{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:13:37Z","timestamp":1774066417437,"version":"3.50.1"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2025.3585170","type":"journal-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T13:46:16Z","timestamp":1751463976000},"page":"2424-2438","source":"Crossref","is-referenced-by-count":1,"title":["UniNet: A Unified Multi-Granular Traffic Modeling Framework for Network Security"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3639-7965","authenticated-orcid":false,"given":"Binghui","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore"}]},{"given":"Dinil Mon","family":"Divakaran","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, A*STAR, Fusionopolis, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6764-268X","authenticated-orcid":false,"given":"Mohan","family":"Gurusamy","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Google transparency report","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.02.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2765719"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"ref8","first-page":"6203","article-title":"An efficient design of intelligent network data plane","volume-title":"Proc. 32nd USENIX Security Symp. (USENIX Security)","author":"Zhou"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00079"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544251"},{"key":"ref13","first-page":"607","article-title":"Subverting Website fingerprinting defenses with robust traffic representation","volume-title":"Proc. 32nd USENIX Security Symp. (USENIX Security)","author":"Shen"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS59830.2024.10575079"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3639037"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.17487\/rfc7011","volume-title":"Specification of the IP flow information export (IPFIX) protocol for the exchange of flow information","author":"Claise","year":"2013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420969"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187306"},{"key":"ref19","first-page":"3829","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security)","author":"Liu"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623107"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.004.2400680"},{"key":"ref23","first-page":"589","article-title":"An input-agnostic hierarchical deep learning framework for traffic fingerprinting","volume-title":"Proc. 32nd USENIX Security Symp. (USENIX Security)","author":"Qu"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384732"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3322152"},{"key":"ref26","first-page":"3005","article-title":"ATLAS: A sequence-based learning approach for attack investigation","volume-title":"Proc. 30th USENIX Security Symp. (USENIX security)","author":"Alsaheel"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453101"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.350"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564109"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.eacl-main.45"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10445876"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/484"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00852"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457315"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50032-3"},{"key":"ref38","first-page":"24991","article-title":"On embeddings for numerical features in tabular deep learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Gorishniy"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2007-11602"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1352"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3578707"},{"key":"ref42","first-page":"517","article-title":"XLNet: Generalized autoregressive pretraining for language understanding","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Yang"},{"key":"ref43","article-title":"LLAMA: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv:2302.13971"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00988"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.298"},{"key":"ref47","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP60621.2024.00042"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref51","volume-title":"DoQ+QUIC Web traffic dataset","author":"Csikor","year":"2024"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2003.1260106"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006151"},{"key":"ref55","first-page":"1","article-title":"Traffic anomaly detection using K-means clustering","volume-title":"Proc. GI\/ITG Workshop MMBNET","volume":"7","author":"M\u00fcnz"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00207"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453083"},{"key":"ref59","first-page":"19","article-title":"An LSTM framework for modeling network traffic","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Lazaris"},{"key":"ref60","first-page":"435","article-title":"XAI for transformers: Better explanations through conservative propagation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ali"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.385"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00084"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484758"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539085"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3633777"},{"key":"ref66","article-title":"NetGPT: Generative pretrained transformer for network traffic","author":"Meng","year":"2023","journal-title":"arXiv:2304.09513"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref68","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","volume-title":"Proc. NIPS","author":"Mikolov"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3545541"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2009.5072188"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963289"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.14"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3301293"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11063437.pdf?arnumber=11063437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:56:27Z","timestamp":1768856187000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11063437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3585170","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}