{"id":"https://openalex.org/W4412722200","doi":"https://doi.org/10.1109/jiot.2025.3593143","title":"DLET-Classifier: A Dynamic and Lightweight Method for Encrypted Traffic Classification","display_name":"DLET-Classifier: A Dynamic and Lightweight Method for Encrypted Traffic Classification","publication_year":2025,"publication_date":"2025-07-28","ids":{"openalex":"https://openalex.org/W4412722200","doi":"https://doi.org/10.1109/jiot.2025.3593143"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3593143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3593143","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109301550","display_name":"Jiayong Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiayong Wu","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029715489","display_name":"Weina Niu","orcid":"https://orcid.org/0000-0002-3235-3463"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weina Niu","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013264576","display_name":"Fushan Wei","orcid":"https://orcid.org/0000-0003-2790-7254"},"institutions":[{"id":"https://openalex.org/I4210123940","display_name":"Ministry of Education","ror":"https://ror.org/02xv42m49","country_code":"PT","type":"government","lineage":["https://openalex.org/I4210117458","https://openalex.org/I4210123940"]},{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"funder","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]}],"countries":["CN","PT"],"is_corresponding":false,"raw_author_name":"Fushan Wei","raw_affiliation_strings":["Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China","Key Laboratory of Cyberspace Security, Ministry of Education of China, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China","institution_ids":["https://openalex.org/I4210123940"]},{"raw_affiliation_string":"Key Laboratory of Cyberspace Security, Ministry of Education of China, China","institution_ids":["https://openalex.org/I1327237609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101513174","display_name":"Shaofeng Li","orcid":"https://orcid.org/0000-0002-1491-4319"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaofeng Li","raw_affiliation_strings":["School of Computer Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057841191","display_name":"Shiping Huang","orcid":"https://orcid.org/0000-0002-0092-1753"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiping Huang","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110611641","display_name":"Jiacheng Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiacheng Gong","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5109301550"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":5.5813,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.95747606,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"12","issue":"20","first_page":"42250","last_page":"42262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9513999819755554,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8146461248397827},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6226341128349304},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5421882271766663},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49615535140037537},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.43273258209228516},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.43036267161369324},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3641970157623291},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36312973499298096},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26214009523391724},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.11995401978492737}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8146461248397827},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6226341128349304},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5421882271766663},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49615535140037537},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.43273258209228516},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43036267161369324},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3641970157623291},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36312973499298096},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26214009523391724},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.11995401978492737}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3593143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3593143","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W1821462560","https://openalex.org/W2122379760","https://openalex.org/W2194775991","https://openalex.org/W2272516773","https://openalex.org/W2343828539","https://openalex.org/W2531409750","https://openalex.org/W2606697812","https://openalex.org/W2743678626","https://openalex.org/W2752782242","https://openalex.org/W2767094836","https://openalex.org/W2892460540","https://openalex.org/W2963197901","https://openalex.org/W2963516518","https://openalex.org/W2963655955","https://openalex.org/W2974442408","https://openalex.org/W3040389479","https://openalex.org/W3048832564","https://openalex.org/W3116203245","https://openalex.org/W3173170122","https://openalex.org/W3177145331","https://openalex.org/W3181596493","https://openalex.org/W3199457010","https://openalex.org/W4224315052","https://openalex.org/W4322706638","https://openalex.org/W4385245566","https://openalex.org/W4385613110","https://openalex.org/W4391345033","https://openalex.org/W4396757496","https://openalex.org/W4398188118","https://openalex.org/W4405394913"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2179036394","https://openalex.org/W2613715541"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"encrypted":[3,20,35,39,50,122],"traffic":[4,21,40,51],"has":[5],"become":[6],"a":[7,85,185],"critical":[8],"means":[9],"of":[10,19,88,166,198,220],"ensuring":[11],"user":[12],"information":[13],"security.":[14],"However,":[15,49],"the":[16,97,107,114,130,139,147,154,161,173,181,199,208,211,214,217,223,237,247],"widespread":[17],"adoption":[18],"also":[22,227],"introduces":[23],"new":[24],"challenges,":[25],"such":[26],"as":[27],"enabling":[28],"attackers":[29],"to":[30,72,118,141,146,177,184,262],"conceal":[31],"malicious":[32],"activities":[33],"within":[34],"channels.":[36],"Consequently,":[37],"accurate":[38],"classification":[41,52,201,230,254],"is":[42,213],"crucial":[43],"for":[44,134,191,246],"strengthening":[45],"network":[46,112,150,264],"security":[47],"defenses.":[48],"methods":[53],"often":[54],"employing":[55],"complex":[56,263],"model":[57,140,183,192,215,249],"structures":[58],"and":[59,66,84,99,113,129,144,194,222,244],"feature":[60],"extraction":[61],"techniques,":[62],"while":[63,226,251],"neglecting":[64],"efficiency":[65],"latency,":[67],"which":[68,105],"makes":[69],"them":[70],"difficult":[71],"apply":[73],"in":[74],"low-resource":[75],"scenarios":[76],"with":[77,216],"slow":[78],"CPU":[79],"computation":[80],"speed,":[81],"limited":[82],"memory,":[83],"scarce":[86],"number":[87,219],"training":[89],"samples.":[90],"To":[91,137],"address":[92],"these":[93],"issues,":[94],"we":[95,152,171],"propose":[96,153],"Dynamic":[98],"Lightweight":[100],"Encrypted":[101],"Traffic":[102],"Classifier":[103],"(DLET-Classifier),":[104],"uses":[106],"depthwise":[108],"separable":[109],"convolutional":[110],"neural":[111],"channel":[115],"attention":[116],"mechanism":[117],"extract":[119],"features":[120,128],"from":[121,180],"traffic.":[123],"It":[124],"efficiently":[125],"captures":[126],"byte-level":[127],"relationships":[131],"between":[132],"packets":[133],"effective":[135],"classification.":[136],"enable":[138],"update":[142],"rapidly":[143],"adapt":[145,261],"ever-changing":[148],"real-world":[149],"environment,":[151],"Multi2One":[155,238],"algorithm.":[156],"This":[157,188],"algorithm":[158,239],"first":[159],"updates":[160,193,243],"base":[162,182],"model,":[163],"an":[164],"ensemble":[165],"multiple":[167],"binary":[168],"classifiers.":[169],"Then,":[170],"use":[172],"knowledge":[174,179,242],"distillation":[175],"technique":[176],"transfer":[178],"lightweight":[186,248],"model.":[187],"process":[189],"allows":[190],"extensions.":[195],"The":[196],"results":[197],"multi-class":[200],"comparison":[202],"experiment":[203],"show":[204],"that":[205,236],"among":[206],"all":[207],"compared":[209],"methods,":[210],"DLET-Classifier":[212],"smallest":[218],"parameters":[221],"highest":[224],"throughput,":[225],"achieving":[228],"excellent":[229],"accuracy.":[231],"Incremental":[232],"expansion":[233],"experiments":[234],"demonstrate":[235],"enables":[240],"fast":[241],"extensions":[245],"(LWG)":[250],"maintaining":[252],"its":[253],"accuracy":[255],"above":[256],"96%,":[257],"making":[258],"our":[259],"method":[260],"environments.":[265]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
