{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:03:20Z","timestamp":1768518200414,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372425"],"award-info":[{"award-number":["62372425"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["Y202093"],"award-info":[{"award-number":["Y202093"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/icpads67057.2025.11323024","type":"proceedings-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:36:54Z","timestamp":1768423014000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Boosting Malicious Traffic Detection Accuracy with Stacked Feature Fusion and Attention Mechanism"],"prefix":"10.1109","author":[{"given":"Menghui","family":"Wu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China,Hefei,Anhui,China,230027"}]},{"given":"Xuanbo","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China,Hefei,Anhui,China,230027"}]},{"given":"Zhongxiang","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China,Hefei,Anhui,China,230027"}]},{"given":"Lutong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,Network and Information Center,Hefei,Anhui,China,230026"}]},{"given":"Yan","family":"Zhuang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,Network and Information Center,Hefei,Anhui,China,230026"}]},{"given":"Kaiping","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China,Hefei,Anhui,China,230027"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943249"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3342716"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3402439"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09589-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494088"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2024.138423"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-32182-6_16"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00061"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102507"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC56324.2022.10065869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.31987\/ijict.7.2.290"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1117\/12.2015616"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC57788.2023.10233524"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.31026\/j.eng.2022.05.05"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CIS58238.2022.00035"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9343-4_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102215"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24508"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10436976"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3019893"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.091"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-91805-z"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103580"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04350-6"},{"issue":"3.24","key":"ref29","first-page":"479","article-title":"A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems","volume":"7","author":"Panigrahi","year":"2018","journal-title":"International Journal of Engineering & Technology"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICOASE56293.2022.10075591"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.8362"}],"event":{"name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","location":"Hefei, China","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11322805\/11322871\/11323024.pdf?arnumber=11323024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T07:12:34Z","timestamp":1768461154000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11323024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icpads67057.2025.11323024","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}