{"id":"https://openalex.org/W4417287952","doi":"https://doi.org/10.1631/fitee.2400487","title":"Active inference of protocol state machines from incomplete message domains","display_name":"Active inference of protocol state machines from incomplete message domains","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W4417287952","doi":"https://doi.org/10.1631/fitee.2400487"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.2400487","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2400487","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033413683","display_name":"Maohua Guo","orcid":"https://orcid.org/0000-0001-7990-4165"},"institutions":[{"id":"https://openalex.org/I4210123940","display_name":"Ministry of Education","ror":"https://ror.org/02xv42m49","country_code":"PT","type":"government","lineage":["https://openalex.org/I4210117458","https://openalex.org/I4210123940"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Maohua Guo","raw_affiliation_strings":["Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210123940"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083796252","display_name":"Yuefei Zhu","orcid":"https://orcid.org/0000-0002-9559-8783"},"institutions":[{"id":"https://openalex.org/I4210123940","display_name":"Ministry of Education","ror":"https://ror.org/02xv42m49","country_code":"PT","type":"government","lineage":["https://openalex.org/I4210117458","https://openalex.org/I4210123940"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Yuefei Zhu","raw_affiliation_strings":["Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210123940"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027205215","display_name":"Jinlong Fei","orcid":"https://orcid.org/0000-0001-8499-9402"},"institutions":[{"id":"https://openalex.org/I4210123940","display_name":"Ministry of Education","ror":"https://ror.org/02xv42m49","country_code":"PT","type":"government","lineage":["https://openalex.org/I4210117458","https://openalex.org/I4210123940"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Jinlong Fei","raw_affiliation_strings":["Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210123940"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033413683"],"corresponding_institution_ids":["https://openalex.org/I4210123940"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2222457,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":"12","first_page":"2529","last_page":"2549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.08910000324249268,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.08910000324249268,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.08460000157356262,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.08030000329017639,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.72079998254776},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5386000275611877},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.5350000262260437},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.47589999437332153},{"id":"https://openalex.org/keywords/two-phase-commit-protocol","display_name":"Two-phase commit protocol","score":0.4690000116825104},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.46399998664855957},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.4244000017642975},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4131999909877777},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.39820000529289246},{"id":"https://openalex.org/keywords/state-diagram","display_name":"State diagram","score":0.39730000495910645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7976999878883362},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.72079998254776},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5386000275611877},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.5350000262260437},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.47589999437332153},{"id":"https://openalex.org/C111009948","wikidata":"https://www.wikidata.org/wiki/Q1067690","display_name":"Two-phase commit protocol","level":5,"score":0.4690000116825104},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.46399998664855957},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43050000071525574},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.4244000017642975},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4131999909877777},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.39820000529289246},{"id":"https://openalex.org/C16671368","wikidata":"https://www.wikidata.org/wiki/Q230885","display_name":"State diagram","level":3,"score":0.39730000495910645},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.3921999931335449},{"id":"https://openalex.org/C162838799","wikidata":"https://www.wikidata.org/wiki/Q596077","display_name":"Counterexample","level":2,"score":0.3776000142097473},{"id":"https://openalex.org/C72434380","wikidata":"https://www.wikidata.org/wiki/Q230930","display_name":"State space","level":2,"score":0.3723999857902527},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36980000138282776},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34209999442100525},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.3411000072956085},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.32580000162124634},{"id":"https://openalex.org/C190290938","wikidata":"https://www.wikidata.org/wiki/Q387015","display_name":"Trie","level":3,"score":0.31189998984336853},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.29760000109672546},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C71065454","wikidata":"https://www.wikidata.org/wiki/Q721869","display_name":"Reverse Address Resolution Protocol","level":4,"score":0.2904999852180481},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28279998898506165},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.27239999175071716},{"id":"https://openalex.org/C165932591","wikidata":"https://www.wikidata.org/wiki/Q1547947","display_name":"Neighbor Discovery Protocol","level":4,"score":0.27129998803138733},{"id":"https://openalex.org/C76885553","wikidata":"https://www.wikidata.org/wiki/Q957589","display_name":"Tunneling protocol","level":4,"score":0.2671999931335449},{"id":"https://openalex.org/C162571340","wikidata":"https://www.wikidata.org/wiki/Q1667988","display_name":"Internet Protocol Control Protocol","level":5,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.2400487","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2400487","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W38765094","https://openalex.org/W1969005071","https://openalex.org/W1989445634","https://openalex.org/W2018506753","https://openalex.org/W2030344070","https://openalex.org/W2055228862","https://openalex.org/W2056325176","https://openalex.org/W2105394284","https://openalex.org/W2145802904","https://openalex.org/W2148913232","https://openalex.org/W2153130498","https://openalex.org/W2164253698","https://openalex.org/W2288490641","https://openalex.org/W2762032850","https://openalex.org/W2888760415","https://openalex.org/W2961010045","https://openalex.org/W2971651357","https://openalex.org/W3047947484","https://openalex.org/W3083977451","https://openalex.org/W3138456218","https://openalex.org/W3190299726","https://openalex.org/W3206655379","https://openalex.org/W3207926955","https://openalex.org/W3217122106","https://openalex.org/W4200251832","https://openalex.org/W4210855568","https://openalex.org/W4220762789","https://openalex.org/W4220837647","https://openalex.org/W4288048363","https://openalex.org/W4324007064","https://openalex.org/W4361010174","https://openalex.org/W4367309743","https://openalex.org/W4387647860","https://openalex.org/W4388933404","https://openalex.org/W4388968089","https://openalex.org/W6959540661"],"related_works":[],"abstract_inverted_index":{"Inferring":[0],"protocol":[1,12,29,41,65,76,127,133,151],"state":[2,30,42,77,152],"machines":[3,43,153],"from":[4,22,79],"observable":[5],"information":[6],"presents":[7],"a":[8,69],"significant":[9],"challenge":[10],"in":[11,26,176],"reverse":[13],"engineering":[14],"(PRE),":[15],"especially":[16],"when":[17],"passively":[18],"collected":[19],"traffic":[20,102],"suffers":[21],"message":[23,82],"loss,":[24],"resulting":[25],"an":[27,35,80,107,170],"incomplete":[28,81],"space.":[31],"This":[32],"paper":[33],"introduces":[34],"innovative":[36],"method":[37,60,147],"for":[38,74,95],"actively":[39],"inferring":[40],"using":[44],"the":[45,62,75,85,96,104,124,160,182],"minimally":[46],"adequate":[47],"teacher":[48],"(MAT)":[49],"framework.":[50],"By":[51],"incorporating":[52],"session":[53],"completion":[54],"and":[55,118,129,138,179,186,191],"deterministic":[56],"mutation":[57],"techniques,":[58],"this":[59,146],"broadens":[61],"range":[63],"of":[64,87,106,173,184],"messages,":[66],"thereby":[67],"constructing":[68],"more":[70,149],"comprehensive":[71,150],"input":[72],"space":[73],"machine":[78],"domain.":[83],"Additionally,":[84],"efficiency":[86],"active":[88],"inference":[89],"is":[90],"improved":[91],"through":[92],"several":[93],"optimizations":[94],"L":[97,161],"M":[98,162],"+":[99,163],"algorithm,":[100],"including":[101],"deduplication,":[103],"construction":[105],"expanded":[108],"prefix":[109],"tree":[110],"acceptor":[111],"(EPTA),":[112],"query":[113],"optimization":[114],"based":[115],"on":[116,123],"responses,":[117],"random":[119],"counterexample":[120],"generation.":[121],"Experiments":[122],"real-time":[125],"streaming":[126],"(RTSP)":[128],"simple":[130],"mail":[131],"transfer":[132],"(SMTP),":[134],"which":[135],"use":[136],"Live555":[137],"Exim":[139],"implementations":[140],"across":[141],"multiple":[142],"versions,":[143],"demonstrate":[144],"that":[145],"yields":[148],"with":[154],"enhanced":[155],"execution":[156,177],"efficiency.":[157],"Compared":[158],"to":[159],"algorithm":[164],"implemented":[165],"by":[166,188],"AALpy,":[167],"Act_Infer":[168],"achieves":[169],"average":[171],"reduction":[172],"approximately":[174,189],"40.7%":[175],"time":[178],"significantly":[180],"reduces":[181],"number":[183],"connections":[185],"interactions":[187],"28.6%":[190],"46.6%,":[192],"respectively.":[193]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-13T00:00:00"}
