{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:17:10Z","timestamp":1774466230400,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T00:00:00Z","timestamp":1721692800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T00:00:00Z","timestamp":1721692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11432-023-4010-4","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:01:31Z","timestamp":1722211291000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder"],"prefix":"10.1007","volume":"67","author":[{"given":"Xiang","family":"Luo","sequence":"first","affiliation":[]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,23]]},"reference":[{"key":"4010_CR1","doi-asserted-by":"publisher","first-page":"108658","DOI":"10.1016\/j.comnet.2021.108658","volume":"202","author":"K Lin","year":"2022","unstructured":"Lin K, Xu X, Xiao F. MFFusion: a multi-level features fusion model for malicious traffic detection based on deep learning. Comput Networks, 2022, 202: 108658","journal-title":"Comput Networks"},{"key":"4010_CR2","unstructured":"Yang L, Guo W, Hao Q, et al. CADE: detecting and explaining concept drift samples for security applications. In: Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), 2021. 2327\u20132344"},{"key":"4010_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama J, \u017dliobait\u0117 I, Bifet A, et al. A survey on concept drift adaptation. ACM Comput Surv, 2014, 46: 1\u201337","journal-title":"ACM Comput Surv"},{"key":"4010_CR4","doi-asserted-by":"publisher","first-page":"7643","DOI":"10.3390\/s22197643","volume":"22","author":"M H Pathmaperuma","year":"2022","unstructured":"Pathmaperuma M H, Rahulamathavan Y, Dogan S, et al. Deep learning for encrypted traffic classification and unknown data detection. Sensors, 2022, 22: 7643","journal-title":"Sensors"},{"key":"4010_CR5","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Zeng X, et al. Malware traffic classification using convolutional neural network for representation learning. In: Proceedings of International Conference on Information Networking (ICOIN), 2017. 712\u2013717","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"4010_CR6","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang W, Sheng Y, Wang J, et al. HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access, 2017, 6: 1792\u20131806","journal-title":"IEEE Access"},{"key":"4010_CR7","unstructured":"Jin D, Xie J, Chen S, et al. Zero-day traffic identification using one-dimension convolutional neural networks and auto encoder machine. In: Proceedings of IFIP Networking Conference (Networking), 2020. 559\u2013563"},{"key":"4010_CR8","doi-asserted-by":"crossref","unstructured":"Tang R, Yang Z, Li Z, et al. ZeroWall: detecting zero-day web attacks through encoder-decoder recurrent neural networks. In: Proceedings of IEEE Conference on Computer Communications, 2020. 2479\u20132488","DOI":"10.1109\/INFOCOM41043.2020.9155278"},{"key":"4010_CR9","doi-asserted-by":"crossref","unstructured":"Zhao L, Cai L, Yu A, et al. Prototype-based malware traffic classification with novelty detection. In: Proceedings of the 21st International Conference on Information and Communications Security, Beijing, 2020. 3\u201317","DOI":"10.1007\/978-3-030-41579-2_1"},{"key":"4010_CR10","doi-asserted-by":"crossref","unstructured":"Chen Y, Li Z, Shi J, et al. Not afraid of the unseen: a Siamese network based scheme for unknown traffic discovery. In: Proceedings of IEEE Symposium on Computers and Communications (ISCC), 2020. 1\u20137","DOI":"10.1109\/ISCC50000.2020.9219734"},{"key":"4010_CR11","doi-asserted-by":"crossref","unstructured":"Hadsell R, Chopra S, LeCun Y. Dimensionality reduction by learning an invariant mapping. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201906), 2006. 1735\u20131742","DOI":"10.1109\/CVPR.2006.100"},{"key":"4010_CR12","doi-asserted-by":"crossref","unstructured":"Bromley J, Guyon I, LeCun Y, et al. Signature verification using a \u201cSiamese\u201d time delay neural network. In: Proceedings of Advances in Neural Information Processing Systems, 1993. 6","DOI":"10.1142\/9789812797926_0003"},{"key":"4010_CR13","doi-asserted-by":"crossref","unstructured":"Jamshed M A, Lee J, Moon S, et al. Kargus: a highly-scalable software-based intrusion detection system. In: Proceedings of the ACM Conference on Computer and Communications Security, 2012. 317\u2013328","DOI":"10.1145\/2382196.2382232"},{"key":"4010_CR14","doi-asserted-by":"crossref","unstructured":"Nam J, Jamshed M, Choi B, et al. Haetae: scaling the performance of network intrusion detection with many-core processors. In: Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses, Kyoto, 2015. 89\u2013110","DOI":"10.1007\/978-3-319-26362-5_5"},{"key":"4010_CR15","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","volume":"38","author":"A A Aburomman","year":"2016","unstructured":"Aburomman A A, Reaz M B I. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl Soft Computing, 2016, 38: 360\u2013372","journal-title":"Appl Soft Computing"},{"key":"4010_CR16","doi-asserted-by":"crossref","unstructured":"Zhang J, Li F, Ye F, et al. Autonomous unknown-application filtering and labeling for dl-based traffic classifier update. In: Proceedings of IEEE Conference on Computer Communications, 2020. 397\u2013405","DOI":"10.1109\/INFOCOM41043.2020.9155292"},{"key":"4010_CR17","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1109\/TNSM.2021.3122940","volume":"18","author":"L Yang","year":"2021","unstructured":"Yang L, Finamore A, Jun F, et al. Deep learning and zero-day traffic classification: lessons learned from a commercial-grade dataset. IEEE Trans Netw Serv Manage, 2021, 18: 4103\u20134118","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"4010_CR18","doi-asserted-by":"crossref","unstructured":"Xia Y, Xiong G, Li Z, et al. GMAF: a novel gradient-based model with ArcFace for network traffic classification. In: Proceedings of IEEE 23rd International Conference on High Performance Computing & Communications; 7th International Conference on Data Science & Systems; 19th International Conference on Smart City; 7th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), 2021. 291\u2013300","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00064"},{"key":"4010_CR19","doi-asserted-by":"crossref","unstructured":"Hwang R H, Peng M C, Huang C W. Detecting IOT malicious traffic based on autoencoder and convolutional neural network. In: Proceedings of IEEE Globecom Workshops (GC Wkshps), 2019. 1\u20136","DOI":"10.1109\/GCWkshps45667.2019.9024425"},{"key":"4010_CR20","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2018.11.005","volume":"81","author":"B Selvakumar","year":"2019","unstructured":"Selvakumar B, Muneeswaran K. Firefly algorithm based feature selection for network intrusion detection. Comput Secur, 2019, 81: 148\u2013155","journal-title":"Comput Secur"},{"key":"4010_CR21","doi-asserted-by":"crossref","unstructured":"Javaid A, Niyaz Q, Sun W, et al. A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2016. 21\u201326","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"4010_CR22","unstructured":"Xiao Z, Yan Q, Amit Y. Likelihood regret: an out-of-distribution detection score for variational auto-encoder. In: Proceedings of the 34th International Conference on Neural Information Processing Systems, 2020. 20685\u201320696"},{"key":"4010_CR23","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari A H, Ghorbani A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of International Conference on Information Systems Security and Privacy, 2018","DOI":"10.5220\/0006639801080116"},{"key":"4010_CR24","doi-asserted-by":"crossref","unstructured":"Bendale A, Boult T E. Towards open set deep networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016. 1563\u20131572","DOI":"10.1109\/CVPR.2016.173"},{"key":"4010_CR25","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10994-016-5610-8","volume":"106","author":"M P R Junior","year":"2017","unstructured":"Junior M P R, de Souza R M, Werneck R O, et al. Nearest neighbors distance ratio open-set classifier. Mach Learn, 2017, 106: 359\u2013386","journal-title":"Mach Learn"},{"key":"4010_CR26","doi-asserted-by":"crossref","unstructured":"Cao A, Luo Y, Klabjan D. Open-set recognition with Gaussian mixture variational autoencoders. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2021. 6877\u20136884","DOI":"10.1609\/aaai.v35i8.16848"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-4010-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-023-4010-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-4010-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T19:41:06Z","timestamp":1758310866000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-023-4010-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,23]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["4010"],"URL":"https:\/\/doi.org\/10.1007\/s11432-023-4010-4","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,23]]},"assertion":[{"value":"22 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"182302"}}