Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250200021-8.doi: 10.11896/jsjkx.250200021
• Information Security • Previous Articles Next Articles
LIN Honggang, LI Yuhan
CLC Number:
| [1]ADELEKE O A,BASTIN N,GURKAN D.Network trafficgeneration:A survey and methodology[J].ACM Computing Surveys(CSUR),2022,55(2):1-23. [2]LU X L,LI Z L.IoT Device Recognition Method Combining Multimodal IoT Device Fingerprint and Ensemble Learning[J].Computer Science,2024,51(9):371-382. [3]SIVAROOPAN N,BANDARA D,MADARASINGHA C,et al.Netdiffus:Network traffic generation by diffusion models through time-series imaging[J].Computer Networks,2024,251:110616. [4]ANANDE T J,AL-SAADI S,LEESON M S.Generative adver-sarial networks for network traffic feature generation[J].International Journal of Computers and Applications,2023,45(4):297-305. [5]BENADDI H,JOUHARI M,IBRAHIMI K,et al.Adversarialattacks against iot networks using conditional gan based lear-ning[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference.IEEE,2022:2788-2793. [6]GE Z,WU H,CHENG G,et al.NFlowGAN:High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN[C]//ICC 2023-IEEE International Conference on Communications.IEEE,2023:4057-4062. [7]HUI S D,WANG H D,WANG Z H,et al.Knowledge Enhanced GAN for IoT Traffic Genera-tion[C]//Proceedings of the ACM Web Conference 2022(WWW ’22).Association for Computing Machinery,New York,NY,USA,2022:3336-3346. [8]ZHANG Y W,ZHANG Y C,WU Y,et al.Research on Improvement of Generation Adversarial Networks for Network Traffic Datasets Augmentation[J].Computer Engineering and Applications,2024,60(18):275-284. [9]KHOLGH D K,KOSTAKOS P.PAC-GPT:A novel approach to generating synthetic network traffic with GPT-3[J].IEEE Access,2023,11:114936-114951. [10]BANO S,CASSARÁ P,VALERIO L.Variational Autoencoders for Noise Resistant Traffic Generation in B5G Net-works[C]//2024 IEEE International Mediterranean Conference on Communications and Networking(MeditCom).IEEE,2024:13-18. [11]LI W,ZHANG C.A hidden markov model for condition monitoring of time series data in complex network systems[J].IEEE Transactions on Reliability,2023,72(4):1478-1492. [12]MESLET-MILLET F,MOUYSSET S,CHAPUT E.NeCST-Gen:An approach for realistic network traffic generation using deep learning[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference.IEEE,2022:3108-3113. [13]LI J,ZHOU L,LI H,et al.Dynamic traffic feature camou-flaging via generative adversarial networks[C]//2019 IEEE Conference on Communications and Network Security(CNS).IEEE,2019:268-276. [14]SHAHID M R,BLANC G,JMILA H,et al.Gen-erative Deep Learning for Internet of Things Network Traffic Generation[C]//2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing(PRDC),Perth,WA,Australia,2020:70-79. [15]YOON J,JARRETT D,SCHAAR M V D.Time-series Generative Adversarial Networks[C]//Neural Information Processing Systems(NeurIPS).2019. [16]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.Iot sentinel:Au-tomated device-type identification for security enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:2177-2184. [17]QU J,MA X,LI J.Trafficgpt:Breaking the token barrier for efficient long traffic analysis and generation[J].arXiv:2403.05822,2024. [18]ZHAO F,ZHANG M,ZHOU S,et al.Detection of network security traffic anomalies based on machine learning KNN method[J].Journal of Artificial Intelligence General Science(JAIGS).2024,1(1):209-218. [19]DONG S.Multi class SVM algorithm with active learning fornetwork traffic classification[J].Expert Systems with Applications,2021,176:114885. [20]LABAYEN V,MAGAÑA E,MORATÓ D,et al.Online classification of user activities using machine learning on network traffic[J].Computer Networks,2020,181:107557. [21]SONG Z,ZHAO Z,ZHANG F,et al.I ∧{2}$ RNN:An In-cremental and Interpretable Recurrent Neural Network for Encrypted Traffic Classification[J].IEEE Transactions on Dependable and Secure Computing(Early Access). [22]WANG Y,WANG F,TIAN Q,et al.Dynamic Bandwidth allo-cation algorithm based on traffic classification with the aid of LSTM and GRU for industrial passive optical networks[C]//2023 21st International Conference on Optical Communications and Networks(ICOCN).IEEE,2023:1-3. [23]KURITA T.Principal Component Analysis(PCA)[M]//Com-puter vision:a reference guide.Cham:Springer International Publishing,2021:1013-1016. |
| [1] | CHEN Han, XU Zefeng, JIANG Jiu, FAN Fan, ZHANG Junjian, HE Chu, WANG Wenwei. Large Language Model and Deep Network Based Cognitive Assessment Automatic Diagnosis [J]. Computer Science, 2026, 53(3): 41-51. |
| [2] | LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87. |
| [3] | CUI Mengtian, HE Liwen, XIE Qi, WANG Fang. Group Semantic-driven Hypergraph Network for Disinformation Detection with Fusion PropagationStructure [J]. Computer Science, 2026, 53(3): 88-96. |
| [4] | QIAN Qing, CHEN Huicheng, CUI Yunhe, TANG Ruixue, FU Jinmei. Joint Entity and Relation Extraction Method with Multi-scale Collaborative Aggregation and Axial-semantic Guidance [J]. Computer Science, 2026, 53(3): 97-106. |
| [5] | YU Chengcheng, JIANG Yongfa, CHEN Fangshu, WANG Jiahui, MENG Xiankai. Multi-view Exercise Representation and Forgetting Mechanism for Deep KnowledgeTracing [J]. Computer Science, 2026, 53(3): 107-114. |
| [6] | FAN Wenshu, WAN Shenghua, LI Xinchun, SUN Haihang, HUANG Kaichen, GAN Le, ZHAN Dechuan. Twice Learning Revitalizes Behavior Cloning [J]. Computer Science, 2026, 53(3): 129-135. |
| [7] | LI Hao, DING Lizhong, FU Jiarun, LINGHU Zhaohuan. Data Compression of Instruction Fine-tuning for Large Models:Refinement Based on Inference Contribution [J]. Computer Science, 2026, 53(3): 136-142. |
| [8] | LIU Huashuai, TAO Houguo, YUE Kun, DUAN Liang. Bayesian Network Based Fault Root Cause Analysis [J]. Computer Science, 2026, 53(3): 143-150. |
| [9] | HOU Jingle, LI Zhengjun, DAI Qiangqiang, LI Ronghua, WANG Guoren. Research on Maximal Directed k-plex Enumeration Problem [J]. Computer Science, 2026, 53(3): 166-172. |
| [10] | WU Jiahao, PENG Li, YANG Jielong. Partial Domain Adaptation Based on Machine Unlearning [J]. Computer Science, 2026, 53(3): 173-180. |
| [11] | SANG Shilong, CHEN Kejia. Type-steered Edge Matching for Heterogeneous Graph Similarity Learning [J]. Computer Science, 2026, 53(3): 181-187. |
| [12] | WANG Jinghong, LI Pengchao, WANG Xizhao, ZHANG Zili. Dual-channel Graph Neural Network Based on KAN [J]. Computer Science, 2026, 53(3): 188-196. |
| [13] | LI Linhao, XU Yanan, DONG Yongfeng, WANG Zhen. Social Learning Based on Multi-expert Collaboration and Information Interaction [J]. Computer Science, 2026, 53(3): 197-206. |
| [14] | ZOU Xiaoyang, JU Hengrong, CAO Jinxin, MA Xingru, HUANG Jiashuang, DING Weiping. Overlapping Community Detection with Graph Regularized Fuzzy Autoencoder [J]. Computer Science, 2026, 53(3): 207-213. |
| [15] | WANG Yizong, NING Hongbo, WANG Haofeng, MA Siwei, GAO Wen. Low-bitrate and Real-time Multiview Video Streaming with 3D Gaussian Splatting [J]. Computer Science, 2026, 53(3): 225-230. |
|
||