{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:28:36Z","timestamp":1743010116186,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030791995"},{"type":"electronic","value":"9783030792008"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79200-8_59","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"407-413","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Application Behavior Recognition Based on Dual-Domain Attention and Meta-learning"],"prefix":"10.1007","author":[{"given":"Wenjun","family":"Zhang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"Malik, N., Chandramouli, J., Suresh, P., et al.: Using network traffic to verify mobile device forensic artifacts. In: The 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, Las Vegas, NV, USA, 8\u201311 January 2017, pp. 114\u2013119 (2017)","DOI":"10.1109\/CCNC.2017.8013425"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Y.-C., Liao, Y., Baldi, M., et al.: OS fingerprinting and tethering detection in mobile networks. In: Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, 5\u20137 November 2014, pp. 173\u2013180 (2014)","DOI":"10.1145\/2663716.2663745"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Alan, H.F., Kaur, J.: Can android applications be identified using only TCP\/IP headers of their launch time traffic, pp. 61\u201366 (2016)","DOI":"10.1145\/2939918.2939929"},{"key":"59_CR4","unstructured":"Hyunchul, K., Claffy, K.C., Fomenkov, M., et al.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of ACM CoNEXT Conference-4th International Conference on Emerging Networking EXperiments and Technologies (2008)"},{"issue":"10","key":"59_CR5","doi-asserted-by":"publisher","first-page":"4867","DOI":"10.1007\/s11227-018-2263-3","volume":"74","author":"M Shafiq","year":"2018","unstructured":"Shafiq, M., Yu, X., Bashir, A.K., Chaudhry, H.N., Wang, D.: A machine learning approach for feature selection traffic classification using security analysis. J. Supercomput. 74(10), 4867\u20134892 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2263-3","journal-title":"J. Supercomput."},{"issue":"5","key":"59_CR6","first-page":"5","volume":"44","author":"SE Coull","year":"2014","unstructured":"Coull, S.E., Dyer, K.P.: Traffic analysis of encrypted messaging services. 44(5), 5\u201311 (2014)","journal-title":"Traffic analysis of encrypted messaging services."},{"issue":"11","key":"59_CR7","doi-asserted-by":"publisher","first-page":"2851","DOI":"10.1109\/TMC.2016.2516020","volume":"15","author":"Y Fu","year":"2016","unstructured":"Fu, Y., Xiong, H., Lu, X., et al.: Service usage classification with encrypted internet traffic in mobile messaging apps. IEEE Trans. Mob. Comput. 15(11), 2851\u20132864 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"59_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-319-31875-2_21","volume-title":"Information Security Applications","author":"K Park","year":"2016","unstructured":"Park, K., Kim, H.: Encryption is not enough: inferring user activities on KakaoTalk with traffic analysis. In: Kim, H.-W., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 254\u2013265. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31875-2_21"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Q.L., Yahyavi, A., Kemme, B., et al.: I know what you did on your smartphone: inferring app usage over encrypted data traffic. In: The 2015 IEEE Conference on Communications and Network Security, Florence, Italy, 28\u201330 September 2015, pp. 433\u2013441 (2015)","DOI":"10.1109\/CNS.2015.7346855"},{"key":"59_CR10","unstructured":"Wang, W.: Research on network traffic classification and anomaly detection methods based on deep learning. University of Science and Technology of China (2018)"},{"key":"59_CR11","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/TIFS.2016.2631949","volume":"12","author":"Y Nan","year":"2017","unstructured":"Nan, Y., Yang, Z., Yang, M., et al.: Identifying user-input privacy in mobile applications at a large scale. IEEE Trans. Inf. Forensics Secur. 12, 647\u2013661 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"59_CR12","unstructured":"Gasparis, I.: Ensuring users privacy and security on mobile devices. University of California, Riverside, USA (2017)"},{"key":"59_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TIFS.2015.2478741","volume":"11","author":"M Conti","year":"2016","unstructured":"Conti, M., Mancini, L.V., Spolaor, R., et al.: Analyzing android encrypted network traffic to identify user actions. IEEE Trans. Inf. Forensics Secur. 11, 114\u2013125 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Advances in Intelligent Systems and Computing","2021 International Conference on Applications and Techniques in Cyber Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79200-8_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:35:06Z","timestamp":1624473306000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79200-8_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030791995","9783030792008"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79200-8_59","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Cyber Security and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atci2021.fynu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}