{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:29:58Z","timestamp":1776443398819,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972219,62202406,61972189"],"award-info":[{"award-number":["61972219,62202406,61972189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research and Development Program of Shenzhen","award":["JCYJ20190813174403598, SGDX20190918101201696"],"award-info":[{"award-number":["JCYJ20190813174403598, SGDX20190918101201696"]}]},{"name":"Overseas Research Cooperation Fund of Tsinghua Shenzhen International Graduate School","award":["HW2021013"],"award-info":[{"award-number":["HW2021013"]}]},{"name":"HK ITF Project","award":["GHP\/052\/19SZ"],"award-info":[{"award-number":["GHP\/052\/19SZ"]}]},{"name":"Shenzhen Science and Technology Innovation Commission: Research Center for Computer Network (Shenzhen) Ministry of Education"},{"name":"the Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583227","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"2066-2075","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":106,"title":["TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4048-4516","authenticated-orcid":false,"given":"Haozhen","family":"Zhang","sequence":"first","affiliation":[{"name":"Shenzhen International Graduate School, Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1457-6329","authenticated-orcid":false,"given":"Le","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1521-9542","authenticated-orcid":false,"given":"Xi","family":"Xiao","sequence":"additional","affiliation":[{"name":"Shenzhen International Graduate School, Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6071-473X","authenticated-orcid":false,"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9425-1657","authenticated-orcid":false,"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[{"name":"University of Molise, Italy and IIT-CNR, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0895-9585","authenticated-orcid":false,"given":"Qixu","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network. In IEEE International Conference on High Performance Computing and Communications. 478\u2013486","author":"Cai Wei","year":"2021","unstructured":"Wei Cai, Gaopeng Gou, Minghao Jiang, Chang Liu, Gang Xiong, and Zhen Li. 2021. MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network. In IEEE International Conference on High Performance Computing and Communications. 478\u2013486."},{"key":"e_1_3_2_1_2_1","volume-title":"On Provable Benefits of Depth in Training Graph Convolutional Networks. In Conference on Neural Information Processing Systems. 9936\u20139949","author":"Cong Weilin","year":"2021","unstructured":"Weilin Cong, Morteza Ramezani, and Mehrdad Mahdavi. 2021. On Provable Benefits of Depth in Training Graph Convolutional Networks. In Conference on Neural Information Processing Systems. 9936\u20139949."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3151937"},{"key":"e_1_3_2_1_5_1","volume-title":"Characterization of Encrypted and VPN Traffic Using Time-Related Features. In International Conference on Information Systems Security and Privacy. 407\u2013414","author":"Gil Gerard\u00a0Drapper","year":"2016","unstructured":"Gerard\u00a0Drapper Gil, Arash\u00a0Habibi Lashkari, Mohammad Mamun, and Ali\u00a0A. Ghorbani. 2016. Characterization of Encrypted and VPN Traffic Using Time-Related Features. In International Conference on Information Systems Security and Privacy. 407\u2013414."},{"key":"e_1_3_2_1_6_1","volume-title":"Neural Message Passing for Quantum Chemistry. In International Conference on Machine Learning. 1263\u20131272","author":"Gilmer Justin","year":"2017","unstructured":"Justin Gilmer, Samuel\u00a0S. Schoenholz, Patrick\u00a0F. Riley, Oriol Vinyals, and George\u00a0E. Dahl. 2017. Neural Message Passing for Quantum Chemistry. In International Conference on Machine Learning. 1263\u20131272."},{"key":"e_1_3_2_1_7_1","volume-title":"Inductive Representation Learning on Large Graphs. In Conference on Neural Information Processing Systems.","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium. 1187\u20131203","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: a Robust Scalable Website Fingerprinting Technique. In USENIX Security Symposium. 1187\u20131203."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_11_1","volume-title":"IFIP\/IEEE Symposium on Integrated Network Management. 376\u2013383","author":"Huoh Ting-Li","year":"2021","unstructured":"Ting-Li Huoh, Yan Luo, and Tong Zhang. 2021. Encrypted Network Traffic Classification Using a Geometric Learning Model. In IFIP\/IEEE Symposium on Integrated Network Management. 376\u2013383."},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Machine Learning. 448\u2013456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In International Conference on Machine Learning. 448\u2013456."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"e_1_3_2_1_14_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations.","author":"N.","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_15_1","volume-title":"Characterization of Tor Traffic Using Time Based Features. In International Conference on Information System Security and Privacy. 253\u2013262","author":"Lashkari Arash\u00a0Habibi","year":"2017","unstructured":"Arash\u00a0Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful\u00a0Islam Mamun, and Ali\u00a0A. Ghorbani. 2017. Characterization of Tor Traffic Using Time Based Features. In International Conference on Information System Security and Privacy. 253\u2013262."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI51764.2021.9486831"},{"key":"e_1_3_2_1_17_1","volume-title":"ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. In The Web Conference. 633\u2013642","author":"Lin Xinjie","year":"2022","unstructured":"Xinjie Lin, Gang Xiong, Gaopeng Gou, Zhen Li, Junzheng Shi, and Jing Yu. 2022. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. In The Web Conference. 633\u2013642."},{"key":"e_1_3_2_1_18_1","volume-title":"FS-Net: A Flow Sequence Network For Encrypted Traffic Classification. In IEEE Conference on Computer Communications. 1171\u20131179","author":"Liu Chang","year":"2019","unstructured":"Chang Liu, Longtao He, Gang Xiong, Zigang Cao, and Zhen Li. 2019. FS-Net: A Flow Sequence Network For Encrypted Traffic Classification. In IEEE Conference on Computer Communications. 1171\u20131179."},{"key":"e_1_3_2_1_19_1","volume-title":"Fast Application Activity Recognition with Encrypted Traffic. In International Conference on Wireless Algorithms, Systems, and Applications. 314\u2013325","author":"Liu Xue","year":"2021","unstructured":"Xue Liu, Shigeng Zhang, Huihui Li, and Weiping Wang. 2021. Fast Application Activity Recognition with Encrypted Traffic. In International Conference on Wireless Algorithms, Systems, and Applications. 314\u2013325."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_2_1_21_1","volume-title":"GAP-WF: Graph Attention Pooling Network for Fine-grained SSL\/TLS Website Fingerprinting. In IEEE International Joint Conference on Neural Network. 1\u20138.","author":"Lu Jie","year":"2021","unstructured":"Jie Lu, Gaopeng Gou, Majing Su, Dong Song, Chang Liu, Chen Yang, and Yangyang Guan. 2021. GAP-WF: Graph Attention Pooling Network for Fine-grained SSL\/TLS Website Fingerprinting. In IEEE International Joint Conference on Neural Network. 1\u20138."},{"key":"e_1_3_2_1_22_1","volume-title":"Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification. In International Workshop on Quality of Service. 1\u201310","author":"Mao Kelong","year":"2021","unstructured":"Kelong Mao, Xi Xiao, Guangwu Hu, Xiapu Luo, Bin Zhang, and Shutao Xia. 2021. Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification. In International Workshop on Quality of Service. 1\u201310."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457904"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485925"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/983\/1\/012060"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071441"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC53510.2021.9609369"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_31_1","volume-title":"AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic. In IEEE European Symposium on Security and Privacy. 439\u2013454","author":"Taylor F.","year":"2016","unstructured":"Vincent\u00a0F. Taylor, Riccardo Spolaor, Mauro Conti, and Ivan Martinovic. 2016. AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic. In IEEE European Symposium on Security and Privacy. 439\u2013454."},{"key":"e_1_3_2_1_32_1","volume-title":"FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. In Annual Network and Distributed System Security Symposium.","author":"van Ede Thijs","year":"2020","unstructured":"Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel\u00a0J. Dubois, and Martina Lindorfer. 2020. FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. In Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_33_1","volume-title":"Conference on Neural Information Processing Systems.","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_1_34_1","volume-title":"Graph Attention Networks. In International Conference on Learning Representations.","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_35_1","volume-title":"Simplifying Graph Convolutional Networks. In International Conference on Machine Learning. 6861\u20136871","author":"Wu Felix","year":"2019","unstructured":"Felix Wu, Amauri Souza, Tianyi Zhang, Christopher Fifty, Tao Yu, and Kilian Weinberger. 2019. Simplifying Graph Convolutional Networks. In International Conference on Machine Learning. 6861\u20136871."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01214-2"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108267"},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Learning Representations.","author":"Xu Keyulu","year":"2019","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks?. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_39_1","volume-title":"Representation Learning on Graphs with Jumping Knowledge Networks. In International Conference on Machine Learning. 5453\u20135462","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Chengtao Li, Yonglong Tian, Tomohiro Sonobe, Ken ichi Kawarabayashi, and Stefanie Jegelka. 2018. Representation Learning on Graphs with Jumping Knowledge Networks. In International Conference on Machine Learning. 5453\u20135462."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3179955"},{"key":"e_1_3_2_1_41_1","volume-title":"Graph Convolutional Networks for Text Classification. In AAAI Conference on Artificial Intelligence. 7370\u20137377","author":"Yao Liang","year":"2019","unstructured":"Liang Yao, Chengsheng Mao, and Yuan Luo. 2019. Graph Convolutional Networks for Text Classification. In AAAI Conference on Artificial Intelligence. 7370\u20137377."},{"key":"e_1_3_2_1_42_1","volume-title":"Design Space for Graph Neural Networks. In Conference on Neural Information Processing Systems. 17009\u201317021","author":"You Jiaxuan","year":"2020","unstructured":"Jiaxuan You, Zhitao Ying, and Jure Leskovec. 2020. Design Space for Graph Neural Networks. In Conference on Neural Information Processing Systems. 17009\u201317021."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109084"},{"key":"e_1_3_2_1_44_1","volume-title":"Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features. In International Conference on Science of Cyber Security. 154\u2013170","author":"Zhang Hui","year":"2021","unstructured":"Hui Zhang, Gaopeng Gou, Gang Xiong, Chang Liu, Yuewen Tan, and Ke Ye. 2021. Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features. In International Conference on Science of Cyber Security. 154\u2013170."},{"key":"e_1_3_2_1_45_1","volume-title":"Distribution Alignment: A Unified Framework for Long-Tail Visual Recognition. In Computer Vision and Pattern Recognition. 2361\u20132370.","author":"Zhang Songyang","year":"2021","unstructured":"Songyang Zhang, Zeming Li, Shipeng Yan, Xuming He, and Jian Sun. 2021. Distribution Alignment: A Unified Framework for Long-Tail Visual Recognition. In Computer Vision and Pattern Recognition. 2361\u20132370."},{"key":"e_1_3_2_1_46_1","volume-title":"GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection. Security and Communication Networks","author":"Zheng Juan","year":"2022","unstructured":"Juan Zheng, Zhiyong Zeng, and Tao Feng. 2022. GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection. Security and Communication Networks 2022, 1 (2022), 11\u00a0pages."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380090"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583227","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:19Z","timestamp":1750183759000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583227"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":47,"alternative-id":["10.1145\/3543507.3583227","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583227","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}