{"id":"https://openalex.org/W4414603587","doi":"https://doi.org/10.1109/tifs.2025.3615743","title":"A Zero-Latency Website Identification for QUIC Traffic Based on Feature Alignment","display_name":"A Zero-Latency Website Identification for QUIC Traffic Based on Feature Alignment","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414603587","doi":"https://doi.org/10.1109/tifs.2025.3615743"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3615743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3615743","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022520936","display_name":"Jingwen Tan","orcid":"https://orcid.org/0009-0004-8420-3354"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingwen Tan","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Science and Technology, Harbin Engineering University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028355959","display_name":"Wei Zhao","orcid":"https://orcid.org/0000-0002-0732-4468"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhao","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Science and Technology, Harbin Engineering University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047386042","display_name":"Huanran Wang","orcid":"https://orcid.org/0000-0002-5782-177X"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huanran Wang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Science and Technology, Harbin Engineering University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114929007","display_name":"Shuai Han","orcid":"https://orcid.org/0000-0001-6515-2484"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Han","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Science and Technology, Harbin Engineering University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078314271","display_name":"Mingzhu Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I152033890","display_name":"Hainan Normal University","ror":"https://ror.org/031dhcv14","country_code":"CN","type":"education","lineage":["https://openalex.org/I152033890"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingzhu Lai","raw_affiliation_strings":["College of Mathematics and Statistics, Hainan Normal University, Haikou, China","College of Mathematics and Statistics, Hainan Normal University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Statistics, Hainan Normal University, Haikou, China","institution_ids":["https://openalex.org/I152033890"]},{"raw_affiliation_string":"College of Mathematics and Statistics, Hainan Normal University, China","institution_ids":["https://openalex.org/I152033890"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067423683","display_name":"Wu Yang","orcid":"https://orcid.org/0000-0001-5985-7648"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Yang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","College of Computer Science and Technology, Harbin Engineering University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5022520936"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13978034,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"10556","last_page":"10571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5105000138282776},{"id":"https://openalex.org/keywords/crawling","display_name":"Crawling","score":0.49540001153945923},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.47920000553131104},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.477400004863739},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4368000030517578},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.39980000257492065},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.3921000063419342},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.3824000060558319}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8712999820709229},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5105000138282776},{"id":"https://openalex.org/C100368936","wikidata":"https://www.wikidata.org/wiki/Q1411725","display_name":"Crawling","level":2,"score":0.49540001153945923},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.47920000553131104},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.477400004863739},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45489999651908875},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4368000030517578},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.39980000257492065},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3937999904155731},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3921000063419342},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3824000060558319},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.352400004863739},{"id":"https://openalex.org/C149672775","wikidata":"https://www.wikidata.org/wiki/Q8777","display_name":"Hypertext Transfer Protocol","level":3,"score":0.3474999964237213},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3384999930858612},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3278000056743622},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.2727000117301941},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.2676999866962433},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.25999999046325684},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3615743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3615743","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1984043601","https://openalex.org/W1993568446","https://openalex.org/W2012210084","https://openalex.org/W2034978228","https://openalex.org/W2084413241","https://openalex.org/W2119823327","https://openalex.org/W2272516773","https://openalex.org/W2328176404","https://openalex.org/W2783301790","https://openalex.org/W2790832484","https://openalex.org/W2798658180","https://openalex.org/W2902413139","https://openalex.org/W2958360136","https://openalex.org/W2963043696","https://openalex.org/W2963704216","https://openalex.org/W2964602598","https://openalex.org/W2989013751","https://openalex.org/W2998653622","https://openalex.org/W3018055328","https://openalex.org/W3126325113","https://openalex.org/W3133542152","https://openalex.org/W3136670918","https://openalex.org/W3153511633","https://openalex.org/W3174337559","https://openalex.org/W3175481246","https://openalex.org/W3194860875","https://openalex.org/W3196371845","https://openalex.org/W3206637460","https://openalex.org/W4205516914","https://openalex.org/W4214611271","https://openalex.org/W4225125099","https://openalex.org/W4225696825","https://openalex.org/W4281400209","https://openalex.org/W4289639938","https://openalex.org/W4309686864","https://openalex.org/W4312359569","https://openalex.org/W4312671674","https://openalex.org/W4312935555","https://openalex.org/W4361733589","https://openalex.org/W4364322796","https://openalex.org/W4366607053","https://openalex.org/W4378551887","https://openalex.org/W4385624909","https://openalex.org/W4388856908","https://openalex.org/W4388858184","https://openalex.org/W4389474393","https://openalex.org/W4390659109","https://openalex.org/W4391509241","https://openalex.org/W4392251607","https://openalex.org/W4396758681","https://openalex.org/W4400345370","https://openalex.org/W4401508259","https://openalex.org/W4405599312"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,4,19,27,40,75,82,94,103,121,148,175],"deployment":[2,20],"of":[3,30,86],"QUIC":[5,11,28,79,89,117,143,185],"protocol,":[6],"website":[7,51,104,134,159],"fingerprinting":[8,52],"attacks":[9,54],"targeting":[10],"traffic":[12,29,69,186],"are":[13,112],"becoming":[14],"a":[15,125,170,189],"growing":[16],"concern.":[17],"Since":[18],"is":[21],"incremental,":[22],"attackers":[23],"must":[24],"continuously":[25],"crawl":[26],"new":[31],"QUIC-enabled":[32],"websites":[33],"to":[34,59,73,91,114,116,131,145,173],"update":[35],"their":[36],"attack":[37,76,129],"models.":[38],"For":[39],"latency":[41],"caused":[42],"by":[43,152],"data":[44,61],"crawling":[45],"and":[46,88,142,156,204],"classifier":[47,172],"training,":[48],"existing":[49],"few-shot":[50],"(FSWF)":[53],"rely":[55],"on":[56,109,188,198],"representation":[57,98,165],"learning":[58,99],"mitigate":[60],"dependency.":[62],"To":[63,119],"further":[64],"achieve":[65],"zero-latency":[66,182,214],"identification,":[67],"TCP":[68,87,140,191],"can":[70],"be":[71,146],"applied":[72],"construct":[74],"model":[77,154],"before":[78],"deployment.":[80],"However,":[81],"different":[83],"protocol":[84],"semantics":[85],"lead":[90],"differences":[92,161],"in":[93,147,213],"latent":[95],"features.":[96,135,177],"As":[97],"models":[100],"cannot":[101],"eliminate":[102],"feature":[105,150,160],"differences,":[106],"classifiers":[107],"trained":[108],"TCP-based":[110],"features":[111,141,144],"difficult":[113],"adapt":[115],"traffic.":[118,192],"address":[120],"issue,":[122],"we":[123],"propose":[124],"novel":[126],"cross-protocol":[127,133,158],"FSWF":[128],"method":[130,138,180,209],"fuse":[132],"The":[136,178,207],"proposed":[137,179,208],"forces":[139],"same":[149],"space":[151],"sharing":[153],"parameters,":[155],"reduces":[157],"through":[162],"inter-protocol":[163],"adversarial":[164],"learning.":[166],"Meanwhile,":[167],"it":[168],"utilizes":[169],"non-linear":[171],"fit":[174],"fused":[176],"enables":[181],"identification":[183],"for":[184],"based":[187],"few":[190],"We":[193],"conducted":[194],"comprehensive":[195],"evaluation":[196],"experiments":[197],"public":[199],"datasets":[200],"from":[201],"both":[202],"closed-world":[203],"open-world":[205],"settings.":[206],"outperforms":[210],"state-of-the-art":[211],"methods":[212],"identification.":[215]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
