{"id":"https://openalex.org/W2977118937","doi":"https://doi.org/10.1109/tifs.2019.2943236","title":"Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data","display_name":"Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data","publication_year":2019,"publication_date":"2019-09-23","ids":{"openalex":"https://openalex.org/W2977118937","doi":"https://doi.org/10.1109/tifs.2019.2943236","mag":"2977118937"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2943236","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2943236","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005312147","display_name":"Guolin Shao","orcid":"https://orcid.org/0000-0003-2367-6903"},"institutions":[{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guolin Shao","raw_affiliation_strings":["College of Computer Science, Sichuan University, Chengdu, China","Cybersecurity Research Institute, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]},{"raw_affiliation_string":"Cybersecurity Research Institute, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059891662","display_name":"Xingshu Chen","orcid":"https://orcid.org/0000-0002-8705-2617"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingshu Chen","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013299897","display_name":"Xuemei Zeng","orcid":"https://orcid.org/0000-0003-4885-4788"},"institutions":[{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuemei Zeng","raw_affiliation_strings":["Cybersecurity Research Institute, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Institute, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056155495","display_name":"Lina Wang","orcid":"https://orcid.org/0000-0001-8085-1312"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Wang","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5005312147"],"corresponding_institution_ids":["https://openalex.org/I24185976","https://openalex.org/I4210125143"],"apc_list":null,"apc_paid":null,"fwci":1.2601,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.85355508,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"15","issue":null,"first_page":"1525","last_page":"1540"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8450160026550293},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7321335077285767},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7173604369163513},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6088477373123169},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.5791045427322388},{"id":"https://openalex.org/keywords/external-data-representation","display_name":"External Data Representation","score":0.5316465497016907},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4825715124607086},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.4534750282764435},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4515114426612854},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.44806209206581116}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8450160026550293},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7321335077285767},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7173604369163513},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6088477373123169},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.5791045427322388},{"id":"https://openalex.org/C116409475","wikidata":"https://www.wikidata.org/wiki/Q1385056","display_name":"External Data Representation","level":2,"score":0.5316465497016907},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4825715124607086},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.4534750282764435},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4515114426612854},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.44806209206581116},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2943236","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2943236","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G5997664158","display_name":null,"funder_award_id":"61272447","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1524680991","https://openalex.org/W1821148229","https://openalex.org/W1849277567","https://openalex.org/W2024464446","https://openalex.org/W2053186076","https://openalex.org/W2095195675","https://openalex.org/W2133990480","https://openalex.org/W2163922914","https://openalex.org/W2187089797","https://openalex.org/W2296509296","https://openalex.org/W2402144811","https://openalex.org/W2461378669","https://openalex.org/W2528663298","https://openalex.org/W2541841318","https://openalex.org/W2549585799","https://openalex.org/W2570296101","https://openalex.org/W2606697812","https://openalex.org/W2621048556","https://openalex.org/W2735607295","https://openalex.org/W2756275803","https://openalex.org/W2768211408","https://openalex.org/W2772317693","https://openalex.org/W2775103799","https://openalex.org/W2783741806","https://openalex.org/W2793130454","https://openalex.org/W2798145945","https://openalex.org/W2810563447","https://openalex.org/W2953384591","https://openalex.org/W2963106521","https://openalex.org/W2963197901","https://openalex.org/W2964253222","https://openalex.org/W4293846201","https://openalex.org/W4297747285","https://openalex.org/W4394663350","https://openalex.org/W6600428322","https://openalex.org/W6631498818","https://openalex.org/W6639204139","https://openalex.org/W6713134421","https://openalex.org/W6732069952","https://openalex.org/W6739868092","https://openalex.org/W6745899033","https://openalex.org/W6750718090","https://openalex.org/W6864274290"],"related_works":["https://openalex.org/W3199964822","https://openalex.org/W3048601286","https://openalex.org/W3034267371","https://openalex.org/W2965925734","https://openalex.org/W4232132981","https://openalex.org/W4238046985","https://openalex.org/W3164948662","https://openalex.org/W3003242282","https://openalex.org/W3153597579","https://openalex.org/W3012824888"],"abstract_inverted_index":{"The":[0],"success":[1],"of":[2,30,37,82,119,172,205],"a":[3,22,59,88],"detection":[4],"model":[5],"depends":[6],"heavily":[7],"on":[8,46,92],"feature":[9,89,120],"engineering.":[10],"Deep":[11],"learning":[12,25,39,72,94,143,153,185,207],"has":[13],"been":[14],"successfully":[15],"applied":[16],"in":[17,208],"numerous":[18],"research":[19,45,211],"fields":[20],"as":[21],"universal":[23],"representation":[24,42],"method.":[26],"However,":[27],"the":[28,35,79,83,109,116,148,170,175,180,192,203],"heterogeneity":[29],"flow-level":[31,189],"communication":[32,41,61,75,101,130,194],"data":[33,68,76,195],"obstructs":[34],"application":[36,204],"deep":[38,71,93,152,184,206],"to":[40,64,69,73,95,164,182,187],"learning,":[43],"and":[44,99,114,123,144,157,167],"this":[47,55],"problem":[48],"is":[49,179],"still":[50],"lacking.":[51],"To":[52,169],"cope":[53],"with":[54,134,137],"problem,":[56],"we":[57,86],"propose":[58,87],"heterogeneous":[60,74,129,188,193],"data-encoding":[62],"approach":[63,111],"extract":[65],"fixed-size":[66],"encoding":[67],"apply":[70,183],"by":[77,151,160],"preserving":[78],"spatiotemporal":[80],"characteristics":[81],"data.":[84,131],"Then,":[85],"extractor":[90],"based":[91],"automatically":[96],"learn":[97,124],"hierarchical":[98,125],"robust":[100,156],"representations":[102,126],"without":[103],"expert":[104],"knowledge.":[105],"We":[106],"show":[107],"that":[108],"proposed":[110],"can":[112,198],"replicate":[113],"optimize":[115],"key":[117],"steps":[118],"engineering":[121],"well":[122],"directly":[127],"from":[128],"Moreover,":[132],"compared":[133],"features":[135,149],"extracted":[136,150],"principal":[138],"component":[139],"analysis":[140],"(PCA),":[141],"manifold":[142],"manually":[145],"crafted":[146],"methods,":[147],"are":[154,158],"more":[155],"characterized":[159],"their":[161],"better":[162],"adaptability":[163],"various":[165],"classifiers":[166],"datasets.":[168],"best":[171],"our":[173],"knowledge,":[174],"initial":[176],"work":[177],"here":[178],"first":[181],"techniques":[186],"data;":[190],"consequently,":[191],"processing":[196],"method":[197],"provide":[199],"technical":[200],"means":[201],"for":[202],"other":[209],"communication-related":[210],"fields.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
