{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:41:33Z","timestamp":1767292893694,"version":"3.48.0"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472153"],"award-info":[{"award-number":["62472153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2025JJ50350"],"award-info":[{"award-number":["2025JJ50350"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ton.2025.3610853","type":"journal-article","created":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T17:24:47Z","timestamp":1759512287000},"page":"872-887","source":"Crossref","is-referenced-by-count":0,"title":["REAPER: Real-Time Detection of Malicious Traffic via Deep Time-Series Embedding Analysis"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0062-0213","authenticated-orcid":false,"given":"Dan","family":"Tang","sequence":"first","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3865-0315","authenticated-orcid":false,"given":"Boru","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering (CSEE), Hunan University (HNU), Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5074-1363","authenticated-orcid":false,"given":"Wei","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Hunan University of Science and Technology (HNUST), Xiangtan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-4048","authenticated-orcid":false,"given":"Keqin","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The State University of New York, New Paltz, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7610-3677","authenticated-orcid":false,"given":"Wenqiang","family":"Jin","sequence":"additional","affiliation":[{"name":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"3829","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","volume-title":"Proc. USENIX Secur. Symp.","author":"Liu"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2973992"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2025.3541143"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3300521"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3331240"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3121388"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3340088"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544268"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262121"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229026"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623123"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3242134"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3275768"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233777"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref17","first-page":"571","article-title":"HorusEye: A realtime IoT malicious traffic detection framework using programmable switches","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Dong"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544266"},{"key":"ref19","first-page":"6203","article-title":"An efficient design of intelligent network data plane","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhou"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3472716.3472846"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229100"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507726"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179404"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544263"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228996"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23080"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3357072"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3349180"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3704434"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"volume-title":"Reaper Code Repository","year":"2025","author":"Liu","key":"ref33"},{"volume-title":"Whipser Code Repository","year":"2021","author":"Fu","key":"ref34"},{"volume-title":"Kisune Code Repository","year":"2018","author":"Mirsky","key":"ref35"},{"volume-title":"Flowlens Code Repository","year":"2021","author":"Barradas","key":"ref36"},{"volume-title":"CIC-DDoS2019","year":"2019","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3266757"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126053"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"volume-title":"Mininet","year":"2010","key":"ref41"},{"volume-title":"The Internet Topology Zoo","year":"2012","key":"ref42"},{"volume-title":"CIC-AndMal2017","year":"2017","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796697"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3160879"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3289488"},{"key":"ref47","first-page":"743","article-title":"SketchLib: Enabling efficient sketch-based monitoring on programmable switches","volume-title":"Proc. 19th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Namkung"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3522104"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103167"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3259474"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3119055"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796978"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3228493"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318960"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616631"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111228"}],"container-title":["IEEE Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723154\/11317935\/11192781.pdf?arnumber=11192781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:36:36Z","timestamp":1767292596000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11192781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/ton.2025.3610853","relation":{},"ISSN":["2998-4157"],"issn-type":[{"type":"electronic","value":"2998-4157"}],"subject":[],"published":{"date-parts":[[2026]]}}}