{"id":"https://openalex.org/W4411948779","doi":"https://doi.org/10.1109/tccn.2025.3585170","title":"UniNet: A Unified Multi-Granular Traffic Modeling Framework for Network Security","display_name":"UniNet: A Unified Multi-Granular Traffic Modeling Framework for Network Security","publication_year":2025,"publication_date":"2025-07-02","ids":{"openalex":"https://openalex.org/W4411948779","doi":"https://doi.org/10.1109/tccn.2025.3585170"},"language":"en","primary_location":{"id":"doi:10.1109/tccn.2025.3585170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3585170","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2503.04174","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041158175","display_name":"Binghui Wu","orcid":"https://orcid.org/0000-0002-3639-7965"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Binghui Wu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","Department of Electrical and Computer Engineering, National University of Singapore (NUS), Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore (NUS), Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012540529","display_name":"Dinil Mon Divakaran","orcid":"https://orcid.org/0000-0001-8706-432X"},"institutions":[{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]},{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dinil Mon Divakaran","raw_affiliation_strings":["Institute for Infocomm Research, A*STAR, Fusionopolis, Singapore","A*STAR, Institute for Infocomm Research (IR), Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, A*STAR, Fusionopolis, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]},{"raw_affiliation_string":"A*STAR, Institute for Infocomm Research (IR), Singapore, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080394785","display_name":"Mohan Gurusamy","orcid":"https://orcid.org/0000-0001-6764-268X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mohan Gurusamy","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","Department of Electrical and Computer Engineering, National University of Singapore (NUS), Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore (NUS), Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041158175"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":1.4888,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.84599055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"2424","last_page":"2438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8357016444206238},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44620200991630554},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4073992371559143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8357016444206238},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44620200991630554},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4073992371559143}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tccn.2025.3585170","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3585170","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2503.04174","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2503.04174","pdf_url":"https://arxiv.org/pdf/2503.04174","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2503.04174","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2503.04174","pdf_url":"https://arxiv.org/pdf/2503.04174","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"As":[0],"modern":[1,178],"networks":[2],"grow":[3],"increasingly":[4],"complex\u2013":[5],"driven":[6],"by":[7],"diverse":[8,117],"devices,":[9],"encrypted":[10,137],"protocols,":[11],"and":[12,54,66,94,127,136,154,167],"evolving":[13],"threats\u2013network":[14],"traffic":[15,84,169],"analysis":[16,170],"has":[17],"become":[18],"critically":[19],"important.":[20],"Existing":[21],"machine":[22],"learning":[23,56],"models":[24,166],"often":[25],"rely":[26],"only":[27],"on":[28],"a":[29,76,81,105,174],"single":[30],"representation":[31,85],"of":[32,164],"packets":[33],"or":[34],"flows,":[35],"limiting":[36],"their":[37],"ability":[38],"to":[39,58,62,97],"capture":[40],"the":[41,162],"contextual":[42,89,100],"relationships":[43],"essential":[44],"for":[45,51,116,177],"robust":[46],"analysis.":[47],"Furthermore,":[48],"task-specific":[49],"architectures":[50],"supervised,":[52],"semisupervised,":[53],"unsupervised":[55],"lead":[57],"inefficiencies":[59],"in":[60],"adapting":[61],"varying":[63],"data":[64],"formats":[65],"security":[67,118,126],"tasks.":[68,119],"To":[69],"address":[70],"these":[71],"gaps,":[72],"we":[73],"propose":[74],"UniNet,":[75],"unified":[77],"framework":[78],"that":[79],"introduces":[80],"novel":[82],"multi-granular":[83],"(TMatrix)":[86],"with":[87,103],"rich":[88],"information,":[90],"integrating":[91],"session,":[92],"flow,":[93],"packet-level":[95],"features":[96],"provide":[98],"comprehensive":[99],"information.":[101],"Combined":[102],"T-Attent,":[104],"specially":[106],"designed":[107],"lightweight":[108],"attention-based":[109],"model,":[110],"UniNet":[111,172],"efficiently":[112],"learns":[113],"latent":[114],"embeddings":[115],"Extensive":[120],"evaluations":[121],"across":[122,157],"four":[123],"key":[124],"network":[125,179],"privacy":[128],"problems\u2013anomaly":[129],"detection,":[130],"attack":[131],"classification,":[132],"IoT":[133],"device":[134],"identification,":[135],"website":[138],"fingerprinting\u2013demonstrate":[139],"UniNet\u2019s":[140],"significant":[141],"performance":[142],"gain":[143],"over":[144],"state-of-the-art":[145],"methods,":[146],"achieving":[147],"higher":[148],"accuracy,":[149],"lower":[150],"false":[151],"positive":[152],"rates,":[153],"improved":[155],"scalability":[156],"various":[158],"datasets.":[159],"By":[160],"addressing":[161],"limitations":[163],"singlelevel":[165],"unifying":[168],"paradigms,":[171],"sets":[173],"new":[175],"benchmark":[176],"security.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
