{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T05:05:58Z","timestamp":1765343158237,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755615","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:27:39Z","timestamp":1761377259000},"page":"2016-2025","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Zero in on the Target: A Composite Robust Model for Retrieving Information in Traffic Data to Discover Network Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2148-8530","authenticated-orcid":false,"given":"Ziang","family":"Li","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2646-6100","authenticated-orcid":false,"given":"Chengxiang","family":"Si","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3292-7428","authenticated-orcid":false,"given":"Zhenyu","family":"Cheng","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00870-w"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102225"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.08.008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714578"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3391022"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101873"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07291-5"},{"key":"e_1_3_2_1_12_1","unstructured":"Google. 2024. Google Transparency Report. Technical Report. https:\/\/transparencyreport.google.com\/ Accessed: 2024-10-05."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2939624"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645479"},{"key":"e_1_3_2_1_15_1","volume-title":"ECNet: Robust Malicious Network Traffic Detection with Multi-view Feature and Confidence Mechanism","author":"Han Xueying","year":"2024","unstructured":"Xueying Han, Song Liu, Junrong Liu, Bo Jiang, Zhigang Lu, and Baoxu Liu. 2024b. ECNet: Robust Malicious Network Traffic Detection with Multi-view Feature and Confidence Mechanism. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484758"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109309"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107390"},{"key":"e_1_3_2_1_20_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2nd International Workshop on Computer Information Technologies in Industry 4.0 (CITI 2024), Ternopil, Ukraine, June 12-14, 2024 (CEUR Workshop Proceedings","volume":"110","author":"Klots Yurii","year":"2024","unstructured":"Yurii Klots, Nataliia Petliak, Serhii Martsenko, Vitaliy Tymoshchuk, and Ievgen Bondarenko. 2024. Machine Learning system for detecting malicious traffic generated by IoT devices. In Proceedings of the 2nd International Workshop on Computer Information Technologies in Industry 4.0 (CITI 2024), Ternopil, Ukraine, June 12-14, 2024 (CEUR Workshop Proceedings, Vol. 3742). CEUR-WS.org, 97-110."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206805"},{"key":"e_1_3_2_1_23_1","first-page":"129","article-title":"Robust Malicious Encrypted Traffic Detection based with Multiple Features","volume":"6","author":"Li Huihui","year":"2021","unstructured":"Huihui Li, Shigeng Zhang, Hong Song, and Weiping Wang. 2021. Robust Malicious Encrypted Traffic Detection based with Multiple Features. Journal of Information Security, Vol. 6, 02 (2021), 129-142.","journal-title":"Journal of Information Security"},{"key":"e_1_3_2_1_24_1","first-page":"1579","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Li Jianfeng","year":"2022","unstructured":"Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, and Xiaobo Ma. 2022. &#123;FOAP&#125;:&#123;Fine-Grained&#125; &#123;Open-World&#125; android app fingerprinting. In 31st USENIX Security Symposium (USENIX Security 22). 1579-1596."},{"key":"e_1_3_2_1_25_1","volume-title":"TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network. In ICC 2023-IEEE International Conference on Communications. IEEE, 2319-2324","author":"Li Ziang","year":"2023","unstructured":"Ziang Li, Yafei Sang, Zhenyu Cheng, Tianning Zang, Shuyuan Zhao, and Han Wang. 2023. TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network. In ICC 2023-IEEE International Conference on Communications. IEEE, 2319-2324."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098049"},{"key":"e_1_3_2_1_29_1","volume-title":"ATVITSC: A novel encrypted traffic classification method based on deep learning","author":"Liu Ya","year":"2024","unstructured":"Ya Liu, Xiao Wang, Bo Qu, and Fengyu Zhao. 2024. ATVITSC: A novel encrypted traffic classification method based on deep learning. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3038761"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(93)90090-R"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108590"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0204507"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110603"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423650"},{"key":"e_1_3_2_1_37_1","first-page":"28","article-title":"Balancing the response and adjusting estimates for nonresponse bias: complementary activities","volume":"155","author":"S\u00e4rndal Carl-Erik","year":"2014","unstructured":"Carl-Erik S\u00e4rndal and Peter Lundquist. 2014. Balancing the response and adjusting estimates for nonresponse bias: complementary activities. Journal de la Soci\u00e9t\u00e9 Fran\u00e7aise de Statistique, Vol. 155, 4 (2014), 28-50.","journal-title":"Journal de la Soci\u00e9t\u00e9 Fran\u00e7aise de Statistique"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313738"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622243"},{"key":"e_1_3_2_1_40_1","volume-title":"Om Prakash Kumar, and Sharmila Anand John Francis.","author":"Shanbhag Aganith","year":"2024","unstructured":"Aganith Shanbhag, Shweta Vincent, SB Bore Gowda, Om Prakash Kumar, and Sharmila Anand John Francis. 2024. Leveraging metaheuristics for feature selection with machine learning classification for malicious packet detection in computer networks. IEEE Access (2024)."},{"key":"e_1_3_2_1_41_1","first-page":"1","article-title":"Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In 2019 international carnahan conference on security technology (ICCST)","author":"Sharafaldin Iman","year":"2019","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, and Ali A Ghorbani. 2019. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In 2019 international carnahan conference on security technology (ICCST). IEEE, 1-8.","journal-title":"IEEE"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"e_1_3_2_1_44_1","volume-title":"Maarten Van Steen, and Andreas Peter","author":"Ede Thijs Van","year":"2020","unstructured":"Thijs Van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J Dubois, Martina Lindorfer, David Choffnes, Maarten Van Steen, and Andreas Peter. 2020. Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic. In Network and distributed system security symposium (NDSS), Vol. 27."},{"key":"e_1_3_2_1_45_1","unstructured":"Verizon. 2024. 2024 Data Breach Investigations Report. Technical Report. https:\/\/www.verizon.com\/business\/resources\/T6ce\/reports\/2024-dbir-data-breach-investigations-report.pdf Accessed: 2024-05-02."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035967"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101645"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00813"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663976.3664005"},{"key":"e_1_3_2_1_51_1","first-page":"2653","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wu Mingshi","year":"2023","unstructured":"Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, and Eric Wustrow. 2023. How the Great Firewall of China detects and blocks fully encrypted traffic. In 32nd USENIX Security Symposium (USENIX Security 23). 2653-2670."},{"key":"e_1_3_2_1_52_1","volume-title":"Encrypted malicious traffic detection based on natural language processing and deep learning. Computer Networks","author":"Zang Xiaodong","year":"2024","unstructured":"Xiaodong Zang, Tongliang Wang, Xinchang Zhang, Jian Gong, Peng Gao, and Guowei Zhang. 2024. Encrypted malicious traffic detection based on natural language processing and deep learning. Computer Networks (2024), 110598."},{"key":"e_1_3_2_1_53_1","volume-title":"Robust network traffic classification","author":"Zhang Jun","year":"2014","unstructured":"Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, and Jie Wu. 2014. Robust network traffic classification. IEEE\/ACM transactions on networking, Vol. 23, 4 (2014), 1257-1270."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102922"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T05:02:40Z","timestamp":1765342960000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":54,"alternative-id":["10.1145\/3746027.3755615","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755615","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}