Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …
(5G) wireless technology reflects the development of mobile communication networks and is …
Reliable detection of location spoofing and variation attacks
Location spoofing is a critical attack in mobile communications. While several previous
studies investigated the detection of location spoofing attacks, they are limited in their …
studies investigated the detection of location spoofing attacks, they are limited in their …
[HTML][HTML] Fine-grained TLS services classification with reject option
The recent success and proliferation of machine learning and deep learning have provided
powerful tools, which are also utilized for encrypted traffic analysis, classification, and threat …
powerful tools, which are also utilized for encrypted traffic analysis, classification, and threat …
Benchmarking class incremental learning in deep learning traffic classification
Traffic Classification (TC) is experiencing a renewed interest, fostered by the growing
popularity of Deep Learning (DL) approaches. In exchange for their proved effectiveness …
popularity of Deep Learning (DL) approaches. In exchange for their proved effectiveness …
ProGraph: Robust network traffic identification with graph propagation
Network traffic identification is critical for effective network management. Existing methods
mostly focus on invariant network environments with stable attribute distributions …
mostly focus on invariant network environments with stable attribute distributions …
[HTML][HTML] Robust open-set classification for encrypted traffic fingerprinting
Encrypted network traffic has been known to leak information about their underlying content
through side-channel information leaks. Traffic fingerprinting attacks exploit this by using …
through side-channel information leaks. Traffic fingerprinting attacks exploit this by using …
Encrypted traffic classification: the QUIC case
The QUIC protocol is a new reliable and secure transport protocol that is an alternative to
TLS over TCP. However, compared to TLS, QUIC obfuscates the connection hand-shake …
TLS over TCP. However, compared to TLS, QUIC obfuscates the connection hand-shake …
A lightweight, efficient and explainable-by-design convolutional neural network for internet traffic classification
K Fauvel, F Chen, D Rossi - Proceedings of the 29th ACM SIGKDD …, 2023 - dl.acm.org
Traffic classification, ie, the identification of the type of applications flowing in a network, is a
strategic task for numerous activities (eg, intrusion detection, routing). This task faces some …
strategic task for numerous activities (eg, intrusion detection, routing). This task faces some …
[HTML][HTML] MEMENTO: A novel approach for class incremental learning of encrypted traffic
In the ever-changing digital environment, ensuring the ongoing effectiveness of traffic
analysis and security measures is crucial. Therefore, Class Incremental Learning (CIL) in …
analysis and security measures is crucial. Therefore, Class Incremental Learning (CIL) in …
Self-supervised traffic classification: Flow embedding and few-shot solutions
Internet traffic classification has been intensively studied over the past decade due to its
importance for traffic engineering and cyber security. A promising approach to several traffic …
importance for traffic engineering and cyber security. A promising approach to several traffic …