2605422749","https://openalex.org/W2743556905","https://openalex.org/W2743678626","https://openalex.org/W2748789698","https://openalex.org/W2750674396","https://openalex.org/W2753783305","https://openalex.org/W2774423163","https://openalex.org/W2807363941","https://openalex.org/W2908449057","https://openalex.org/W2919493784","https://openalex.org/W2928842143","https://openalex.org/W2934843808","https://openalex.org/W2950048339","https://openalex.org/W2962858109","https://openalex.org/W2963058004","https://openalex.org/W2963073614","https://openalex.org/W2963403784","https://openalex.org/W2963516518","https://openalex.org/W2966187620","https://openalex.org/W2970335439","https://openalex.org/W2986013765","https://openalex.org/W2990270730","https://openalex.org/W2996800219","https://openalex.org/W3012902672","https://openalex.org/W3034258347","https://openalex.org/W3047014424","https://openalex.org/W3093137868","https://openalex.org/W3107337211","https://openalex.org/W3155427574","https://openalex.org/W3155871095","https://openalex.org/W3175215793","https://openalex.org/W4288093767","https://openalex.org/W4295312788","https://openalex.org/W4300511536","https://openalex.org/W6631190155","https://openalex.org/W6637618735","https://openalex.org/W6640425456","https://openalex.org/W6719080892","https://openalex.org/W6736675087","https://openalex.org/W6737034063","https://openalex.org/W6743581629","https://openalex.org/W6746897123","https://openalex.org/W6758684365","https://openalex.org/W6766253520","https://openalex.org/W6766978945","https://openalex.org/W6767183785","https://openalex.org/W6768126957"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4380075502","https://openalex.org/W4377865163","https://openalex.org/W3193857078","https://openalex.org/W2888956734","https://openalex.org/W3000197790","https://openalex.org/W4315865067","https://openalex.org/W2979433843","https://openalex.org/W3208304128"],"abstract_inverted_index":{"While":[0],"deep":[1],"learning":[2],"(DL)-based":[3],"network":[4,19,48,136,183],"traffic":[5,49,137,184],"classification":[6],"has":[7],"demonstrated":[8],"its":[9],"success":[10],"in":[11],"a":[12,27,39,59,71,88],"range":[13],"of":[14,149,154],"practical":[15,42,134],"applications,":[16],"such":[17],"as":[18],"management":[20],"and":[21,41,61,75,159,210],"security":[22],"control":[23],"to":[24,32,46,53,66,81,91,116,129,143,163],"just":[25],"name":[26],"few,":[28],"it":[29,156,161],"is":[30,64,125,141,157,188,207],"vulnerable":[31],"adversarial":[33],"attacks.":[34],"This":[35],"paper":[36],"reports":[37],"TrojanFlow,":[38,150],"new":[40],"neural":[43,55,215],"backdoor":[44,56,193,198,216],"attack":[45,206],"DL-based":[47,135],"classifiers.":[50,138],"In":[51],"contrast":[52],"traditional":[54],"attacks":[57,194],"where":[58],"designated":[60],"sample-agnostic":[62],"trigger":[63,95,104],"used":[65],"plant":[67],"backdoor,":[68],"TrojanFlow":[69,131,187,205],"poisons":[70],"model":[72],"using":[73,127],"dynamic":[74],"sample-specific":[76],"triggers":[77,110],"that":[78,203],"are":[79,170],"optimized":[80,109],"efficiently":[82,117,164],"hijack":[83,165],"the":[84,94,98,113,119,147,152,166,174,204],"model.":[85,167],"It":[86],"features":[87],"unique":[89],"design":[90],"jointly":[92],"optimize":[93],"generator":[96,105],"with":[97,178,190],"target":[99],"classifier":[100,185],"during":[101],"training.":[102],"The":[103,200],"can":[106],"thus":[107],"craft":[108],"based":[111],"on":[112,173],"input":[114],"sample":[115],"manipulate":[118],"model\u2019s":[120],"prediction.":[121],"A":[122],"well-engineered":[123],"prototype":[124],"developed":[126],"Pytorch":[128],"demonstrate":[130],"attacking":[132],"multiple":[133],"Thorough":[139],"analysis":[140],"conducted":[142],"gain":[144],"insights":[145],"into":[146],"effectiveness":[148],"revealing":[151],"fundamentals":[153],"why":[155],"effective":[158],"what":[160],"does":[162],"Extensive":[168],"experiments":[169],"carried":[171],"out":[172],"well-known":[175],"ISCXVPN2016":[176],"dataset":[177],"three":[179],"widely":[180],"adopted":[181],"DL":[182],"architectures.":[186],"compared":[189],"two":[191],"other":[192],"under":[195],"five":[196],"state-of-the-art":[197],"defenses.":[199],"results":[201],"show":[202],"stealthy,":[208],"efficient,":[209],"highly":[211],"robust":[212],"against":[213],"existing":[214],"mitigation":[217],"schemes.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
