{"id":"https://openalex.org/W4403937921","doi":"https://doi.org/10.1109/iscc61673.2024.10733622","title":"SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks","display_name":"SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks","publication_year":2024,"publication_date":"2024-06-26","ids":{"openalex":"https://openalex.org/W4403937921","doi":"https://doi.org/10.1109/iscc61673.2024.10733622"},"language":"en","primary_location":{"id":"doi:10.1109/iscc61673.2024.10733622","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iscc61673.2024.10733622","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046725607","display_name":"Minghao Ma","orcid":"https://orcid.org/0000-0003-2428-6085"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Minghao Ma","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108660469","display_name":"Zhixin Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhixin Shi","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001953231","display_name":"Qilei Yin","orcid":"https://orcid.org/0000-0002-0148-2772"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qilei Yin","raw_affiliation_strings":["Zhongguancun Laboratory,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory,Beijing,China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040328629","display_name":"Yangyang Zong","orcid":"https://orcid.org/0009-0007-0586-1757"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyang Zong","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046725607"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17275617,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9521999955177307,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7746095657348633},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7722687721252441},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6479657292366028},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.5743728280067444},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5163627862930298},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4128267168998718},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3719877600669861},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34301137924194336},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23023876547813416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21292003989219666}],"concepts":[{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7746095657348633},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7722687721252441},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6479657292366028},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5743728280067444},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5163627862930298},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4128267168998718},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3719877600669861},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34301137924194336},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23023876547813416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21292003989219666}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc61673.2024.10733622","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iscc61673.2024.10733622","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2000756828","https://openalex.org/W2162833336","https://openalex.org/W2343828539","https://openalex.org/W2555621429","https://openalex.org/W2591712613","https://openalex.org/W2606697812","https://openalex.org/W2915004662","https://openalex.org/W2919493784","https://openalex.org/W2963403784","https://openalex.org/W2963516518","https://openalex.org/W2963704216","https://openalex.org/W3007562398","https://openalex.org/W3035950449","https://openalex.org/W3114936184","https://openalex.org/W3128341305","https://openalex.org/W3154284926","https://openalex.org/W3199803514","https://openalex.org/W4224315052","https://openalex.org/W4283205753","https://openalex.org/W4290991228","https://openalex.org/W4312268095","https://openalex.org/W4328028465"],"related_works":["https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W1621827506","https://openalex.org/W4362496757","https://openalex.org/W2051501574","https://openalex.org/W2124627279","https://openalex.org/W2050967184","https://openalex.org/W2566091814","https://openalex.org/W2114937328","https://openalex.org/W2148654711"],"abstract_inverted_index":{"In":[0,164],"recent":[1],"years,":[2],"encrypted":[3,84],"traffic":[4,23,49,85,93],"classification":[5,122,162],"has":[6],"been":[7],"found":[8],"widespread":[9],"applications":[10],"in":[11,20,52,74,161],"the":[12,70,108,111,169],"field":[13],"of":[14,55,98,113,159,183],"cybersecurity.":[15],"Its":[16],"main":[17],"challenge":[18],"lies":[19],"accurately":[21],"represent":[22,102],"when":[24],"features":[25,106],"are":[26,66],"obscured":[27],"due":[28],"to":[29,101,118,120,137],"encryption.":[30],"To":[31],"address":[32],"this,":[33],"researchers":[34],"utilize":[35],"fingerprint":[36,86],"construction":[37],"methods":[38,54],"based":[39],"on":[40,150],"statistical":[41],"information":[42,72],"or":[43,62],"employ":[44],"Deep":[45],"Learning":[46],"(DL)":[47],"for":[48],"representation.":[50],"However,":[51],"previous":[53],"feature":[56,126],"selection,":[57],"flat":[58],"key-value":[59],"pair":[60],"features,":[61],"raw":[63],"packet":[64],"bytes":[65],"often":[67],"used,":[68],"ignoring":[69],"structured":[71,83],"embedded":[73],"packets":[75],"and":[76],"flows.":[77],"Therefore,":[78],"We":[79],"propose":[80],"a":[81,96,178],"novel":[82],"generation":[87],"method":[88,133],"called":[89],"SHTree.":[90],"It":[91],"constructs":[92],"fingerprints":[94],"using":[95],"set":[97],"tree-based":[99],"structures":[100],"traffic,":[103,109],"encapsulating":[104],"structural":[105],"from":[107],"enhancing":[110],"representation":[112],"traffic.":[114],"This":[115],"enables":[116],"it":[117,154],"adapt":[119],"various":[121],"tasks":[123],"through":[124],"general":[125],"selection.":[127],"The":[128],"experiments":[129],"demonstrate":[130],"that":[131],"our":[132],"achieves":[134],"comparable":[135],"accuracy":[136],"state-of-the-art":[138],"Large":[139],"Language":[140],"Models":[141],"(LLMs),":[142],"with":[143],"an":[144],"F1":[145],"score":[146],"higher":[147],"by":[148,156],"0.5%":[149],"specific":[151],"tasks.":[152],"Meanwhile,":[153],"outperforms":[155],"three":[157],"orders":[158],"magnitude":[160],"speed.":[163],"unsupervised":[165],"abnormal":[166],"detection":[167],"tasks,":[168],"True":[170],"Positive":[171,180],"Rate":[172,181],"(TPR)":[173],"exceeds":[174],"99%,":[175],"while":[176],"maintaining":[177],"False":[179],"(FPR)":[182],"0.5%.":[184]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
