• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Chong, Wei Ziling, Chen Shuhui. Action Identification Without Bounds on Applications Based on Self-Attention Mechanism[J]. Journal of Computer Research and Development, 2022, 59(5): 1092-1104. DOI: 10.7544/issn1000-1239.20211158
Citation: Wang Chong, Wei Ziling, Chen Shuhui. Action Identification Without Bounds on Applications Based on Self-Attention Mechanism[J]. Journal of Computer Research and Development, 2022, 59(5): 1092-1104. DOI: 10.7544/issn1000-1239.20211158

Action Identification Without Bounds on Applications Based on Self-Attention Mechanism

Funds: This work was supported by the Project of Hunan Provincial Key Laboratory of Media Fusion Content Aware and Security, the General Program of the National Natural Science Foundation of China (61972412), the Science and Technology Innovation Plan of Hunan Province (2020RC2047).
More Information
  • Published Date: April 30, 2022
  • In recent years, the industrial Internet has experienced a rapid development. However, like the traditional Internet, the industrial Internet also faces a large number of threats from cyber-attacks and sensitive information leakage risks. Traffic classification technology, especially fine-grained application action identification, can assist network managers in detecting abnormal behaviors and discovering privacy leakage risks. It provides the security of the industrial Internet. Whereas, the existing action identification technology relies on the pre-segmentation of the action bounds in the traffic. In this case, existing methods cannot identify actions without bounds, which are difficult to be used in real scenes. Therefore, an action identification algorithm without bounds is proposed. Firstly, we build a packet-level identification model based on self-attention mechanism to classify packets. Then we propose an action aggregation algorithm to acquire action sequence from the classification results of packets. Finally, we establish two new indicators to measure the quality of the identification result. To verify the feasibility of our algorithm, we take WeChat as an example to conduct experiments. The results show that the model can achieve a sequential precision of up to 90%. This research is expected to greatly promote the practical application of action identification technology.
  • Related Articles

    [1]Zhou Yuanding, Gao Guopeng, Fang Yaodong, Qin Chuan. Perceptual Authentication Hashing with Image Feature Fusion Based on Window Self-Attention[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330669
    [2]Gao Yujia, Wang Pengfei, Liu Liang, Ma Huadong. Personalized Federated Learning Method Based on Attention-Enhanced Meta-Learning Network[J]. Journal of Computer Research and Development, 2024, 61(1): 196-208. DOI: 10.7544/issn1000-1239.202220922
    [3]Kang Hongbo, Feng Yujia, Tai Wenxin, Lan Tian, Wu Zufeng, Liu Qiao. Monaural Speech Enhancement Based on Cross-Dimensional Collaborative Attention Mechanism[J]. Journal of Computer Research and Development, 2023, 60(7): 1639-1648. DOI: 10.7544/issn1000-1239.202220129
    [4]Yang Jing, Zhang Canlong, Li Zhixin, Tang Yanping. Integrated Spatial Attention and Pose Estimation for Occluded Person Re-Identification[J]. Journal of Computer Research and Development, 2022, 59(7): 1522-1532. DOI: 10.7544/issn1000-1239.20200949
    [5]Wang Honglin, Yang Dan, Nie Tiezheng, Kou Yue. Attributed Heterogeneous Information Network Embedding with Self-Attention Mechanism for Product Recommendation[J]. Journal of Computer Research and Development, 2022, 59(7): 1509-1521. DOI: 10.7544/issn1000-1239.20210016
    [6]Guo Lei, Li Qiuju, Liu Fang’ai, Wang Xinhua. Shared-Account Cross-Domain Sequential Recommendation with Self-Attention Network[J]. Journal of Computer Research and Development, 2021, 58(11): 2524-2537. DOI: 10.7544/issn1000-1239.2021.20200564
    [7]Zhang Yingying, Qian Shengsheng, Fang Quan, Xu Changsheng. Multi-Modal Knowledge-Aware Attention Network for Question Answering[J]. Journal of Computer Research and Development, 2020, 57(5): 1037-1045. DOI: 10.7544/issn1000-1239.2020.20190474
    [8]Sun Xiaowan, Wang Ying, Wang Xin, Sun Yudong. Aspect-Based Sentiment Analysis Model Based on Dual-Attention Networks[J]. Journal of Computer Research and Development, 2019, 56(11): 2384-2395. DOI: 10.7544/issn1000-1239.2019.20180823
    [9]Zhang Han, Guo Yuanbo, Li Tao. Domain Named Entity Recognition Combining GAN and BiLSTM-Attention-CRF[J]. Journal of Computer Research and Development, 2019, 56(9): 1851-1858. DOI: 10.7544/issn1000-1239.2019.20180733
    [10]Zhang Zhichang, Zhang Zhenwen, Zhang Zhiman. User Intent Classification Based on IndRNN-Attention[J]. Journal of Computer Research and Development, 2019, 56(7): 1517-1524. DOI: 10.7544/issn1000-1239.2019.20180648
  • Cited by

    Periodical cited type(4)

    1. 樊哲,万雨龙,臧兴杰. 基于数据挖掘的智慧家电安全风险识别系统. 自动化技术与应用. 2024(07): 117-120 .
    2. 屈进勇. 基于改进生成对抗网络的新能源汽车焊接缺陷检测研究. 焊接技术. 2024(12): 120-125 .
    3. 黄锦波,周荣生,罗龙波,凌毓畅,潘凯岩. 基于BERT预训练的电力变压器故障预测. 制造业自动化. 2023(09): 89-93 .
    4. 晏国良. 基于视觉图像的典型舞蹈拉伸动作识别方法. 怀化学院学报. 2023(05): 108-113 .

    Other cited types(4)

Catalog

    Article views (294) PDF downloads (231) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return