{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T16:15:21Z","timestamp":1768320921449,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62227805, 62072398, 62172405"],"award-info":[{"award-number":["62227805, 62072398, 62172405"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Research Foundation, Singapore, and the Cyber Security Agency under its National Cybersecurity R&D Programme","award":["NCRP25-P04-TAICeN"],"award-info":[{"award-number":["NCRP25-P04-TAICeN"]}]},{"name":"National Key R&D Program of China","award":["2023YFB3106800"],"award-info":[{"award-number":["2023YFB3106800"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20220075"],"award-info":[{"award-number":["BK20220075"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fok Ying-Tung Education Foundation for Young Teachers in the Higher Education Institutions of China","award":["20193218210004"],"award-info":[{"award-number":["20193218210004"]}]},{"name":"Key R&D Program of Zhejiang Province","award":["2023C01039"],"award-info":[{"award-number":["2023C01039"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709315","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:44:43Z","timestamp":1743792283000},"page":"2089-2100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Context-Aware Traffic Classification via Time-Wavelet Fusion Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1455-4330","authenticated-orcid":false,"given":"Ziming","family":"Zhao","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1252-2303","authenticated-orcid":false,"given":"Zhuoxue","family":"Song","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1288-6502","authenticated-orcid":false,"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2195-0799","authenticated-orcid":false,"given":"Zhaoxuan","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2888-4499","authenticated-orcid":false,"given":"Jiongchi","family":"Yu","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6589-3706","authenticated-orcid":false,"given":"Tingting","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110563"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.007"},{"key":"e_1_3_2_2_3_1","volume-title":"The secure sockets layer (ssl) protocol version 3.0. Technical report","author":"Freier Alan","year":"2011","unstructured":"Alan Freier, Philip Karlton, and Paul Kocher. The secure sockets layer (ssl) protocol version 3.0. Technical report, 2011."},{"key":"e_1_3_2_2_4_1","volume-title":"The transport layer security (tls) protocol version 1.2. Technical report","author":"Dierks Tim","year":"2008","unstructured":"Tim Dierks and Eric Rescorla. The transport layer security (tls) protocol version 1.2. Technical report, 2008."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2018.8587975"},{"key":"e_1_3_2_2_6_1","volume-title":"et al. Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation","author":"Xie Guorui","year":"2022","unstructured":"Guorui Xie, Qing Li, Yutao Dong, et al. Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation. In INFOCOM. IEEE, 2022."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484758"},{"key":"e_1_3_2_2_8_1","article-title":"Effective DDoS Mitigation via ML-Driven In-network Traffic Shaping","author":"Zhao Ziming","year":"2024","unstructured":"Ziming Zhao, Zhuotao Liu, Huan Chen, Fan Zhang, Zhuoxue Song, and Zhaoxuan Li. Effective DDoS Mitigation via ML-Driven In-network Traffic Shaping. IEEE Transactions on Dependable and Secure Computing, 2024.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_9_1","volume-title":"Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089, 2018."},{"key":"e_1_3_2_2_10_1","article-title":"Error-resilient RNN for encrypted traffic detection towards network-induced phenomena","author":"Zhao Ziming","year":"2023","unstructured":"Ziming Zhao, Zhaoxuan Li, Jialun Jiang, Fengyuan Yu, Fan Zhang, Congyuan Xu, Xinjie Zhao, Rui Zhang, and Shize Guo. ERNN: Error-resilient RNN for encrypted traffic detection towards network-induced phenomena. IEEE Transactions on Dependable and Secure Computing, 2023.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"e_1_3_2_2_12_1","first-page":"6203","volume-title":"USENIX Security Symposium","author":"Zhou Guangmeng","year":"2023","unstructured":"Guangmeng Zhou and Zhuotao Liu and Chuanpu Fu and Qi Li and Ke Xu. An efficient design of intelligent network data plane. In USENIX Security Symposium, pages 6203--6220. USENIX Association, 2023."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"e_1_3_2_2_14_1","first-page":"1","volume-title":"INFOCOM","author":"Tanyi-Jong Akem Aristide","year":"2023","unstructured":"Aristide Tanyi-Jong Akem, Michele Gucciardo, and Marco Fiore. Flowrest: Practical flow-level inference in programmable switches with random forests. In INFOCOM, pages 1--10. IEEE, 2023."},{"key":"e_1_3_2_2_15_1","volume-title":"Mazebolt knowledge base. https:\/\/kb.mazebolt.com\/","author":"MAZEBOLT.","year":"2016","unstructured":"MAZEBOLT. Mazebolt knowledge base. https:\/\/kb.mazebolt.com\/, 2016."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413217"},{"key":"e_1_3_2_2_17_1","first-page":"736","volume-title":"Proceedings, Part I 26","author":"Daihes Yael","year":"2021","unstructured":"Yael Daihes, Hen Tzaban, Asaf Nadler, and Asaf Shabtai. MORTON: detection of malicious routines in large-scale DNS traffic. In Computer Security--ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4--8, 2021, Proceedings, Part I 26, pages 736--756. Springer, 2021."},{"key":"e_1_3_2_2_18_1","volume-title":"Attention is all you need. Advances in neural information processing systems, 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. Attention is all you need. Advances in neural information processing systems, 30, 2017."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01095"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54773-7_12"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103663"},{"key":"e_1_3_2_2_22_1","volume-title":"ACM","author":"Novo Carlos","year":"2020","unstructured":"Carlos Novo and Ricardo Morla. Flow-based detection and proxy-based evasion of encrypted malware C2 traffic. In AISec@CCS, pages 83--91. ACM, 2020."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2024.3444712"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3195871"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2038832"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2318991.2320038"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0477(1998)079<0061:APGTWA>2.0.CO;2"},{"key":"e_1_3_2_2_30_1","first-page":"807","volume-title":"USENIX security symposium","author":"Bartos Karel","year":"2016","unstructured":"Karel Bartos, Michal Sofka, and Vojtech Franc. Optimized invariant representation of network traffic for detecting unseen malware variants. In USENIX security symposium, pages 807--822, 2016."},{"key":"e_1_3_2_2_31_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","volume":"27","author":"Ede Thijs Van","year":"2020","unstructured":"Thijs Van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J Dubois, Martina Lindorfer, David Choffnes, Maarten van Steen, and Andreas Peter. FLOWPRINT: Semi-supervised mobile-app fingerprinting on encrypted network traffic. In Network and Distributed System Security Symposium (NDSS), volume 27, 2020."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23080"},{"key":"e_1_3_2_2_34_1","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSP, 1:108--116, 2018.","journal-title":"ICISSP"},{"key":"e_1_3_2_2_35_1","first-page":"1","volume-title":"IEEE\/ACM Trans. Netw.","author":"Li Wenhao","year":"2022","unstructured":"Wenhao Li, Xiao-Yu Zhang, Huaifeng Bao, Haichao Shi, and Qiang Wang. Prograph: Robust network traffic identification with graph propagation. IEEE\/ACM Trans. Netw., pages 1--15, 2022."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888430"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380090"},{"key":"e_1_3_2_2_38_1","volume-title":"Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580","author":"Hinton Geoffrey E","year":"2012","unstructured":"Geoffrey E Hinton, Nitish Srivastava, Alex Krizhevsky, Ilya Sutskever, and Ruslan R Salakhutdinov. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580, 2012."},{"key":"e_1_3_2_2_39_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3672202.3673720"},{"key":"e_1_3_2_2_41_1","volume-title":"Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579--2605","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579--2605, 2008."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603165.3607437"},{"key":"e_1_3_2_2_43_1","volume-title":"Dpdk: Data plane development kit. [EB\/OL]","author":"Project D.","year":"2010","unstructured":"D. Project. Dpdk: Data plane development kit. [EB\/OL], 2010. http:\/\/dpdk.org\/ Accessed November 27, 2020."},{"key":"e_1_3_2_2_44_1","volume-title":"ACM","author":"Wilkens Florian","year":"2021","unstructured":"Florian Wilkens, Felix Ortmann, Steffen Haas, Matthias Vallentin, and Mathias Fischer. Multi-stage attack detection via kill chain state machines. In CYSARM@CCS, pages 13--24. ACM, 2021."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2971484"},{"key":"e_1_3_2_2_46_1","volume-title":"Technical report","author":"Strom Blake E.","year":"2018","unstructured":"Blake E. Strom, Andy Applebaum, Doug P. Miller, et al. Mitre att&ck: Design and philosophy. In Technical report. The MITRE Corporation, 2018."},{"key":"e_1_3_2_2_47_1","volume-title":"FOSS: Towards finegrained unknown class detection against the open-set attack spectrum with variable legitimate traffic","author":"Zhao Ziming","year":"2024","unstructured":"Ziming Zhao, Zhaoxuan Li, Xiaofei Xie, Jiongchi Yu, Fan Zhang, Rui Zhang, Binbin Chen, Xiangyang Luo, Ming Hu, and Wenrui Ma. FOSS: Towards finegrained unknown class detection against the open-set attack spectrum with variable legitimate traffic. IEEE\/ACM Transactions on Networking, 2024."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645407"},{"key":"e_1_3_2_2_49_1","volume-title":"Low-quality training data only? A robust framework for detecting encrypted malicious network traffic. CoRR, abs\/2309.04798","author":"Qing Yuqi","year":"2023","unstructured":"Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, and Qi Li. Low-quality training data only? A robust framework for detecting encrypted malicious network traffic. CoRR, abs\/2309.04798, 2023."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS59052.2023.00045"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621290"},{"key":"e_1_3_2_2_52_1","article-title":"An incremental and interpretable recurrent neural network for encrypted traffic classification","author":"Song Zhuoxue","year":"2023","unstructured":"Zhuoxue Song, Ziming Zhao, Fan Zhang, Gang Xiong, Guang Cheng, Xinjie Zhao, Shize Guo, and Binbin Chen. I2RNN: An incremental and interpretable recurrent neural network for encrypted traffic classification. IEEE Transactions on Dependable and Secure Computing, 2023.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3542618"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599762"},{"key":"e_1_3_2_2_55_1","article-title":"co-analyzed iot malware detection and forensics via network and hardware domains","author":"Zhao Ziming","year":"2023","unstructured":"Ziming Zhao, Zhaoxuan Li, Jiongchi Yu, Fan Zhang, Xiaofei Xie, Haitao Xu, and Binbin Chen. Cmd: co-analyzed iot malware detection and forensics via network and hardware domains. IEEE Transactions on Mobile Computing, 2023.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583227"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3215507"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25674"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539314"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24210"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583473"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD61410.2024.10580010"},{"key":"e_1_3_2_2_63_1","volume-title":"BERT: Pretraining of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. BERT: Pretraining of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805, 2018."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/3455716.3455856"},{"key":"e_1_3_2_2_65_1","volume-title":"Language models are few-shot learners. Advances in neural information processing systems, 33:1877--1901","author":"Brown Tom","year":"2020","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, et al. Language models are few-shot learners. Advances in neural information processing systems, 33:1877--1901, 2020."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462506"},{"key":"e_1_3_2_2_67_1","volume-title":"et al. Conformer: Convolution-augmented transformer for speech recognition. arXiv preprint arXiv:2005.08100","author":"Gulati Anmol","year":"2020","unstructured":"Anmol Gulati, James Qin, Chung-Cheng Chiu, Niki Parmar, Yu Zhang, Jiahui Yu, Wei Han, Shibo Wang, Zhengdong Zhang, Yonghui Wu, et al. Conformer: Convolution-augmented transformer for speech recognition. arXiv preprint arXiv:2005.08100, 2020."},{"key":"e_1_3_2_2_68_1","volume-title":"Beit: BERT pre-training of image Transformers. arXiv preprint arXiv:2106.08254","author":"Bao Hangbo","year":"2021","unstructured":"Hangbo Bao, Li Dong, Songhao Piao, and Furu Wei. Beit: BERT pre-training of image Transformers. arXiv preprint arXiv:2106.08254, 2021."},{"key":"e_1_3_2_2_69_1","volume-title":"Beit v2: Masked image modeling with vector-quantized visual tokenizers. arXiv preprint arXiv:2208.06366","author":"Peng Zhiliang","year":"2022","unstructured":"Zhiliang Peng, Li Dong, Hangbo Bao, Qixiang Ye, and Furu Wei. Beit v2: Masked image modeling with vector-quantized visual tokenizers. arXiv preprint arXiv:2208.06366, 2022."}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Toronto ON Canada","acronym":"KDD '25","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709315","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:45:07Z","timestamp":1755359107000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":69,"alternative-id":["10.1145\/3690624.3709315","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709315","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}