{"id":"https://openalex.org/W4381744221","doi":"https://doi.org/10.1109/cscwd57460.2023.10152839","title":"Matrix of Fused Features-based Approach for Tor Application Classification","display_name":"Matrix of Fused Features-based Approach for Tor Application Classification","publication_year":2023,"publication_date":"2023-05-24","ids":{"openalex":"https://openalex.org/W4381744221","doi":"https://doi.org/10.1109/cscwd57460.2023.10152839"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd57460.2023.10152839","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd57460.2023.10152839","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Dong Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dong Liu","raw_affiliation_strings":["Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China"],"affiliations":[{"raw_affiliation_string":"Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","institution_ids":["https://openalex.org/I92178344"]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China","institution_ids":["https://openalex.org/I92178344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100428579","display_name":"Can Wang","orcid":"https://orcid.org/0000-0002-5102-1464"},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Can Wang","raw_affiliation_strings":["Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China"],"affiliations":[{"raw_affiliation_string":"Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","institution_ids":["https://openalex.org/I92178344"]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China","institution_ids":["https://openalex.org/I92178344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100414775","display_name":"Weidong Zhang","orcid":"https://orcid.org/0000-0002-4700-1276"},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weidong Zhang","raw_affiliation_strings":["Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China"],"affiliations":[{"raw_affiliation_string":"Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","institution_ids":["https://openalex.org/I92178344"]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China","institution_ids":["https://openalex.org/I92178344"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026640557","display_name":"Xuangou Wu","orcid":"https://orcid.org/0000-0002-7912-8757"},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuangou Wu","raw_affiliation_strings":["Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China","Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet, Ma'anshan, China"],"affiliations":[{"raw_affiliation_string":"Anhui University of Technology,School of Computer Science and Technology,Ma'anshan,China","institution_ids":["https://openalex.org/I92178344"]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Ma'anshan, China","institution_ids":["https://openalex.org/I92178344"]},{"raw_affiliation_string":"Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet, Ma'anshan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I92178344"],"apc_list":null,"apc_paid":null,"fwci":0.1719,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54248283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1415","last_page":"1420"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8204323649406433},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5720374584197998},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5514902472496033},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.538886547088623},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5372282266616821},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.521632730960846},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4874146282672882},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4331338703632355},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4225393235683441},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3418287932872772},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11154133081436157}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8204323649406433},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5720374584197998},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5514902472496033},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.538886547088623},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5372282266616821},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.521632730960846},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4874146282672882},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4331338703632355},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4225393235683441},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3418287932872772},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11154133081436157},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd57460.2023.10152839","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd57460.2023.10152839","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1982728146","https://openalex.org/W2102004764","https://openalex.org/W2194775991","https://openalex.org/W2591712613","https://openalex.org/W2613715541","https://openalex.org/W2742891804","https://openalex.org/W2743678626","https://openalex.org/W2763433824","https://openalex.org/W2767719329","https://openalex.org/W2919493784","https://openalex.org/W2963516518","https://openalex.org/W2976836186","https://openalex.org/W3018055328","https://openalex.org/W3121886859","https://openalex.org/W3145680685","https://openalex.org/W3147822227","https://openalex.org/W3216006944","https://openalex.org/W4225143166"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W2179036394","https://openalex.org/W2372764048","https://openalex.org/W2012465643","https://openalex.org/W4206905835","https://openalex.org/W1568303756","https://openalex.org/W2773751105","https://openalex.org/W2613715541","https://openalex.org/W4293863212","https://openalex.org/W2050261031"],"abstract_inverted_index":{"Encrypted":[0],"traffic":[1,43],"identification":[2],"is":[3],"critical":[4],"for":[5,26,49,134],"detecting":[6],"network":[7],"attacks":[8],"and":[9,77,110,125],"improving":[10,50],"the":[11,47,64,81,94,121],"quality":[12],"of":[13,20,42,66,80],"service,":[14],"making":[15],"it":[16],"an":[17,59],"essential":[18],"aspect":[19],"cyberspace":[21],"security.":[22],"However,":[23],"existing":[24,139],"methods":[25],"classifying":[27],"Tor":[28,89,114,135],"applications":[29],"are":[30],"limited":[31],"by":[32],"their":[33],"reliance":[34],"on":[35,120],"single":[36],"packet":[37,75],"size":[38],"or":[39],"time-related":[40,78],"features":[41,79,106],"flows,":[44],"which":[45],"limits":[46],"potential":[48,105],"classification":[51,61],"accuracy.":[52],"To":[53],"address":[54],"this":[55],"challenge,":[56],"we":[57],"propose":[58],"end-to-end":[60],"framework":[62,72],"called":[63],"Matrix":[65],"Fused":[67],"Features":[68],"Network":[69],"(MFFN).":[70],"This":[71],"fuses":[73],"direction,":[74],"size,":[76],"raw":[82],"flows":[83],"to":[84,102],"generate":[85],"matrices":[86,109],"that":[87,129],"represent":[88],"applications.":[90,115],"We":[91,116],"then":[92],"use":[93],"residual":[95],"net-work,":[96],"a":[97],"popular":[98],"deep":[99],"learning":[100],"model,":[101],"automatically":[103],"extract":[104],"from":[107],"these":[108],"classify":[111],"them":[112],"into":[113],"evaluate":[117],"our":[118],"approach":[119],"public":[122],"dataset":[123],"ISCXTor2016,":[124],"experimental":[126],"results":[127],"demonstrate":[128],"MFFN":[130],"achieves":[131],"97%":[132],"accuracy":[133],"application":[136],"classification,":[137],"outperforming":[138],"methods.":[140]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
