{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:53Z","timestamp":1773511133902,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796964","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"51-60","source":"Crossref","is-referenced-by-count":13,"title":["Dual-track Protocol Reverse Analysis Based on Share Learning"],"prefix":"10.1109","author":[{"given":"Weiyao","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Computing Technology,Chinese Academy of Sciences"}]},{"given":"Xuying","family":"Meng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology,Chinese Academy of Sciences"}]},{"given":"Yujun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology,Chinese Academy of Sciences"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2381230"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.556"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9129-7_42"},{"key":"ref30","first-page":"478","article-title":"Unsupervised deep embedding for clustering analysis","author":"xie","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848073"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22734-0_23"},{"key":"ref35","first-page":"538","author":"zeng","year":"2015","journal-title":"Int Symp Recent Advances in Intrusion Detection"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1566\/1\/012103"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.488"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2016.0076"},{"key":"ref12","article-title":"Attacks on power systems: Hackers, malware","author":"kabay","year":"2010","journal-title":"Network World website"},{"key":"ref13","article-title":"nemesys: Network message syntax reverse engineering by analysis of the intrinsic structure of individual messages","author":"kleber","year":"2018","journal-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155275"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref16","article-title":"Discriminative topic modeling with logistic lda","author":"korshunova","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/3477.764879"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2015.83"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866355"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203896"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053243"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3008694"},{"key":"ref5","first-page":"1","article-title":"Discoverer: Automatic protocol reverse engineering from network traces","author":"cui","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1154"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905353"},{"key":"ref2","article-title":"Security evaluation of communication protocols in common criteria","author":"bossert","year":"2012","journal-title":"Proc of IEEE International Conference on Communications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720662"},{"key":"ref1","article-title":"Network protocol analysis using bioinformatics algorithms","author":"beddoe","year":"2004","journal-title":"Toorcon"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624128"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref23","author":"pereyda","year":"2019","journal-title":"boofuzz documentation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6096"},{"key":"ref25","article-title":"Visualizing data using t-sne","volume":"9","author":"van der maaten","year":"2008","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796964.pdf?arnumber=9796964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:00:59Z","timestamp":1657569659000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796964","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}