{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:05:16Z","timestamp":1768406716947,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672923","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"16-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Detection of IoT Traffic Payload Based on Parallel Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2837-4178","authenticated-orcid":false,"given":"Yuhang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, North China University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100819"},{"key":"e_1_3_2_1_2_1","volume-title":"The Growth in Connected IoT Devices Is Expected to Generate 79.4zb of Data","author":"Eden Estopace","year":"2025","unstructured":"Eden Estopace, 2019. The Growth in Connected IoT Devices Is Expected to Generate 79.4zb of Data in 2025, according to a New IDC Forecasttwo thousand and nineteen. Available online https:\/\/www.businesswire.com\/news\/home\/20190618005012\/en\/The-Growth-in-Connected-IoT-Devicesis-Expected-to-Generate-79.4ZB-of-Data-in-2025-According-to-a-New-IDC-Forecast."},{"key":"e_1_3_2_1_3_1","volume-title":"Syed Wali","author":"Yasir Ali Farrukh","year":"2022","unstructured":"Yasir Ali Farrukh, Irfan Khan, Syed Wali, Payload Byte: A Tool for Extraction and Labeling Packet Capture Files of Modern Network Intrusion Detection DatasetsTechRxiv November 30, 2022."},{"issue":"01","key":"e_1_3_2_1_4_1","first-page":"22","article-title":"Chinese Text Classification Based on Bert and Attention","volume":"43","author":"Sun H","year":"2022","unstructured":"Sun H, Chen Q. 2022 Chinese Text Classification Based on Bert and Attention. Journal of Chinese Computer Systems,43(01):22-26.","journal-title":"Journal of Chinese Computer Systems"},{"issue":"04","key":"e_1_3_2_1_5_1","first-page":"929","article-title":"A Sentiment Analysis Method Based on Class lmbalance Learning","volume":"59","author":"Li F","year":"2021","unstructured":"Li F, Qu Y, Chen X, Li L and Yang F. 2021 A Sentiment Analysis Method Based on Class lmbalance Learning. Journal of Jilin University (Science Edition) 59(04):929-935.","journal-title":"Journal of Jilin University (Science Edition)"},{"issue":"01","key":"e_1_3_2_1_6_1","first-page":"154","article-title":"Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT","volume":"49","author":"Sun Y, GAO J","year":"2023","unstructured":"Sun Y, GAO J and GU Y. 2023 Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT. Computer Engineering,49(01):154-162.","journal-title":"Computer Engineering"},{"issue":"03","key":"e_1_3_2_1_7_1","first-page":"75","article-title":"Network intrusion detection based on multiple convolutions and attention mechanism","volume":"41","author":"Cao K","year":"2021","unstructured":"Cao K, Zhu J, Ma C, Du T and Zou X. 2021 Network intrusion detection based on multiple convolutions and attention mechanism. Journal of Tianjin Normal University (Natural Science Edition), 41(03):75-80.","journal-title":"Journal of Tianjin Normal University (Natural Science Edition)"},{"key":"e_1_3_2_1_8_1","volume-title":"Expert Systems with Applications","author":"Andresini G","year":"2022","unstructured":"Andresini G, Appice A, Caforio F P, ROULETTE: A neural attention multioutput model for explainable Network Intrusion Detection[J]. Expert Systems with Applications, 2022, 201:117144."},{"key":"e_1_3_2_1_9_1","first-page":"2754","volume-title":"Applied Sciences","author":"Taehoon K","year":"2023","unstructured":"Taehoon K, Wooguil P. Deep Learning-Based Network Intrusion Detection Using Multiple Image Transformers[J]. Applied Sciences, 2023, 13(5):2754-2754."},{"key":"e_1_3_2_1_10_1","volume-title":"Security and Communication Networks, 2022","author":"Zehong W","year":"2022","unstructured":"Zehong W, Jianhua L, Leyao S. EFS-DNN: An Ensemble Feature Selection-Based Deep Learning Approach to Network Intrusion Detection System[J]. Security and Communication Networks, 2022, 2022."},{"issue":"10","key":"e_1_3_2_1_11_1","first-page":"65","article-title":"Network traffic anomaly detection method based on multi-scale characteristic","volume":"43","author":"Duan X","year":"2022","unstructured":"Duan X, Fu Y, Wang K, Liu T, Li B. 2022 Network traffic anomaly detection method based on multi-scale characteristic. Journal on Communications, 43(10):65-76.","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_12_1","volume-title":"SeNet-I: An approach for detecting network intrusions through serialized network traffic images","author":"Yasir Ali Farrukh","year":"2023","unstructured":"Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian. SeNet-I: An approach for detecting network intrusions through serialized network traffic images November 2023."}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","location":"Nanjing China","acronym":"CSAIDE 2024"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:37:01Z","timestamp":1755880621000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":12,"alternative-id":["10.1145\/3672919.3672923","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672923","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}