" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security
The so-called behavioral anomaly detection (BAD) is expected to solve effectively a variety
of security issues by detecting the deviances from normal behavioral patterns of protected …
of security issues by detecting the deviances from normal behavioral patterns of protected …
Rosetta: Enabling robust tls encrypted traffic classification in diverse network environments with tcp-aware traffic augmentation
As the majority of Internet traffic is encrypted by the Transport Layer Security (TLS) protocol,
recent advances leverage Deep Learning (DL) models to conduct encrypted traffic …
recent advances leverage Deep Learning (DL) models to conduct encrypted traffic …
Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features
Y Hong, Q Li, Y Yang, M Shen - Information Sciences, 2023 - Elsevier
At present, the TLS cryptographic protocol is widely deployed. While protecting the security
and integrity of transmitted information, it also makes the detection of malicious behavior …
and integrity of transmitted information, it also makes the detection of malicious behavior …
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side
As the mainstream encrypted protocols adopt TCP protocol to ensure lossless data
transmissions, the privacy of encrypted TCP traffic becomes a significant focus for …
transmissions, the privacy of encrypted TCP traffic becomes a significant focus for …
IoT Bricks Over v6: Understanding IPv6 Usage in Smart Homes
Recent years have seen growing interest and support for IPv6 in residential networks. While
nearly all modern networking devices and operating systems support IPv6, it remains …
nearly all modern networking devices and operating systems support IPv6, it remains …
Understanding Web Fingerprinting with a Protocol-Centric Approach
Recent breakthroughs in machine learning (ML) have unleashed several approaches to
fingerprinting web traffic based on traffic analysis. In particular, researchers report …
fingerprinting web traffic based on traffic analysis. In particular, researchers report …
FusionTC: Encrypted App Traffic Classification Using Decision‐Level Multimodal Fusion Learning of Flow Sequence
S Li, Y Huang, T Gao, L Yang, Y Chen… - Wireless …, 2023 - Wiley Online Library
In recent years, an increasing number of mobile platforms and applications have adopted
traffic encryption protocol technology to ensure privacy and security. Existing researches on …
traffic encryption protocol technology to ensure privacy and security. Existing researches on …
AppFineGraph: Hierarchical Mobile Encrypted Traffic Classification at Multi-Granularities via a Branch Graph Neural Network
S Li, Z Lv, T Zang, L Yang… - 2024 International Joint …, 2024 - ieeexplore.ieee.org
Most of existing methods for classifying mobile encrypted traffic are primarily designed for
coarse-grained scenarios, focusing on classification at the app name level. This implies that …
coarse-grained scenarios, focusing on classification at the app name level. This implies that …
FineNet: Few-Shot Mobile Encrypted Traffic Classification via a Deep Triplet Learning Network Based on Transformer
S Li, Q Qiang, T Zang, L Yang… - 2024 IEEE Wireless …, 2024 - ieeexplore.ieee.org
The existing encrypted mobile traffic classification methods often require a large number of
training sets to ensure the effect of the model. When it is difficult to collect enough samples …
training sets to ensure the effect of the model. When it is difficult to collect enough samples …