{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:28:35Z","timestamp":1760027315008,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067907"},{"type":"electronic","value":"9783031067914"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06791-4_43","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T23:03:27Z","timestamp":1656889407000},"page":"544-557","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Survey of Traffic Classification Technology for Smart Home Based on Machine Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7889-2481","authenticated-orcid":false,"given":"Jie","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yaping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhiyu","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Ren, J.J., Dubois, D.J., Choffnes, D., et al.: Information exposure from consumer IoT devices: a multidimensional, network-informed measurement approach. In: Proceedings of the Internet Measurement Conference, 21\u201323 October 2019, pp. 267\u2013279. Association for Computing Machinery, New York  (2019)","DOI":"10.1145\/3355369.3355577"},{"key":"43_CR2","unstructured":"Hammad, M.M., Shafiq, Z.: Characterizing smart home IoT traffic in the wild. In:  2020 ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI), Sydney, Australia,  21\u201324 April 2020, pp. 203\u2013215. Association for Computing Machinery, New York (2020)"},{"key":"43_CR3","unstructured":"Jun, B., Jingbo, Jixiang, W.: Survey on real-time traffic classification. Comput. Sci. 37(6), 1402\u20131412 (2019)"},{"key":"43_CR4","unstructured":"Apthorpe, N.J.: Spying on the smart home: privacy attacks and defenses on encrypted IoT traffic. arXiv: 1708.05044 (2017)"},{"issue":"6","key":"43_CR5","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/JSAC.2019.2904364","volume":"37","author":"S Marchal","year":"2019","unstructured":"Marchal, S., Miettinen, M., Nguyen, T.D., et al.: AuDI: toward autonomous IoT device-type identification using periodic communication. IEEE J. Sel. Areas Commun. 37(6), 1402\u20131412 (2019)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Sivanathan, A., Sherratt, D., Gharakheili, H.H.: Characterizing and classifying IOT traffic in smart cities and campuses. In: IEEE Conference on Computer Communications Workshops (INFOCOM WK- SHPS), pp. 559\u2013564. IEEE (2017)","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Miettinen, M., Marchal, S., Hafeez, I., et al.: IoT sentinel demo: automated device-type identification for security enforcement in IoT. In:  2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5\u20138 June 2017,  pp. 2177\u20132184. IEEE, New York (2017)","DOI":"10.1109\/ICDCS.2017.284"},{"key":"43_CR8","unstructured":"Meidan, Y.: Detection of unauthorized IOT devices using machine learning techniques. arXiv: 1709.04647 (2017)"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Santos, M.R.P., Andrade, R.M.C., Gomes, D.G.: An efficient approach for device identification and traffic classification in IoT ecosystems. In: 2018 IEEE Symposium on Computers and Communications (ISCC), pp. 304\u2013309. IEEE (2018)","DOI":"10.1109\/ISCC.2018.8538630"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Shahid, M.R, Blanc, G., Zhang, Z.H.: IoT devices recognition through network traffic analysis. In: IEEE International Conference on Big Data (Big Data), pp. 5187\u20135192. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622243"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Alshehri, A., Granley, J., Yue, C.: Attacking and protecting tunneled traffic of smart home devices. In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 259\u2013270 (2020)","DOI":"10.1145\/3374664.3375723"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Oconnor, T.J., Mohamed, R., Miettinen, M.: HomeSnitch: behavior transparency and control for smart home IOT devices. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 128\u2013138. ACM (2019)","DOI":"10.1145\/3317549.3323409"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Charyyev, B., Gunes, M.H.: IoT event classification based on network. In: IEEE INFOCOM 2020- IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), vol. 2020, pp. 854\u2013859. IEEE (2020)","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162885"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Li, H., He, Y., Sun, L.: Side-channel information leakage of encrypted video stream in video surveillance systems. In: IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/INFOCOM.2016.7524621"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Wang, J., Cao, Z., Kang, C.: User behavior classification in encrypted cloud camera traffic. In: 2019 IEEE Global Communications Conference (GLOBECOM). vol. 2019, pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013558"},{"issue":"1","key":"43_CR16","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/JIOT.2018.2865604","volume":"6","author":"V Thangavelu","year":"2019","unstructured":"Thangavelu, V., Divakaran, D.M., Sairam, R.: IEEE Internet Things J. 6(1), 940\u2013952 (2019)","journal-title":"IEEE Internet Things J."},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Trimananda, R., Varmarken, J., Markopoulou, A.: Packet-level signatures for smart home devices. In: Proceedings 2020 Network and Distributed System Security Symposium (2020)","DOI":"10.14722\/ndss.2020.24097"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Ortiz, J., Crawford, C., Le, F.: DeviceMien: network device behavior modeling for identifying un-known IoT devices. In: Proceedings of the International Conference on Internet of Things Design and Implementation, pp. 106\u2013117. ACM (2019)","DOI":"10.1145\/3302505.3310073"},{"issue":"3","key":"43_CR19","first-page":"66","volume":"6","author":"M Zhai","year":"2020","unstructured":"Zhai, M., Zhang, X., Zhao, B.: Survey of encrypted malicious traffic detectionbased on deep learning. Chin. J. Netw. Inf. Secur. 6(3), 66\u201377 (2020)","journal-title":"Chin. J. Netw. Inf. Securitym"},{"key":"43_CR20","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge, pp. 367\u2013415 (2016)"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Bai, L., Yao, L.N., Salil, S.: Automatic device classification from network traffic streams of internet of things. In: 2018 IEEE 43rd Conference on Local Computer Networks (LCN), pp. 597\u2013605. IEEE (2018)","DOI":"10.1109\/LCN.2018.8638232"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Dong, S.K., Zhou, L., Tang, D.: Your smart home can\u2019t keep a secret: towards automated fingerprinting of IOT traffic with neural networks. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, vol. 2020, pp. 47\u201359. ACM (2020)","DOI":"10.1145\/3320269.3384732"},{"key":"43_CR23","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1109\/TMC.2018.2866249","volume":"18","author":"A Sivanathan","year":"2019","unstructured":"Sivanathan, A., Gharakheili, H.H., Loi, F.: Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mob. Comput. 18, 1745\u20131759 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"43_CR24","doi-asserted-by":"crossref","unstructured":"Aksoy, A., Gunes, M.H.: Automated IoT Device identification using network traffic. In: IEEE. ICC 2019 - 2019 IEEE International Conference on Communications (ICC), vol. 2019, pp. 1\u20137. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761559"},{"key":"43_CR25","doi-asserted-by":"crossref","unstructured":"Pashamokhtari: Phd forum abstract: Dynamic inference on IoT network traffic using programmable telemetry and machine learning, pp. 371\u2013372 (2020)","DOI":"10.1109\/IPSN48710.2020.00006"},{"key":"43_CR26","unstructured":"Sivanathan, A.: IoT behavioral monitoring via network traffic analysis. arXiv:2001.10632 (2020)"},{"key":"43_CR27","doi-asserted-by":"crossref","unstructured":"Acar, A., Fereidooni, H., Abera, T.: Peek-a-Boo: I see your smart home activities. In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. vol. 2020, pp. 207\u2013218. ACM (2020)","DOI":"10.1145\/3395351.3399421"},{"key":"43_CR28","doi-asserted-by":"crossref","unstructured":"Wan, Y., Xu, K., Xue, G.: IoTArgos: a multi-layer security monitoring system for internet- of-things in smart homes. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, vol. 2020, pp. 874\u2013883. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155424"},{"key":"43_CR29","unstructured":"Vaswani, A., Shazeer, N., Parmar, N.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 5998\u20136008. ACM (2017)"},{"key":"43_CR30","unstructured":"Bubeck, S.: Introduction to online optimization (2020). https:\/\/www.microsoft.com\/en-us\/research\/publication\/introduction-online-optimization\/"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06791-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T12:37:30Z","timestamp":1657715850000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06791-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067907","9783031067914"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06791-4_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}