{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:43:35Z","timestamp":1751388215781,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,13]]},"DOI":"10.1109\/icct52962.2021.9658072","type":"proceedings-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T15:36:39Z","timestamp":1641310599000},"page":"143-151","source":"Crossref","is-referenced-by-count":2,"title":["TPE-MHA: A Malicious Traffic Detection Model Based on Time Position Encoding and Multi-head Attention"],"prefix":"10.1109","author":[{"given":"Yi","family":"Zhai","sequence":"first","affiliation":[{"name":"Information Engineering University,State Key Laboratory of MEAC,ZhengZhou,CHINA"}]},{"given":"Bin","family":"Lu","sequence":"additional","affiliation":[{"name":"Information Engineering University,State Key Laboratory of MEAC,ZhengZhou,CHINA"}]},{"given":"XiaoWei","family":"Li","sequence":"additional","affiliation":[{"name":"Information Engineering University,State Key Laboratory of MEAC,ZhengZhou,CHINA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"ref11","article-title":"A structured self-attentive sentence embedding","author":"lin","year":"2017","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s00500-019-04030-2"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.18653\/v1\/D15-1166"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-658-32182-6_16"},{"key":"ref15","first-page":"2881","article-title":"Machine learning and deep learning methods for cybersecurity","volume":"6","author":"nanda","year":"2019","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"ref16","article-title":"A deep reinforced model for abstractive summarization","author":"paulus","year":"2017","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.5220\/0006639801080116"},{"key":"ref18","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ACCESS.2017.2780250"},{"year":"2019","author":"chong","journal-title":"Traffic classification system based on deep learning","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/COMST.2015.2494502"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.comnet.2020.107258"},{"year":"2019","journal-title":"Report of china internet network security in 2018","article-title":"N. Computer network emergency technical response center","key":"ref5"},{"key":"ref8","first-page":"1971","article-title":"Interpretation and understanding in machine learning","volume":"57","author":"kerui","year":"2020","journal-title":"Journal of Computer research and development"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref2","article-title":"Neural machine translation by jointly learning to align and translate","author":"bahdanau","year":"2014","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/PlatCon.2016.7456805"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.jocs.2017.03.006"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICOIN.2017.7899588"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3405671.3405811"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICIS.2018.8466404"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/NAS.2013.49"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.cose.2020.101923"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/978-3-030-36938-5_24"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.comnet.2020.107315"}],"event":{"name":"2021 IEEE 21st International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2021,10,13]]},"location":"Tianjin, China","end":{"date-parts":[[2021,10,16]]}},"container-title":["2021 IEEE 21st International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9657830\/9657831\/09658072.pdf?arnumber=9658072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T19:51:38Z","timestamp":1659469898000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9658072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icct52962.2021.9658072","relation":{},"subject":[],"published":{"date-parts":[[2021,10,13]]}}}