{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:40:13Z","timestamp":1763343613560,"version":"3.45.0"},"reference-count":40,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064438","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T08:46:29Z","timestamp":1746261989000},"page":"365-391","source":"Crossref","is-referenced-by-count":0,"title":["ONTDAS: An Optimized Noise-Based Traffic Data Augmentation System for Generalizability Improvement of Traffic Classifiers"],"prefix":"10.32604","volume":"84","author":[{"given":"Rongwei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jie","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Jingyi","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Qiyun","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","article-title":"Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges","volume":"16","author":"Aceto","year":"2019 Feb 12","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref2","series-title":"Proceedings of the ACM Web Conference 2022","first-page":"633","article-title":"Et-bert: a contextualized datagram representation with pre-training transformers for encrypted traffic classification","author":"Lin","year":"2022 Apr 25"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"107974","DOI":"10.1016\/j.comnet.2021.107974","article-title":"TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT","volume":"190","author":"Lin","year":"2021 May 8","journal-title":"Comput Netw"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2367","DOI":"10.1109\/TIFS.2021.3050608","article-title":"Accurate decentralized application identification via encrypted traffic analysis using graph neural networks","volume":"16","author":"Shen","year":"2021 Jan 11","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1186\/s40537-022-00648-6","article-title":"The use of generative adversarial networks to alleviate class imbalance in tabular data: a survey","volume":"9","author":"Sauber-Cole","year":"2022 Aug 22","journal-title":"J Big Data"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"102985","DOI":"10.1016\/j.jnca.2021.102985","article-title":"DISTILLER: encrypted traffic classification via multimodal multitask deep learning","volume":"183","author":"Aceto","year":"2021 Jun 1","journal-title":"J Netw Comput Appl"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","article-title":"Deep learning for encrypted traffic classification: an overview","volume":"57","author":"Rezaei","year":"2019 May 13","journal-title":"IEEE Commun Mag"},{"key":"ref8","first-page":"1223","article-title":"Combo Packet: an encryption traffic classification method based on contextual information","volume":"79","author":"Chai","year":"2024 Apr 1","journal-title":"Comput Mater Contin"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"821","DOI":"10.3390\/e25050821","article-title":"TSFN: a novel malicious traffic classification method using BERT and LSTM","volume":"25","author":"Shi","year":"2023","journal-title":"Entropy"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TR.2022.3164877","article-title":"Intrusion detection system after data augmentation schemes based on the VAE and CVAE","volume":"71","author":"Liu","year":"2022 Apr 22","journal-title":"IEEE Trans Reliab"},{"key":"ref11","series-title":"IEEE INFOCOM 2021\u2014IEEE Conference on Computer Communications","first-page":"1","article-title":"Adaptive clustering-based malicious traffic classification at the network edge","author":"Diallo","year":"2021 May 10"},{"key":"ref12","series-title":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","first-page":"1","article-title":"An encrypted traffic classification method combining graph convolutional network and autoencoder","author":"Sun","year":"2020 Nov 6"},{"key":"ref13","series-title":"ICC 2020\u20142020 IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"PacketCGAN: exploratory study of class imbalance for encrypted traffic classification using CGAN","author":"Wang","year":"2020 Jun 7"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"124166","DOI":"10.1016\/j.eswa.2024.124166","article-title":"The art of time-bending: data augmentation and early prediction for efficient traffic classification","volume":"252","author":"Hajaj","year":"2024 Oct 15","journal-title":"Expert Syst Appl"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"Wang K, Wang Z, Han D, Chen W, Yang J, Shi X, et al. BARS: local robustness certification for deep learning based traffic analysis systems. In: NDSS; 2023 Feb 27\u2013Mar 3; San Diego, CA, USA. doi:10.14722\/ndss.2023.24508.","DOI":"10.14722\/ndss.2023.24508"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"324","DOI":"10.3390\/electronics9020324","article-title":"Improved KNN algorithm for fine-grained classification of encrypted network flow","volume":"9","author":"Ma","year":"2020 Feb 13","journal-title":"Electronics"},{"key":"ref17","series-title":"2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)","first-page":"837","article-title":"Imbalanced encrypted traffic classification scheme using random forest","author":"Zhang","year":"2020 Nov 2"},{"key":"ref18","series-title":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP)","first-page":"407","article-title":"Characterization of encrypted and vpn traffic using time-related features","author":"Draper-Gil","year":"2016 Feb 19"},{"key":"ref19","series-title":"International Conference on Information Systems Security and Privacy","first-page":"253","article-title":"Characterization of tor traffic using time based features","author":"Lashkari","year":"2017 Feb 19"},{"key":"ref20","series-title":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","first-page":"2451","article-title":"Network traffic classification techniques and comparative analysis using machine learning algorithms","author":"Shafiq","year":"2016 Oct 14"},{"key":"ref21","first-page":"3929","article-title":"An encrypted malicious traffic classification method integrating global semantic and spatiotemporal features","volume":"78","author":"Huang","year":"2024 Mar 1","journal-title":"Comput Mater Contin"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"119229","DOI":"10.1016\/j.ins.2023.119229","article-title":"Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features","volume":"644","author":"Hong","year":"2023 Oct 1","journal-title":"Inf Sci"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"158261","DOI":"10.1109\/ACCESS.2021.3128181","article-title":"A network traffic classification method based on graph convolution and lstm","volume":"9","author":"Pan","year":"2021 Nov 15","journal-title":"IEEE Access"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TR.2022.3204349","article-title":"Abnormal traffic detection: traffic feature extraction and DAE-GAN with efficient data augmentation","volume":"72","author":"Li","year":"2022 Sep 14","journal-title":"IEEE Trans Reliab"},{"key":"ref25","doi-asserted-by":"crossref","unstructured":"Qing Y, Yin Q, Deng X, Chen Y, Liu Z, Sun K, et al. Low-quality training data only? A robust framework for detecting encrypted malicious network traffic. arXiv:2309.04798. 2023 Sep 9.","DOI":"10.14722\/ndss.2024.23081"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"9935","DOI":"10.1007\/s11227-023-05829-5","article-title":"Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks","volume":"80","author":"Qing","year":"2024 May","journal-title":"J Supercomput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"41225","DOI":"10.1007\/s11042-022-12330-3","article-title":"An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis","volume":"81","author":"Chowdhury","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"ref28","series-title":"ICC 2024-IEEE International Conference on Communications","first-page":"1","article-title":"Network traffic classification with small-scale datasets using ensemble learning","author":"Wang","year":"2024 Jun 9"},{"key":"ref29","series-title":"2019 IEEE Symposium on Computers and Communications (ISCC)","first-page":"1","article-title":"A traffic classification method based on packet transport layer payload by ensemble learning","author":"Xu","year":"2019 Jun 29"},{"key":"ref30","unstructured":"Liu X, Wang H, Zhang Y, Wu F, Hu S. Towards efficient data-centric robust machine learning with noise-based augmentation. arXiv:2203.03810. 2022 Mar 8."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"126510","DOI":"10.1016\/j.jhydrol.2021.126510","article-title":"An integrated approach based on Gaussian noises-based data augmentation method and AdaBoost model to predict faecal coliforms in rivers with small dataset","volume":"599","author":"Bilali","year":"2021 Aug 1","journal-title":"J Hydrol"},{"key":"ref32","series-title":"International Conference on Advanced Aspects of Software Engineering (ICAASE)","first-page":"1","article-title":"Enhancing malware detection using deep learning with SMOTE and noise-based augmentation","author":"Khadidja","year":"2024 Nov 9"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2780","DOI":"10.1109\/TASE.2024.3384409","article-title":"Noise optimization in artificial neural networks","volume":"22","author":"Xiao","year":"2024 Apr 8","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"114363","DOI":"10.1016\/j.chaos.2023.114363","article-title":"Optimized injection of noise in activation functions to improve generalization of neural networks","volume":"178","author":"Duan","year":"2024 Jan 1","journal-title":"Chaos Solit Fractals"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1613\/jair.1.13643","article-title":"Hebo: pushing the limits of sample-efficient hyper-parameter optimisation","volume":"74","author":"Cowen-Rivers","year":"2022 Jul 11","journal-title":"J Artif Intell Res"},{"key":"ref36","series-title":"Proceedings of the 4th International Conference on Information Systems Security and Privacy ICISSP","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"2018"},{"key":"ref37","series-title":"2019 International Carnahan Conference on Security Technology (ICCST)","first-page":"1","article-title":"Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy","author":"Sharafaldin","year":"2019 Oct 1"},{"key":"ref38","series-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 data set","author":"Tavallaee","year":"2009 Jul 8"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002 Jun 1","journal-title":"J Artif Intell Res"},{"key":"ref40","series-title":"2022 IEEE International Conference on Robotics and Biomimetics (ROBIO)","first-page":"1140","article-title":"PyrAug: gaussian pyramid-based multi-scale data augmentation for panoptic plant segmentation with ambiguous boundary","author":"Zou","year":"2022 Dec 5"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_64438\/TSP_CMC_64438.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:35:45Z","timestamp":1763343345000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064438","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}