{"id":"https://openalex.org/W4285059485","doi":"https://doi.org/10.1109/tnsm.2022.3183247","title":"Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification","display_name":"Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification","publication_year":2022,"publication_date":"2022-06-15","ids":{"openalex":"https://openalex.org/W4285059485","doi":"https://doi.org/10.1109/tnsm.2022.3183247"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3183247","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3183247","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009334351","display_name":"Ying Hu","orcid":"https://orcid.org/0000-0002-6261-6965"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying Hu","raw_affiliation_strings":["School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100651077","display_name":"Wenchao Chen","orcid":"https://orcid.org/0000-0002-8875-1161"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenchao Chen","raw_affiliation_strings":["School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024350232","display_name":"Bomiao Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bomiao Jiang","raw_affiliation_strings":["School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009334351"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":1.856,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.87479271,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"19","issue":"4","first_page":"4583","last_page":"4599"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8325492143630981},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.6478332281112671},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6289094686508179},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6277101039886475},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6095282435417175},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5972816944122314},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5956875681877136},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5450085401535034},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4834926426410675},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47545406222343445},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4201878309249878},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.4185715913772583},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09404560923576355}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8325492143630981},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.6478332281112671},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6289094686508179},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6277101039886475},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6095282435417175},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5972816944122314},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5956875681877136},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5450085401535034},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4834926426410675},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47545406222343445},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4201878309249878},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.4185715913772583},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09404560923576355},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3183247","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3183247","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3946546080","display_name":null,"funder_award_id":"62172093","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2000756828","https://openalex.org/W2128532956","https://openalex.org/W2150779517","https://openalex.org/W2158215699","https://openalex.org/W2190207511","https://openalex.org/W2343828539","https://openalex.org/W2537766808","https://openalex.org/W2559655401","https://openalex.org/W2591712613","https://openalex.org/W2605422749","https://openalex.org/W2743678626","https://openalex.org/W2754353227","https://openalex.org/W2790832484","https://openalex.org/W2792764867","https://openalex.org/W2795182330","https://openalex.org/W2896457183","https://openalex.org/W2912386632","https://openalex.org/W2915004662","https://openalex.org/W2919493784","https://openalex.org/W2944968054","https://openalex.org/W2963174729","https://openalex.org/W2963403784","https://openalex.org/W2963516518","https://openalex.org/W2963960318","https://openalex.org/W2982387504","https://openalex.org/W2998483179","https://openalex.org/W3012902672","https://openalex.org/W3017387519","https://openalex.org/W3035655772","https://openalex.org/W3047014424","https://openalex.org/W3116203245","https://openalex.org/W3120227884","https://openalex.org/W3127084347","https://openalex.org/W3208904656","https://openalex.org/W6629028937","https://openalex.org/W6678470764","https://openalex.org/W6735913928","https://openalex.org/W6749825310","https://openalex.org/W6766811465","https://openalex.org/W6814369953"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W4390569940","https://openalex.org/W2888392564","https://openalex.org/W4361193272","https://openalex.org/W4310278675","https://openalex.org/W4388422664","https://openalex.org/W2806259446","https://openalex.org/W2179036394","https://openalex.org/W4206905835","https://openalex.org/W2613715541"],"abstract_inverted_index":{"As":[0],"more":[1,3],"and":[2,41,115,148,163,216,236],"network":[4],"applications":[5],"have":[6],"adopted":[7],"encryption":[8],"for":[9,53,104,112,118,159,168,178,200],"user":[10],"privacy,":[11],"it":[12],"poses":[13],"a":[14,54,61,97,137,181,220],"great":[15],"challenge":[16],"to":[17,35,67,78,141,193,212],"identify":[18],"increasing":[19],"types":[20,59],"of":[21,39,57,75,81,84,133,197,244],"encrypted":[22,105],"traffic.":[23],"Recent":[24],"methods":[25,50],"mainly":[26],"focus":[27],"on":[28,60,126],"leveraging":[29],"machine":[30],"learning":[31,34,101],"or":[32],"deep":[33],"improve":[36,194],"the":[37,65,79,86,143,189,195,198,242],"effectiveness":[38],"classification,":[40,107,235],"achieve":[42],"good":[43,116],"results":[44,225,240],"in":[45,175,219,233,241],"their":[46],"experiments.":[47],"However,":[48],"most":[49],"are":[51],"developed":[52],"limited":[55],"number":[56],"traffic":[58,106],"close-world":[62],"dataset,":[63],"lacking":[64],"ability":[66],"transfer":[68],"knowledge":[69],"learned":[70],"from":[71,150],"available":[72],"labeled":[73],"data":[74,87],"known":[76],"classes":[77,218],"identification":[80,243],"unknown":[82,120,245],"classes,":[83],"which":[85],"is":[88,124],"unseen":[89,201,217],"during":[90],"training.":[91],"In":[92],"this":[93],"paper,":[94],"we":[95,208],"propose":[96],"novel":[98],"attribute-based":[99],"zero-shot":[100],"(ZSL)":[102],"framework":[103,123],"with":[108,171],"both":[109,176,214],"fine":[110],"granularity":[111],"general":[113],"classification":[114],"scalability":[117],"identifying":[119],"classes.":[121,152,202,246],"The":[122,223],"based":[125],"our":[127,228],"defined":[128],"attribute":[129,169],"semantic":[130],"space,":[131],"consisting":[132],"two":[134],"components:":[135],"i)":[136],"feature-attribute":[138],"embedding":[139,162],"model":[140,185,192],"learn":[142],"mapping":[144],"between":[145],"flow":[146,160],"features":[147],"attributes":[149],"seen":[151,215],"We":[153],"use":[154],"Temporal":[155],"Convolution":[156],"Network":[157],"(TCN)":[158],"feature":[161,183],"Simple":[164],"Recurrent":[165],"Units":[166],"(SRU)":[167],"embedding,":[170],"attention":[172],"mechanisms":[173],"introduced":[174],"models":[177],"interpretability.":[179],"ii)":[180],"GAN-based":[182],"generation":[184],"FAE-G":[186],"that":[187,227],"leverages":[188],"trained":[190],"FAE":[191],"generalization":[196],"classifier":[199],"For":[203],"generalized":[204],"ZSL":[205],"(GZSL)":[206],"tasks,":[207],"introduce":[209],"gradient-based":[210],"rejection":[211],"classify":[213],"two-step":[221],"way.":[222],"experimental":[224],"demonstrate":[226],"method":[229],"shows":[230],"excellent":[231],"performance":[232],"fine-grained":[234],"also":[237],"achieves":[238],"presentable":[239]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
