{"id":"https://openalex.org/W4396629515","doi":"https://doi.org/10.1109/tifs.2024.3396624","title":"Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture Search","display_name":"Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture Search","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396629515","doi":"https://doi.org/10.1109/tifs.2024.3396624"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3396624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3396624","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040994348","display_name":"Xixi Zhang","orcid":"https://orcid.org/0000-0002-0944-2214"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xixi Zhang","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739881","display_name":"Qin Wang","orcid":"https://orcid.org/0000-0002-1142-1340"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Wang","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102616213","display_name":"Maoyang Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Maoyang Qin","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017851308","display_name":"Yu Wang","orcid":"https://orcid.org/0000-0001-7763-4261"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Wang","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016337773","display_name":"Tomoaki Ohtsuki","orcid":"https://orcid.org/0000-0003-3961-1426"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomoaki Ohtsuki","raw_affiliation_strings":["Department of Information and Computer Science, Keio University, Yokohama, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, Keio University, Yokohama, Kanagawa, Japan","institution_ids":["https://openalex.org/I203951103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031253024","display_name":"Bamidele Adebisi","orcid":"https://orcid.org/0000-0001-9071-9120"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bamidele Adebisi","raw_affiliation_strings":["Department of Engineering, Faculty of Science and Engineering, Manchester Metropolitan University, Manchester, U.K","Department of Engineering, Faculty of Science and Engineering, Manchester Metropolitan University, Manchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Engineering, Faculty of Science and Engineering, Manchester Metropolitan University, Manchester, U.K","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Engineering, Faculty of Science and Engineering, Manchester Metropolitan University, Manchester, United Kingdom","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087599025","display_name":"Hikmet Sari","orcid":"https://orcid.org/0000-0001-8114-6164"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hikmet Sari","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027367677","display_name":"Guan Gui","orcid":"https://orcid.org/0000-0003-3888-2881"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guan Gui","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5040994348"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":9.8618,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.98531324,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"5245","last_page":"5256"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8704460859298706},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6222183704376221},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6024165749549866},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5576775670051575},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5201454758644104},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4668717086315155},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.46467453241348267},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4408806264400482},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4225490689277649},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.41622602939605713},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3880648612976074},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.15187248587608337},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10274791717529297}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8704460859298706},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6222183704376221},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6024165749549866},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5576775670051575},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5201454758644104},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4668717086315155},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.46467453241348267},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4408806264400482},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4225490689277649},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.41622602939605713},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3880648612976074},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.15187248587608337},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10274791717529297},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3396624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3396624","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W2062118960","https://openalex.org/W2062401262","https://openalex.org/W2065890363","https://openalex.org/W2105779206","https://openalex.org/W2321658319","https://openalex.org/W2322493561","https://openalex.org/W2393727648","https://openalex.org/W2586505867","https://openalex.org/W2599600800","https://openalex.org/W2606697812","https://openalex.org/W2784189535","https://openalex.org/W2794538885","https://openalex.org/W2885311373","https://openalex.org/W2897202622","https://openalex.org/W2898623510","https://openalex.org/W2921453769","https://openalex.org/W2959716986","https://openalex.org/W2963516518","https://openalex.org/W2963748489","https://openalex.org/W2967849242","https://openalex.org/W2976836186","https://openalex.org/W2980185226","https://openalex.org/W2998227662","https://openalex.org/W3019166713","https://openalex.org/W3021740526","https://openalex.org/W3022311971","https://openalex.org/W3034942609","https://openalex.org/W3095531713","https://openalex.org/W3138465682","https://openalex.org/W3165205057","https://openalex.org/W3201617817","https://openalex.org/W3204162860","https://openalex.org/W4205145068","https://openalex.org/W4205413245","https://openalex.org/W4205820967","https://openalex.org/W4205875715","https://openalex.org/W4206103323","https://openalex.org/W4206331418","https://openalex.org/W4206495455","https://openalex.org/W4206739656","https://openalex.org/W4226319939","https://openalex.org/W4246193833","https://openalex.org/W4293093536","https://openalex.org/W4312408104","https://openalex.org/W4313036808","https://openalex.org/W4317419733","https://openalex.org/W4320057724","https://openalex.org/W4366375770","https://openalex.org/W4379659755","https://openalex.org/W4385301545","https://openalex.org/W4386918942","https://openalex.org/W4391097191","https://openalex.org/W4391742491","https://openalex.org/W6753278433"],"related_works":["https://openalex.org/W4206357785","https://openalex.org/W4281381188","https://openalex.org/W3192840557","https://openalex.org/W2951211570","https://openalex.org/W4375928479","https://openalex.org/W3167935049","https://openalex.org/W3023427754","https://openalex.org/W3131673289","https://openalex.org/W4393011546","https://openalex.org/W3198847674"],"abstract_inverted_index":{"Malware":[0],"traffic":[1,99,101,164],"classification":[2,198,236],"(MTC)":[3],"is":[4,144,250],"one":[5],"of":[6,14,31,51,155,177,227,243],"the":[7,12,29,87,96,112,125,131,141,151,168,189,225,230,240,244],"important":[8],"research":[9],"topics":[10],"in":[11,45,49,83,180,200,224,239],"field":[13,226],"cyber":[15],"security.":[16],"Existing":[17],"MTC":[18,60,178],"methods":[19,223],"based":[20,27],"on":[21,28,130,146],"deep":[22],"learning":[23],"have":[24],"been":[25],"developed":[26],"assumption":[30],"enough":[32],"high-quality":[33],"samples":[34,76,165],"and":[35,66,137,197,212],"powerful":[36],"computing":[37],"resources.":[38],"However,":[39],"both":[40],"are":[41],"hard":[42],"to":[43,85,106,121,149,166,171,174],"obtain":[44],"real":[46],"applications":[47],"especially":[48],"availability":[50],"IoT.":[52],"In":[53],"this":[54],"paper,":[55],"we":[56,116,159],"propose":[57],"a":[58],"few-shot":[59,162],"(FS-MTC)":[61],"method":[62,93,193],"combining":[63],"knowledge":[64],"transfer":[65],"neural":[67,113,118],"architecture":[68,119],"search":[69,120,123],"(i.e.":[70],"NAS-based":[71,191,232],"FS-MTC)":[72],"with":[73,221],"limited":[74],"training":[75],"as":[77,79,108,251,253],"well":[78],"acceptable":[80],"computational":[81],"resources,":[82],"order":[84],"mitigate":[86],"identified":[88],"challenges.":[89],"Specifically,":[90],"our":[91],"proposed":[92,190,231],"first":[94],"converts":[95],"raw":[97],"network":[98,182],"into":[100],"images":[102],"through":[103],"data":[104,110],"pre-processing":[105],"serve":[107],"input":[109],"for":[111,124],"network.":[114],"Second,":[115],"use":[117,161],"adaptively":[122],"effective":[126],"feature":[127,153],"extraction":[128],"model":[129,143,170],"source":[132,147],"domain":[133],"(including":[134],"Edge-IIoTset,":[135],"Bot-IoT,":[136],"benign":[138],"USTC-TFC2016).":[139],"Third,":[140],"searched":[142],"pre-trained":[145,169],"task":[148],"achieve":[150],"generic":[152],"representation":[154],"malware":[156,163,228],"traffic.":[157],"Finally,":[158],"only":[160],"fine-tune":[167],"quickly":[172],"adapt":[173],"new":[175],"types":[176],"tasks":[179],"realistic":[181],"environments.":[183],"The":[184],"experimental":[185],"results":[186],"show":[187],"that":[188],"FS-MTC":[192,202,233],"has":[194,234],"great":[195],"scalability":[196],"performance":[199],"different":[201],"tasks,":[203],"including":[204],"5-way":[205],"<italic":[206,214],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[207,215],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">K</i>":[208,216],"-shot":[209,217],"USTC-TFC2016":[210,245],"dataset":[211],"10-way":[213],"CIC-IoT":[218],"dataset.":[219],"Compared":[220],"state-of-the-art":[222],"classification,":[229],"higher":[235],"accuracy.":[237],"Especially":[238],"1-shot":[241],"case":[242],"dataset,":[246],"its":[247],"average":[248],"accuracy":[249],"high":[252],"86.91%.":[254]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
