Deep learning with graph convolutional networks: An overview and latest applications in computational intelligence
Convolutional neural networks (CNNs) have received widespread attention due to their
powerful modeling capabilities and have been successfully applied in natural language …
powerful modeling capabilities and have been successfully applied in natural language …
Artificial intelligence-based anomaly detection technology over encrypted traffic: a systematic literature review
As cyber-attacks increase in unencrypted communication environments such as the
traditional Internet, protected communication channels based on cryptographic protocols …
traditional Internet, protected communication channels based on cryptographic protocols …
Tfe-gnn: A temporal fusion encoder using graph neural networks for fine-grained encrypted traffic classification
Encrypted traffic classification is receiving widespread attention from researchers and
industrial companies. However, the existing methods only extract flow-level features, failing …
industrial companies. However, the existing methods only extract flow-level features, failing …
TCGNN: Packet-grained network traffic classification via Graph Neural Networks
Network traffic classification is the fundamental and vital function for network management,
network security and so on. With the traffic scenarios becoming more and more complex …
network security and so on. With the traffic scenarios becoming more and more complex …
Enhanced malicious traffic detection in encrypted communication using TLS features and a multi-class classifier ensemble
The use of encryption for network communication leads to a significant challenge in
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …
CT-GCN: A phishing identification model for blockchain cryptocurrency transactions
B Fu, X Yu, T Feng - International Journal of Information Security, 2022 - Springer
With the widespread application of blockchain technology, the cyberspace security issue of
phishing has also appeared in the emerging blockchain cryptocurrency ecosystem. Because …
phishing has also appeared in the emerging blockchain cryptocurrency ecosystem. Because …
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism
J Chen, H **e, S Cai, L Song, B Geng, W Guo - Computers & Security, 2024 - Elsevier
With the increasing size and complexity of network, network traffic becomes more and more
correlated with each other, and the traditional manner of presenting network traffic in a …
correlated with each other, and the traditional manner of presenting network traffic in a …
Detecting malicious IoT network communication through Graph Neural Networks in real-world conditions
Abstract Internet of Things (IoT) devices are increasingly permeating homes, industries, and
many other environments. The need for robust security measures in IoT networks has never …
many other environments. The need for robust security measures in IoT networks has never …
[HTML][HTML] A graph representation framework for encrypted network traffic classification
Abstract Network Traffic Classification (NTC) is crucial for ensuring internet security, but
encryption presents significant challenges to this task. While Machine Learning (ML) and …
encryption presents significant challenges to this task. While Machine Learning (ML) and …
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency
L Yu, J Yuan, J Zheng, N Yang - Journal of Network and Systems …, 2025 - Springer
As the Internet industry evolves, the need for effective encrypted traffic classification (ETC)
becomes critical for network management and cybersecurity. Meanwhile, existing deep …
becomes critical for network management and cybersecurity. Meanwhile, existing deep …