{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:35:30Z","timestamp":1768739730881,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,7]]},"DOI":"10.1145\/3649153.3649207","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T10:21:29Z","timestamp":1719915689000},"page":"267-275","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["MFC-DoH: DoH Tunnel Detection Based on the Fusion of MAML and F-CNN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6031-8493","authenticated-orcid":false,"given":"Xiaoyu","family":"Liu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2926-6725","authenticated-orcid":false,"given":"Yijing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4998-7822","authenticated-orcid":false,"given":"Xiaodu","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2671-3559","authenticated-orcid":false,"given":"Weilin","family":"Gai","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, School of computer science and technology, University of Chinese Academy of Sciences, National Computer Network, Emergency Response Technical, Team\/Coordination Center of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9648-7720","authenticated-orcid":false,"given":"Bo","family":"Sun","sequence":"additional","affiliation":[{"name":"National Computer Network, Emergency Response Technical, Team\/Coordination Center of China, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Godlua Backdoor Analysis Report https:\/\/blog.netlab.360.com\/an-analysis-of-godlua-backdoor\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Iranian hacker group becomes first known APT to weaponize DNS-over-HTTPS (DoH) https:\/\/www.zdnet.com\/article\/iranian-hacker-group-becomes-first-known-apt-to-weaponize-dns-over-https-doh\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Cyclops Blink Sets Sights on Asus Routers https:\/\/www.trendmicro.com\/en_us\/research\/22\/c\/cyclops-blink-sets-sights-on-asus-routers--.html"},{"key":"e_1_3_2_1_4_1","volume-title":"Large scale measurement on the adoption of encrypted DNS","author":"Garc\u00eda K.","year":"2021","unstructured":"S. Garc\u00eda, K. Hynek, D. Vekshin, T. \u010cejka, and A. Wasicek, \"Large scale measurement on the adoption of encrypted DNS\" 2021,arXiv:2107.04436."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365435"},{"key":"e_1_3_2_1_6_1","first-page":"1126","volume-title":"International conference on machine learning","author":"Chelsea Finn","year":"2017","unstructured":"Chelsea Finn, Pieter Abbeel, and Sergey Levine. Model-agnostic meta-learning for fast adaptation of deep networks. In International conference on machine learning, pages 1126--1135. PMLR, 2017."},{"key":"e_1_3_2_1_7_1","first-page":"2331","article-title":"DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis[C]\/\/ICC 2023-IEEE International Conference on Communications","volume":"2023","author":"Liu X","unstructured":"Liu X, Mao W, Wang A, et al. DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis[C]\/\/ICC 2023-IEEE International Conference on Communications. IEEE, 2023: 2331--2337.","journal-title":"IEEE"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409192"},{"key":"e_1_3_2_1_9_1","volume-title":"Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE","author":"MontazeriShatoori M","unstructured":"MontazeriShatoori M, Davidson L, Kaur G, et al. Detection of doh tunnels using time-series classification of encrypted traffic[C]\/\/2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE, 2020: 63--70."},{"key":"e_1_3_2_1_10_1","volume-title":"ISC 2021, Virtual Event, November 10-12, 2021, Proceedings 24","author":"Mitsuhashi R","year":"2021","unstructured":"Mitsuhashi R, Satoh A, Jin Y, et al. Identifying malicious dns tunnel tools from doh traffic using hierarchical machine learning classification[C]\/\/Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings 24. Springer International Publishing, 2021: 238--256."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT51146.2020.9312004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470089"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3183390"},{"key":"e_1_3_2_1_14_1","first-page":"352","article-title":"Encrypt DNS traffic: automated feature learning method for detecting DNS tunnels[C]\/\/2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","volume":"2021","author":"Ding S","unstructured":"Ding S, Zhang D, Ge J, et al. Encrypt DNS traffic: automated feature learning method for detecting DNS tunnels[C]\/\/2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). IEEE, 2021: 352--359.","journal-title":"IEEE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12052416"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108919"},{"key":"e_1_3_2_1_17_1","unstructured":"Dnscat2 https:\/\/github.com\/iagox86\/dnscat2"},{"key":"e_1_3_2_1_18_1","unstructured":"DNS2TCP http:\/\/www.hsc.fr\/ressources\/outils\/dns2tcp\/index.html.en."},{"key":"e_1_3_2_1_19_1","unstructured":"Iodine http:\/\/code.kryo.se\/iodine\/."},{"key":"e_1_3_2_1_20_1","unstructured":"DNStt https:\/\/github.com\/Mygod\/dnstt"},{"key":"e_1_3_2_1_21_1","unstructured":"Tcp-over-dns https:\/\/analogbit.com\/software\/tcp-over-dns\/"},{"key":"e_1_3_2_1_22_1","unstructured":"TUNS https:\/\/github.com\/lnussbaum\/tuns"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.12691\/jcsa-8-2-2"},{"key":"e_1_3_2_1_24_1","first-page":"2825","volume-title":"Dubourg et al., \"Scikit-learn: Machine learning in Python,\" the Journal of machine Learning research","author":"Pedregosa G.","year":"2011","unstructured":"F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg et al., \"Scikit-learn: Machine learning in Python,\" the Journal of machine Learning research, vol. 12, pp. 2825--2830, 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991876"},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"Few-Shot Class-Adaptive Anomaly Detection with Model-Agnostic Meta-Learning[C]\/\/2021 IFIP Networking Conference (IFIP Networking)","volume":"2021","author":"Feng T","unstructured":"Feng T, Qi Q, Wang J, et al. Few-Shot Class-Adaptive Anomaly Detection with Model-Agnostic Meta-Learning[C]\/\/2021 IFIP Networking Conference (IFIP Networking). IEEE, 2021: 1--9.","journal-title":"IEEE"},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method[C]\/\/2023 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"2023","author":"Shi Z","unstructured":"Shi Z, Xing M, Zhang J, et al. Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method[C]\/\/2023 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2023: 1--6.","journal-title":"IEEE"}],"event":{"name":"CF '24: 21st ACM International Conference on Computing Frontiers","location":"Ischia Italy","acronym":"CF '24","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 21st ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649153.3649207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649153.3649207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:02Z","timestamp":1750287002000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649153.3649207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,7]]},"references-count":27,"alternative-id":["10.1145\/3649153.3649207","10.1145\/3649153"],"URL":"https:\/\/doi.org\/10.1145\/3649153.3649207","relation":{},"subject":[],"published":{"date-parts":[[2024,5,7]]},"assertion":[{"value":"2024-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}