{"id":"https://openalex.org/W7116786903","doi":"https://doi.org/10.1109/tifs.2025.3647211","title":"DQSA: Dynamic Quantized Self-Attention for Multi-Task Encrypted Network Traffic Classification","display_name":"DQSA: Dynamic Quantized Self-Attention for Multi-Task Encrypted Network Traffic Classification","publication_year":2025,"publication_date":"2025-12-22","ids":{"openalex":"https://openalex.org/W7116786903","doi":"https://doi.org/10.1109/tifs.2025.3647211"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3647211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3647211","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004360292","display_name":"Yongming Chen","orcid":"https://orcid.org/0000-0001-8474-0476"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Yongming Chen","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120975378","display_name":"Hongsheng Lan","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hongsheng Lan","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120975838","display_name":"Bah Hwee Gwee","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Bah Hwee Gwee","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037704808","display_name":"Qi Cao","orcid":"https://orcid.org/0000-0002-5272-3644"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qi Cao","raw_affiliation_strings":["School of Computing Science, University of Glasgow, Glasgow, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Glasgow, Glasgow, U.K","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120984662","display_name":"Sirajudeen Gulam Razul","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Sirajudeen Gulam Razul","raw_affiliation_strings":["Temasek Laboratories, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"Temasek Laboratories, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081644475","display_name":"Zhiping Lin","orcid":"https://orcid.org/0000-0001-8752-0532"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Zhiping Lin","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004360292"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80752933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"304","last_page":"318"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.004600000102072954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6003999710083008},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5881999731063843},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5548999905586243},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4959999918937683},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.46459999680519104},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4422000050544739},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.40389999747276306},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.3955000042915344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8748000264167786},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6003999710083008},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5548999905586243},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4959999918937683},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4927000105381012},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.46459999680519104},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4422000050544739},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.40389999747276306},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.3955000042915344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3880000114440918},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3873000144958496},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.3864000141620636},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.3255999982357025},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.311599999666214},{"id":"https://openalex.org/C2993807640","wikidata":"https://www.wikidata.org/wiki/Q103709453","display_name":"Attention network","level":2,"score":0.30070000886917114},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C203274722","wikidata":"https://www.wikidata.org/wiki/Q7001161","display_name":"Network performance","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2025.3647211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3647211","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/212543","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/212543","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2240067561","https://openalex.org/W2343828539","https://openalex.org/W2516809705","https://openalex.org/W2551393996","https://openalex.org/W2566079294","https://openalex.org/W2606697812","https://openalex.org/W2743678626","https://openalex.org/W2750674396","https://openalex.org/W2794826941","https://openalex.org/W2912386632","https://openalex.org/W2942239200","https://openalex.org/W2949072481","https://openalex.org/W2972810968","https://openalex.org/W2979200397","https://openalex.org/W2981318525","https://openalex.org/W2994688391","https://openalex.org/W3091056778","https://openalex.org/W3107345204","https://openalex.org/W3121886859","https://openalex.org/W3132607382","https://openalex.org/W3174009192","https://openalex.org/W3178694028","https://openalex.org/W3194357095","https://openalex.org/W4200077209","https://openalex.org/W4224315052","https://openalex.org/W4296229353","https://openalex.org/W4297099562","https://openalex.org/W4312893735","https://openalex.org/W4321380758","https://openalex.org/W4321793449","https://openalex.org/W4324032736","https://openalex.org/W4360993886","https://openalex.org/W4385079917","https://openalex.org/W4385245566","https://openalex.org/W4386076670","https://openalex.org/W4387298163","https://openalex.org/W4388979610","https://openalex.org/W4394567468","https://openalex.org/W4396629515","https://openalex.org/W4396856040","https://openalex.org/W4400975454","https://openalex.org/W4401609043"],"related_works":[],"abstract_inverted_index":{"Network":[0],"traffic":[1,17,43,71,117,194],"classification":[2],"is":[3],"crucial":[4],"for":[5,68,190],"both":[6],"network":[7,70,116,193],"security":[8],"and":[9,50,105,113,131,147,167],"management.":[10],"Despite":[11],"advances":[12],"in":[13],"deep":[14],"learning-based":[15],"multi-task":[16,33,69,192],"classification,":[18],"existing":[19,179],"models":[20],"often":[21],"struggle":[22],"to":[23,127,138,183],"jointly":[24],"handle":[25,114],"multiple":[26],"tasks":[27,36],"while":[28,185],"providing":[29,186],"interpretable":[30,51,98,187],"insights.":[31],"In":[32],"scenarios,":[34],"different":[35,87],"rely":[37],"on":[38,92,144,160,170],"distinct":[39],"regions":[40],"of":[41,48,164,174],"the":[42,46,76,121,133,161,171,177],"sequence,":[44],"motivating":[45],"use":[47],"dynamic":[49],"attention":[52,84,99,189],"mechanisms.":[53],"To":[54,110],"this":[55],"end,":[56],"we":[57,119],"propose":[58],"Dynamic":[59],"Quantized":[60,123],"Self-Attention":[61,124],"(DQSA),":[62],"a":[63],"unified":[64],"framework":[65],"specifically":[66],"designed":[67],"classification.":[72,195],"At":[73],"its":[74],"core,":[75],"Task":[77],"Gated":[78],"Attention":[79],"Router":[80],"(TGAR)":[81],"dynamically":[82],"associates":[83],"heads":[85],"with":[86],"tasks,":[88],"enabling":[89],"adaptive":[90],"focus":[91],"task-specific":[93,188],"patterns.":[94],"This":[95],"mechanism":[96],"provides":[97],"scores,":[100],"which":[101],"help":[102],"analyze":[103],"misclassifications":[104],"guide":[106],"further":[107],"model":[108],"refinement.":[109],"improve":[111],"efficiency":[112],"diverse":[115],"features,":[118],"introduce":[120],"Soft":[122],"Head":[125],"(SQ-SAH)":[126],"reduce":[128],"computational":[129],"complexity":[130],"extend":[132],"Rotary":[134],"Position":[135],"Embedding":[136],"(RoPE)":[137],"accommodate":[139],"these":[140],"features.":[141],"Extensive":[142],"experiments":[143],"ISCX":[145,165],"VPN-NonVPN":[146,166],"DCI-LTE":[148],"datasets":[149],"demonstrate":[150],"that":[151],"DQSA":[152],"consistently":[153],"outperforms":[154],"state-of-the-art":[155],"baselines,":[156],"achieving":[157],"92.85%":[158],"accuracy":[159,169],"encapsulation-level":[162],"task":[163,173],"93.17%":[168],"application-level":[172],"DCI-LTE,":[175],"surpassing":[176],"strongest":[178],"methods":[180],"by":[181],"up":[182],"2.65%,":[184],"efficient":[191]},"counts_by_year":[],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-12-22T00:00:00"}
