{"id":"https://openalex.org/W2974442408","doi":"https://doi.org/10.1109/tbdata.2019.2940675","title":"Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory","display_name":"Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory","publication_year":2019,"publication_date":"2019-09-20","ids":{"openalex":"https://openalex.org/W2974442408","doi":"https://doi.org/10.1109/tbdata.2019.2940675","mag":"2974442408"},"language":"en","primary_location":{"id":"doi:10.1109/tbdata.2019.2940675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2019.2940675","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100666106","display_name":"Haipeng Yao","orcid":"https://orcid.org/0000-0003-1391-7363"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haipeng Yao","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100412248","display_name":"Chong Liu","orcid":"https://orcid.org/0000-0003-1883-0996"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chong Liu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067299655","display_name":"Peiying Zhang","orcid":"https://orcid.org/0000-0002-0990-5581"},"institutions":[{"id":"https://openalex.org/I4210162190","display_name":"China University of Petroleum, East China","ror":"https://ror.org/05gbn2817","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210162190"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiying Zhang","raw_affiliation_strings":["College of Computer & Communication Engineering, China University of Petroleum (East China), Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer & Communication Engineering, China University of Petroleum (East China), Qingdao, China","institution_ids":["https://openalex.org/I4210162190"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051198089","display_name":"Sheng Wu","orcid":"https://orcid.org/0000-0002-9947-9968"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Wu","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005072193","display_name":"Chunxiao Jiang","orcid":"https://orcid.org/0000-0002-3703-121X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunxiao Jiang","raw_affiliation_strings":["Tsinghua Space Center, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua Space Center, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Software, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100666106"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":8.3934,"has_fulltext":false,"cited_by_count":181,"citation_normalized_percentile":{"value":0.98038201,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":"1","first_page":"241","last_page":"252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8718600869178772},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.8059390783309937},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6797548532485962},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.6361953020095825},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5844205617904663},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.548826277256012},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5298449993133545},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5281767249107361},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5105803608894348},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4909262955188751},{"id":"https://openalex.org/keywords/network-traffic-simulation","display_name":"Network traffic simulation","score":0.47263452410697937},{"id":"https://openalex.org/keywords/long-short-term-memory","display_name":"Long short term memory","score":0.47034552693367004},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.4353165328502655},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38031497597694397},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.37425923347473145},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.34140151739120483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1917976438999176}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8718600869178772},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.8059390783309937},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6797548532485962},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.6361953020095825},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5844205617904663},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.548826277256012},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5298449993133545},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5281767249107361},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5105803608894348},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4909262955188751},{"id":"https://openalex.org/C94168897","wikidata":"https://www.wikidata.org/wiki/Q574324","display_name":"Network traffic simulation","level":4,"score":0.47263452410697937},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.47034552693367004},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.4353165328502655},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38031497597694397},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.37425923347473145},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.34140151739120483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1917976438999176},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tbdata.2019.2940675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2019.2940675","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G5536052604","display_name":null,"funder_award_id":"61471056","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1472561848","https://openalex.org/W1550702411","https://openalex.org/W2096118443","https://openalex.org/W2098260898","https://openalex.org/W2116618651","https://openalex.org/W2120152316","https://openalex.org/W2125216345","https://openalex.org/W2133564696","https://openalex.org/W2158215699","https://openalex.org/W2179036394","https://openalex.org/W2190207511","https://openalex.org/W2255466643","https://openalex.org/W2329739413","https://openalex.org/W2343828539","https://openalex.org/W2408350275","https://openalex.org/W2463836193","https://openalex.org/W2470673105","https://openalex.org/W2514510339","https://openalex.org/W2591712613","https://openalex.org/W2599600800","https://openalex.org/W2606697812","https://openalex.org/W2613715541","https://openalex.org/W2615131380","https://openalex.org/W2743678626","https://openalex.org/W2750674396","https://openalex.org/W2768726319","https://openalex.org/W2772317693","https://openalex.org/W2834885115","https://openalex.org/W2897202622","https://openalex.org/W2898413119","https://openalex.org/W2912924201","https://openalex.org/W2965537075","https://openalex.org/W6679434410","https://openalex.org/W6692991205"],"related_works":["https://openalex.org/W2374980776","https://openalex.org/W2352713638","https://openalex.org/W2612734354","https://openalex.org/W2382692540","https://openalex.org/W2138225277","https://openalex.org/W2578585306","https://openalex.org/W4242927786","https://openalex.org/W2924962435","https://openalex.org/W4379534844","https://openalex.org/W2745966507"],"abstract_inverted_index":{"Network":[0],"traffic":[1,45,51,61,76,92],"classification":[2,52,93],"has":[3,46],"become":[4],"an":[5],"important":[6],"part":[7],"of":[8,25,36,97,143],"network":[9,17,23,30,75,81,91,116],"management,":[10],"which":[11],"is":[12,62],"beneficial":[13],"for":[14,29,89],"achieving":[15],"intelligent":[16],"operation":[18],"and":[19,28,39,42],"maintenance,":[20],"enhancing":[21],"the":[22,33,55,59,73,78,84,95,98,102,113,121,131,140,151],"quality":[24],"service":[26],"(QoS),":[27],"security.":[31],"Given":[32],"rapid":[34],"development":[35],"various":[37],"applications":[38],"protocols,":[40],"more":[41,43],"encrypted":[44,60],"emerged":[47],"in":[48,65,94,137],"networks.":[49],"Traditional":[50],"methods":[53,133,145],"exhibited":[54],"unsatisfied":[56],"performance":[57],"since":[58],"no":[63],"longer":[64],"plain":[66],"text.":[67],"In":[68],"this":[69],"work,":[70],"we":[71],"modeled":[72],"time-series":[74],"by":[77],"recurrent":[79],"neural":[80],"(RNN).":[82],"Moreover,":[83],"attention":[85,103,115],"mechanism":[86],"was":[87,146],"introduced":[88],"assisting":[90],"form":[96],"following":[99],"two":[100],"models,":[101],"aided":[104],"long":[105],"short":[106],"term":[107],"memory":[108],"(LSTM)":[109],"as":[110,112],"well":[111],"hierarchical":[114],"(HAN).":[117],"Finally,":[118],"relying":[119,149],"on":[120,150],"ISCX":[122],"VPN-NonVPN":[123],"dataset,":[124],"extensive":[125],"experiments":[126],"were":[127],"conducted,":[128],"showing":[129],"that":[130],"proposed":[132],"achieved":[134],"91.2":[135],"percent":[136,148],"accuracy":[138,142],"while":[139],"highest":[141],"other":[144],"89.8":[147],"same":[152],"dataset.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":39},{"year":2024,"cited_by_count":50},{"year":2023,"cited_by_count":27},{"year":2022,"cited_by_count":37},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":6}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
