{"id":"https://openalex.org/W4200411194","doi":"https://doi.org/10.1109/iscc53001.2021.9631419","title":"FA-net: Attention-based Fusion Network For Malware HTTPs Traffic Classification","display_name":"FA-net: Attention-based Fusion Network For Malware HTTPs Traffic Classification","publication_year":2021,"publication_date":"2021-09-05","ids":{"openalex":"https://openalex.org/W4200411194","doi":"https://doi.org/10.1109/iscc53001.2021.9631419"},"language":"en","primary_location":{"id":"doi:10.1109/iscc53001.2021.9631419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631419","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100390227","display_name":"Siqi Liu","orcid":"https://orcid.org/0000-0001-9744-3681"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Siqi Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101781741","display_name":"Yanni Han","orcid":"https://orcid.org/0000-0001-6820-4219"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanni Han","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039275119","display_name":"Yanjie Hu","orcid":"https://orcid.org/0000-0003-1147-7632"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanjie Hu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103997045","display_name":"Qian Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Tan","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100390227"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.3808,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.60761482,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7803465127944946},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.774198055267334},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.7433767318725586},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6440935134887695},{"id":"https://openalex.org/keywords/net","display_name":"Net (polyhedron)","score":0.573047399520874},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5719337463378906},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5591616630554199},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4615941047668457},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4585959017276764},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4361268877983093},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.41880300641059875},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.23138892650604248},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08587771654129028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06710007786750793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7803465127944946},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.774198055267334},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.7433767318725586},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6440935134887695},{"id":"https://openalex.org/C14166107","wikidata":"https://www.wikidata.org/wiki/Q253829","display_name":"Net (polyhedron)","level":2,"score":0.573047399520874},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5719337463378906},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5591616630554199},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4615941047668457},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4585959017276764},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4361268877983093},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.41880300641059875},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23138892650604248},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08587771654129028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06710007786750793},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc53001.2021.9631419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631419","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.6899999976158142,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2119271160","https://openalex.org/W2162833336","https://openalex.org/W2537766808","https://openalex.org/W2606697812","https://openalex.org/W2743556905","https://openalex.org/W2771013472","https://openalex.org/W2891570868","https://openalex.org/W2897202622","https://openalex.org/W2911301616","https://openalex.org/W2912711574","https://openalex.org/W2915004662","https://openalex.org/W2919493784","https://openalex.org/W2963065250","https://openalex.org/W2963516518","https://openalex.org/W2996980851","https://openalex.org/W3039623901","https://openalex.org/W3040408944","https://openalex.org/W3044193521","https://openalex.org/W3088046302","https://openalex.org/W3109491787","https://openalex.org/W6684050148","https://openalex.org/W6757578793"],"related_works":["https://openalex.org/W4389116644","https://openalex.org/W2153315159","https://openalex.org/W3103844505","https://openalex.org/W2097492617","https://openalex.org/W259157601","https://openalex.org/W4205463238","https://openalex.org/W2761785940","https://openalex.org/W2152125195","https://openalex.org/W2018792058","https://openalex.org/W4286571681"],"abstract_inverted_index":{"With":[0],"the":[1,12,25,29,33,37,41,68,82,92,109,137,142],"wide":[2],"application":[3],"of":[4,63,73,85,106,128,144],"HTTPs,":[5],"malware":[6],"HTTPs":[7],"traffic":[8],"classification":[9,21,69,150],"is":[10],"usually":[11],"first":[13],"step":[14],"in":[15],"anomaly":[16],"detection":[17],"system.":[18],"The":[19,116],"existing":[20],"methods":[22],"mainly":[23],"use":[24],"raw":[26,86],"bytes":[27,87],"(containing":[28,36],"discriminative":[30],"features)":[31],"or":[32],"statistical":[34,89],"features":[35,64,84,90,107],"global":[38],"information)":[39],"as":[40],"input,":[42],"which":[43,59],"leads":[44],"to":[45,66],"a":[46,53,113],"low":[47],"Fl-score.":[48],"Therefore,":[49],"this":[50],"paper":[51],"presents":[52],"novel":[54],"Attention-based":[55],"Fusion":[56],"Network":[57,95],"(FA-net),":[58],"combines":[60,103],"two":[61,104,134],"types":[62,105],"properly":[65],"improve":[67],"performance.":[70,151],"FA-net":[71,120],"consists":[72],"three":[74],"sub-networks:":[75],"RF":[76],"-net":[77,80],"and":[78,88,97,101,112,130],"SF":[79],"extract":[81],"representative":[83],"through":[91,108],"Convolutional":[93],"Neural":[94],"(CNN)":[96],"reconstruction":[98],"mechanism":[99,111],"respectively,":[100],"C-net":[102],"attention":[110],"regulating":[114,146],"factor.":[115],"experiments":[117],"indicate":[118],"that":[119],"obtains":[121],"markedly":[122],"better":[123],"results":[124],"(the":[125],"average":[126],"Fl-score":[127],"0.941":[129],"0.997":[131],"respectively":[132],"on":[133,149],"datasets)":[135],"than":[136],"baselines.":[138],"We":[139],"also":[140],"explore":[141],"influence":[143],"different":[145],"factor":[147],"values":[148]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
