{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T17:16:56Z","timestamp":1772558216267,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFC2206402"],"award-info":[{"award-number":["2023YFC2206402"]}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association Chinese Academy of Sciences","doi-asserted-by":"crossref","award":["2021156"],"award-info":[{"award-number":["2021156"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Program of Key Laboratory of Network Assessment Technology, CAS"},{"DOI":"10.13039\/501100002367","name":"Program of Beijing Key Laboratory of Network Security and Protection Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3426304","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T17:23:40Z","timestamp":1720632220000},"page":"6871-6885","source":"Crossref","is-referenced-by-count":25,"title":["ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2881-9259","authenticated-orcid":false,"given":"Xueying","family":"Han","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Song","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Junrong","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7185-990X","authenticated-orcid":false,"given":"Bo","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zhigang","family":"Lu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Baoxu","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00058"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108117"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103171"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583227"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545983"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103210"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23080"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262121"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488690"},{"key":"ref15","first-page":"625","article-title":"Rosetta: Enabling robust TLS encrypted traffic classification in diverse network environments with TCP-aware traffic augmentation","volume-title":"Proc. ACM Turing Award Celebration Conf. China","author":"Xie"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3083422"},{"key":"ref18","article-title":"VAEMax: Open-set intrusion detection based on OpenMax and variational autoencoder","author":"Qiu","year":"2024","journal-title":"arXiv:2403.04193"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318960"},{"key":"ref20","first-page":"825","article-title":"Horizontal privilege escalation in trusted applications","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Suciu"},{"key":"ref21","article-title":"Encrypted DNS\u2013> privacy? A traffic analysis perspective","author":"Siby","year":"2019","journal-title":"arXiv:1906.09682"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3300521"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991123"},{"key":"ref24","article-title":"Learning confidence for out-of-distribution detection in neural networks","author":"DeVries","year":"2018","journal-title":"arXiv:1802.04865"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.167"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484758"},{"key":"ref28","volume-title":"Automl for Image, Text, Time Series, and Tabular Data","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref30","first-page":"3971","article-title":"Dos and don\u2019ts of machine learning in computer security","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Quiring"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10592040.pdf?arnumber=10592040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T04:07:41Z","timestamp":1721534861000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10592040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3426304","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}