{"id":"https://openalex.org/W4414646618","doi":"https://doi.org/10.1186/s42400-025-00376-3","title":"A network flow fingerprinting method with adaptive embedding strength","display_name":"A network flow fingerprinting method with adaptive embedding strength","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4414646618","doi":"https://doi.org/10.1186/s42400-025-00376-3"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00376-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00376-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00376-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00376-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034831625","display_name":"Yali Yuan","orcid":"https://orcid.org/0000-0002-9258-9929"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yali Yuan","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100585956","display_name":"Jian Ge","orcid":"https://orcid.org/0000-0003-0647-3426"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Ge","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034831625"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13730871,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.8321999907493591},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6862000226974487},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.487199991941452},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.46470001339912415},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.413100004196167},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34380000829696655},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.34040001034736633},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.3391999900341034}],"concepts":[{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.8321999907493591},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6862000226974487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6439999938011169},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.487199991941452},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.46470001339912415},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.413100004196167},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4083000123500824},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3790000081062317},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34380000829696655},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.34040001034736633},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3391999900341034},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.33379998803138733},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.30320000648498535},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29899999499320984},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.28060001134872437},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.2741999924182892},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C2988224531","wikidata":"https://www.wikidata.org/wiki/Q20830730","display_name":"Network structure","level":2,"score":0.2538999915122986}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00376-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00376-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00376-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:879bc1a1acd44231b06891d82b5b1af6","is_oa":true,"landing_page_url":"https://doaj.org/article/879bc1a1acd44231b06891d82b5b1af6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-15 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00376-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00376-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00376-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G130652162","display_name":null,"funder_award_id":"202304","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2030376154","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2658232742","display_name":null,"funder_award_id":"BK20230412","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G315644984","display_name":null,"funder_award_id":"Grant No. 62302097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3622784231","display_name":null,"funder_award_id":"SBK2023041256","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G3910829908","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G5515911019","display_name":null,"funder_award_id":"Grant No. SBK2023041256","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8970236852","display_name":null,"funder_award_id":"62302097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414646618.pdf","grobid_xml":"https://content.openalex.org/works/W4414646618.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W17062318","https://openalex.org/W75879620","https://openalex.org/W1498436455","https://openalex.org/W1600930409","https://openalex.org/W1967376787","https://openalex.org/W2034866749","https://openalex.org/W2101160944","https://openalex.org/W2146148058","https://openalex.org/W2174837112","https://openalex.org/W2620096549","https://openalex.org/W2766282988","https://openalex.org/W2888125116","https://openalex.org/W2958782078","https://openalex.org/W2982163850","https://openalex.org/W3102751315","https://openalex.org/W3104102522","https://openalex.org/W3193750732","https://openalex.org/W3212599909","https://openalex.org/W4200594565","https://openalex.org/W4226034793","https://openalex.org/W4288057717","https://openalex.org/W4304083991","https://openalex.org/W4304092681","https://openalex.org/W4306889093","https://openalex.org/W4388185308","https://openalex.org/W4391724818"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Network":[1],"flow":[2,75],"fingerprinting":[3,76],"technology":[4],"extends":[5],"the":[6,19,24,28,31,39,57,66,110,120,124,127,146,186,191],"number":[7],"of":[8,30,46,59,68,161,169,176],"embedded":[9],"bits":[10],"based":[11],"on":[12],"watermarking,":[13],"thereby":[14],"conveying":[15],"additional":[16],"information":[17,60],"about":[18],"marked":[20],"traffic,":[21],"such":[22],"as":[23],"traffic":[25],"origin":[26],"or":[27],"identity":[29],"marking":[32],"entity.":[33],"However,":[34],"existing":[35],"fingerprinting/watermarking":[36],"techniques":[37],"follow":[38],"same":[40],"embedding":[41,69,80,83,122,139,187],"pattern":[42],"under":[43],"various":[44],"levels":[45],"network":[47,74,89],"noise,":[48],"which":[49],"hinders":[50],"adaptation":[51],"to":[52,105,118,189,196],"high-noise":[53,180],"environments":[54],"and":[55,71,91,152,171],"increases":[56],"risk":[58],"loss.":[61],"Therefore,":[62],"this":[63],"paper":[64],"introduces":[65],"concept":[67],"strength":[70,84,140,188],"proposes":[72],"a":[73,101,132,137,172],"method":[77],"with":[78],"adaptive":[79,86],"strength.":[81],"The":[82],"is":[85],"for":[87,123],"different":[88],"flows":[90],"can":[92,184],"be":[93],"freely":[94],"adjusted.":[95],"To":[96],"achieve":[97],"this,":[98],"we":[99,113,130],"design":[100],"two-stage":[102],"training":[103],"framework":[104],"generate":[106],"fingerprint":[107],"delays.":[108],"In":[109,126],"first":[111],"stage,":[112,129,148],"use":[114],"an":[115,166],"autoencoder":[116],"architecture":[117],"obtain":[119],"optimal":[121],"fingerprint.":[125],"second":[128],"introduce":[131],"new":[133],"component-the":[134],"Adaptor-to":[135],"produce":[136],"minimized":[138],"that":[141],"eliminates":[142],"redundant":[143],"embeddings":[144],"from":[145,194],"previous":[147],"thus":[149],"balancing":[150],"robustness":[151],"invisibility.":[153],"Experimental":[154],"results":[155],"show":[156],"that,":[157],"after":[158],"two":[159],"stages":[160],"training,":[162],"our":[163,182],"scheme":[164,183],"achieves":[165],"extraction":[167,192],"rate":[168,175,193],"98.33%":[170],"bit":[173],"error":[174],"0.83%.":[177],"Furthermore,":[178],"in":[179],"environments,":[181],"adjust":[185],"improve":[190],"60.83":[195],"over":[197],"90%.":[198]},"counts_by_year":[],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
