{"id":"https://openalex.org/W7123354314","doi":"https://doi.org/10.1109/tifs.2026.3653575","title":"End-to-End Open-Set Semi-Supervised Learning for Fine-Grained Encrypted Traffic Classification","display_name":"End-to-End Open-Set Semi-Supervised Learning for Fine-Grained Encrypted Traffic Classification","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7123354314","doi":"https://doi.org/10.1109/tifs.2026.3653575"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3653575","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3653575","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122887324","display_name":"Qian Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Yang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069292806","display_name":"Wenxuan He","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenxuan He","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122870540","display_name":"Minghao Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minghao Chen","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122850430","display_name":"Hongyu Du","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyu Du","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049410460","display_name":"Sisi Shao","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sisi Shao","raw_affiliation_strings":["School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Fei Wu","orcid":"https://orcid.org/0000-0001-5498-4947"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Wu","raw_affiliation_strings":["School of Automation, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037407589","display_name":"ShangDong Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangdong Liu","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122848540","display_name":"Yimu Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yimu Ji","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5097335789","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0002-1969-2591"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5122887324"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08699359,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1347","last_page":"1362"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.7534000277519226},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6509000062942505},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6177999973297119},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.5231999754905701},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5024999976158142},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4487000107765198},{"id":"https://openalex.org/keywords/traffic-flow","display_name":"Traffic flow (computer networking)","score":0.40380001068115234},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.38749998807907104},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.3637999892234802}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8391000032424927},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.7534000277519226},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6509000062942505},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6177999973297119},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5534999966621399},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.5231999754905701},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5024999976158142},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47760000824928284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4546999931335449},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4487000107765198},{"id":"https://openalex.org/C207512268","wikidata":"https://www.wikidata.org/wiki/Q3074551","display_name":"Traffic flow (computer networking)","level":2,"score":0.40380001068115234},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.38749998807907104},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.3578999936580658},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.352400004863739},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.29499998688697815},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.2782999873161316},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.2540000081062317},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C2779888511","wikidata":"https://www.wikidata.org/wiki/Q244156","display_name":"Traffic congestion","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3653575","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3653575","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6698790788650513,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G4784768317","display_name":null,"funder_award_id":"FNSRFP-2021-YB-15","funder_id":"https://openalex.org/F4320328245","funder_display_name":"National University Research Fund of China"},{"id":"https://openalex.org/G5133005619","display_name":null,"funder_award_id":"2023YFB2904004","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8569679628","display_name":null,"funder_award_id":"2023YFB2904000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320328245","display_name":"National University Research Fund of China","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W188199274","https://openalex.org/W2062173166","https://openalex.org/W2119880843","https://openalex.org/W2124863430","https://openalex.org/W2591712613","https://openalex.org/W2605422749","https://openalex.org/W2606697812","https://openalex.org/W2897202622","https://openalex.org/W2914204846","https://openalex.org/W2963197901","https://openalex.org/W2963265635","https://openalex.org/W2963516518","https://openalex.org/W3007562398","https://openalex.org/W3047014424","https://openalex.org/W3094502228","https://openalex.org/W3114936184","https://openalex.org/W3116203245","https://openalex.org/W3120227884","https://openalex.org/W3165871547","https://openalex.org/W3181596493","https://openalex.org/W4224315052","https://openalex.org/W4285292284","https://openalex.org/W4310494058","https://openalex.org/W4312768656","https://openalex.org/W4312823356","https://openalex.org/W4313069509","https://openalex.org/W4367047070","https://openalex.org/W4385245566","https://openalex.org/W4387011098","https://openalex.org/W4387011225","https://openalex.org/W4388505058","https://openalex.org/W4393219177","https://openalex.org/W4396723284","https://openalex.org/W4396757496","https://openalex.org/W4400489845","https://openalex.org/W4402302142"],"related_works":[],"abstract_inverted_index":{"Encrypted":[0,112],"traffic":[1,23,59,70,97,113,161,215],"classification":[2,53,185],"is":[3],"crucial":[4],"for":[5],"enhancing":[6],"network":[7,15],"management,":[8],"service":[9],"quality,":[10],"and":[11,72,91,143,197,212],"security.":[12],"However,":[13],"real-world":[14,195],"environments":[16],"are":[17],"inherently":[18],"open-world":[19,83,217],"scenarios":[20],"in":[21,208,216],"which":[22,49],"not":[24],"only":[25],"consists":[26],"of":[27,36,168,186],"known":[28,69,160,169,211],"classes":[29,71],"but":[30],"also":[31],"includes":[32],"the":[33,46,198],"continuous":[34],"emergence":[35],"unknown":[37,58,75,96,163,187,213],"classes.":[38,102,170],"Existing":[39],"deep":[40,174],"learning":[41,157,179],"methods":[42,86],"typically":[43],"rely":[44],"on":[45,82,117,193],"closed-world":[47],"assumption,":[48],"significantly":[50],"limits":[51],"their":[52],"performance":[54,207],"when":[55],"dealing":[56],"with":[57,180],"types.":[60],"This":[61,123],"limitation":[62],"makes":[63],"it":[64],"challenging":[65],"to":[66,93,99,140,158,182],"accurately":[67],"classify":[68],"effectively":[73],"identify":[74],"ones.":[76],"Although":[77],"few":[78],"studies":[79],"have":[80],"focused":[81],"scenarios,":[84],"these":[85,105],"often":[87],"use":[88],"staged":[89],"strategies":[90],"struggle":[92],"reliably":[94],"detect":[95],"or":[98],"estimate":[100],"novel":[101,151],"To":[103],"address":[104],"challenges,":[106],"we":[107,132,148],"propose":[108],"an":[109,172],"end-to-end":[110],"Fine-grained":[111],"Classification":[114],"method":[115,124,204],"based":[116],"Open-set":[118],"Semi-supervised":[119],"Learning,":[120],"called":[121],"FEC-OSL.":[122],"comprises":[125],"three":[126,194],"mutually":[127],"reinforcing":[128],"core":[129],"components.":[130],"First,":[131],"design":[133],"a":[134,150],"dual-branch":[135],"flow":[136,145],"feature":[137,178],"extraction":[138],"module":[139],"capture":[141],"detailed":[142],"discriminative":[144],"features.":[146],"Second,":[147],"introduce":[149],"energy-based":[152],"perspective":[153],"that":[154,201],"leverages":[155],"energy-boundary":[156],"distinguish":[159],"from":[162],"traffic,":[164],"enabling":[165],"precise":[166],"detection":[167],"Finally,":[171],"adaptive":[173],"clustering":[175,181],"approach":[176],"integrates":[177],"achieve":[183],"fine-grained":[184],"flows.":[188],"We":[189],"conduct":[190],"extensive":[191],"experiments":[192],"datasets,":[196],"results":[199],"validate":[200],"our":[202],"proposed":[203],"exhibits":[205],"outstanding":[206],"handling":[209],"both":[210],"encrypted":[214],"scenarios.":[218]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-14T00:00:00"}
