{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T13:08:27Z","timestamp":1772716107529,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61972219"],"award-info":[{"award-number":["61972219"]}]},{"name":"Overseas Research Cooperation Fund of Tsinghua Shenzhen International Graduate School","award":["HW2021013"],"award-info":[{"award-number":["HW2021013"]}]},{"name":"Singapore Ministry of Education AcRF Tier 2","award":["MOET2EP20121-0006"],"award-info":[{"award-number":["MOET2EP20121-0006"]}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2022A1515010417"],"award-info":[{"award-number":["2022A1515010417"]}]},{"name":"Key Project of Shenzhen Municipality","award":["JSGG20211029095545002"],"award-info":[{"award-number":["JSGG20211029095545002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3637664","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1418-1429","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4892-2440","authenticated-orcid":false,"given":"Xiang","family":"Zhou","sequence":"first","affiliation":[{"name":"Shenzhen International Graduate School, Tsinghua University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1521-9542","authenticated-orcid":false,"given":"Xi","family":"Xiao","sequence":"additional","affiliation":[{"name":"Shenzhen International Graduate School, Tsinghua University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6071-473X","authenticated-orcid":false,"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5012-7151","authenticated-orcid":false,"given":"Bin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Pengcheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3947-9998","authenticated-orcid":false,"given":"Guangwu","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shenzhen Institute of Information Technology,Shenzhen, China, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6595-6650","authenticated-orcid":false,"given":"Tianwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.]. Dapps. https:\/\/www.dapp.com\/dapps Accessed on","year":"2022","unstructured":"[n. d.]. Dapps. https:\/\/www.dapp.com\/dapps Accessed on November 20, 2022."},{"key":"e_1_3_2_1_2_1","volume-title":"MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network. In 2021 IEEE 23rd Int Conf on High Performance Computing & Communications","author":"Cai Wei","year":"2021","unstructured":"Wei Cai, Gaopeng Gou, Minghao Jiang, Chang Liu, Gang Xiong, and Zhen Li. 2021. MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network. In 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys). IEEE, 478--486."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_4_1","volume-title":"ICC 2021-IEEE International Conference on Communications. IEEE, 1--6.","author":"Chen Yige","year":"2021","unstructured":"Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Linshu Ouyang, and Peng Yang. 2021. Incremental learning for mobile encrypted traffic classification. In ICC 2021-IEEE International Conference on Communications. IEEE, 1--6."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677048"},{"key":"e_1_3_2_1_6_1","volume-title":"A session-packets-based encrypted traffic classification using capsule neural networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications","author":"Cui Susu","unstructured":"Susu Cui, Bo Jiang, Zhenzhen Cai, Zhigang Lu, Song Liu, and Jian Liu. 2019. A session-packets-based encrypted traffic classification using capsule neural networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE, 429--436."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3151937"},{"key":"e_1_3_2_1_8_1","volume-title":"2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1558--1573","author":"Gong Jiajun","year":"2022","unstructured":"Jiajun Gong, Wuqi Zhang, Charles Zhang, and Tao Wang. 2022. Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1558--1573."},{"key":"e_1_3_2_1_9_1","unstructured":"Jamie Hayes George Danezis et al. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique.. In USENIX security symposium. 1187--1203."},{"key":"e_1_3_2_1_10_1","volume-title":"Laplacian score for feature selection. Advances in neural information processing systems 18","author":"He Xiaofei","year":"2005","unstructured":"Xiaofei He, Deng Cai, and Partha Niyogi. 2005. Laplacian score for feature selection. Advances in neural information processing systems 18 (2005)."},{"key":"e_1_3_2_1_11_1","volume-title":"International conference on learning representations.","author":"Hinton Geoffrey E","year":"2018","unstructured":"Geoffrey E Hinton, Sara Sabour, and Nicholas Frosst. 2018. Matrix capsules with EM routing. In International conference on learning representations."},{"key":"e_1_3_2_1_12_1","volume-title":"2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE, 376--383","author":"Huoh Ting-Li","year":"2021","unstructured":"Ting-Li Huoh, Yan Luo, and Tong Zhang. 2021. Encrypted Network Traffic Classification Using a Geometric Learning Model. In 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE, 376--383."},{"key":"e_1_3_2_1_13_1","volume-title":"Deep Inside Tor: Exploring Website Fingerprinting Attacks on Tor Traffic in Realistic Settings. In 2022 12th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 148--156","author":"Khajehpour Amirhossein","year":"2022","unstructured":"Amirhossein Khajehpour, Farid Zandi, Navid Malekghaini, Mahdi Hemmatyar, Naeimeh Omidvar, and Mahdi Jafari Siavoshani. 2022. Deep Inside Tor: Exploring Website Fingerprinting Attacks on Tor Traffic in Realistic Settings. In 2022 12th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 148--156."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 781--789","author":"Korczy\u0144ski Maciej","year":"2014","unstructured":"Maciej Korczy\u0144ski and Andrzej Duda. 2014. Markov chain fingerprinting to classify encrypted traffic. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 781--789."},{"key":"e_1_3_2_1_15_1","volume-title":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI). IEEE, 38--46","author":"Li Wenbin","year":"2021","unstructured":"Wenbin Li and Gaspard Quenard. 2021. Towards a Multi-Label Dataset of Internet Traffic for Digital Behavior Classification. In 2021 3rd International Conference on Computer Communication and the Internet (ICCCI). IEEE, 38--46."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796685"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"e_1_3_2_1_18_1","volume-title":"WASA 2021, Nanjing, China, June 25--27, 2021, Proceedings, Part II 16","author":"Liu Xue","year":"2021","unstructured":"Xue Liu, Shigeng Zhang, Huihui Li, and Weiping Wang. 2021. Fast Application Activity Recognition with Encrypted Traffic. In Wireless Algorithms, Systems, and Applications: 16th International Conference, WASA 2021, Nanjing, China, June 25--27, 2021, Proceedings, Part II 16. Springer, 314--325."},{"key":"e_1_3_2_1_19_1","volume-title":"2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8.","author":"Lu Jie","year":"2021","unstructured":"Jie Lu, Gaopeng Gou, Majing Su, Dong Song, Chang Liu, Chen Yang, and Yangyang Guan. 2021. GAP-WF: Graph attention pooling network for fine-grained SSL\/TLS Website fingerprinting. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Fabian Lanze Jan Pennekamp Thomas Engel Andreas Zinnen Martin Henze and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale.. In NDSS.","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_21_1","volume-title":"Tom Van Goethem, and Wouter Joosen","author":"Rimmer Vera","year":"2017","unstructured":"Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2017. Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"Dynamic routing between capsules. Advances in neural information processing systems 30","author":"Sabour Sara","year":"2017","unstructured":"Sara Sabour, Nicholas Frosst, and Geoffrey E Hinton. 2017. Dynamic routing between capsules. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692682"},{"key":"e_1_3_2_1_24_1","volume-title":"2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS). IEEE, 1--10","author":"Shen Meng","year":"2016","unstructured":"Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang, and Fuliang Li. 2016. Certificate-aware encrypted traffic classification using second-order markov chain. In 2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS). IEEE, 1--10."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329053"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329050"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"e_1_3_2_1_30_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_31_1","volume-title":"2020 International Conference on Networking and Network Applications (NaNA). IEEE, 73--80","author":"Wang Shihao","year":"2020","unstructured":"Shihao Wang, Liangmin Wang, Shangnan Yin, Hui Zhao, and Hao Shentu. 2020. CPWF: Cross-platform website fingerprinting based on multi-similarity loss. In 2020 International Conference on Networking and Network Applications (NaNA). IEEE, 73--80."},{"key":"e_1_3_2_1_32_1","volume-title":"Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II 16","author":"Wang Yu","year":"2020","unstructured":"Yu Wang, Zhenzhen Li, Gaopeng Gou, Gang Xiong, Chencheng Wang, and Zhen Li. 2020. Identifying DApps and user behaviors on ethereum via encrypted traffic. In Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II 16. Springer, 62--83."},{"key":"e_1_3_2_1_33_1","volume-title":"Multi-scene Classification of Blockchain Encrypted Traffic. In Blockchain and Trustworthy Systems: Third International Conference, BlockSys 2021","author":"Wang Yu","year":"2021","unstructured":"Yu Wang, Chencheng Wang, Gang Xiong, and Zhen Li. 2021. Multi-scene Classification of Blockchain Encrypted Traffic. In Blockchain and Trustworthy Systems: Third International Conference, BlockSys 2021, Guangzhou, China, August 5--6, 2021, Revised Selected Papers 3. Springer, 329--337."},{"key":"e_1_3_2_1_34_1","volume-title":"Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track: European Conference, ECML PKDD 2021, Bilbao, Spain, September 13--17, 2021, Proceedings, Part IV 21","author":"Wang Yu","year":"2021","unstructured":"Yu Wang, Gang Xiong, Chang Liu, Zhen Li, Mingxin Cui, and Gaopeng Gou. 2021. CQNet: A clustering-based quadruplet network for decentralized application classification via encrypted traffic. In Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track: European Conference, ECML PKDD 2021, Bilbao, Spain, September 13--17, 2021, Proceedings, Part IV 21. Springer, 518--534."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2566669"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Feipeng Yan Ming Xu Tong Qiao Ting Wu Xue Yang Ning Zheng and Kim-Kwang Raymond Choo. 2018. Identifying wechat red packets and fund transfers via analyzing encrypted network traffic. In 2018 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE). IEEE 1426--1432.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00198"},{"key":"e_1_3_2_1_37_1","volume-title":"2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 1551--1556","author":"Yang Chen","year":"2023","unstructured":"Chen Yang, Can Wang, Weidong Zhang, Huiyi Zhang, and Xuangou Wu. 2023. Decentralized Application Identification via Burst Feature Aggregation. In 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 1551--1556."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:06Z","timestamp":1750290246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":37,"alternative-id":["10.1145\/3634737.3637664","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3637664","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}