A Glimpse of the Whole: Path Optimization Prototypical Network for Few-Shot Encrypted Traffic Classification 来自 Semantic Scholar 喜欢 0 阅读量: 8 作者:BatchNorm,relu,Maxpool 摘要: With the prosperous application of encryption technology in network traffic, monitoring and analyzing network traffic ...
Malicious traffic classificationFew-shotLightweight modelGeneralizationClassifying malicious traffic, which can trace the lineage of attackers' malicious families, is fundamental to safeguarding cybersecurity. However, the deep learning approaches currently employed require substantial volumes of data, conflicting...
This is increasingly possible, as shown in [26], and the multiplexed TLS traffic can be split into individual encrypted connections to each website. In network condition, the attacker is assumed to have the same conditions as the victim, including traffic conditions and settings. To compare ...
It is encouraging to see that, with barely a few training samples, POPNet has achieved superior performance on encrypted network traffic classification among the state-of-the-arts, and its performance is immune to the deduction of training samples. 展开 ...
Although supervised approaches for traffic sign classification have demonstrated excellent performance, they are limited to classifying several traffic signs defined in the training dataset. This prevents them from being applied to different domains, i.e., different countries. Herei...
Integrative few-shot learning for classification and segmentation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, New Orleans, LA, USA, 18–24 June 2022; pp. 9979–9990. [Google Scholar] He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning...
Blockchain technology, through its decentralized, encrypted and tamper-proof nature, can help ensure the secure storage and transmission of sensitive data. In particular, in the supply chain blockchain, the use of prototype networks to identify and categorize sensitive products or transactions can ensu...