{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T22:29:54Z","timestamp":1768429794554,"version":"3.49.0"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031562488","type":"print"},{"value":"9783031562495","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56249-5_7","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:51:26Z","timestamp":1710831086000},"page":"159-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Data Augmentation for\u00a0Traffic Classification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5721-5221","authenticated-orcid":false,"given":"Chao","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2226-2506","authenticated-orcid":false,"given":"Alessandro","family":"Finamore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4675-7677","authenticated-orcid":false,"given":"Pietro","family":"Michiardi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8781-0775","authenticated-orcid":false,"given":"Massimo","family":"Gallo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3936-8876","authenticated-orcid":false,"given":"Dario","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"7_CR1","unstructured":"Additional material for the paper: Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. https:\/\/cloud.tsinghua.edu.cn\/f\/7f250d2ffce8404b845e\/?dl=1"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944","volume":"165","author":"G Aceto","year":"2019","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e8, A.: Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165, 106944 (2019)","journal-title":"Comput. Netw."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Persico, V., Pescap\u00e8, A.: Mirage: mobile-app traffic capture and ground-truth creation. In: IEEE International Conference on Computing, Communication and Security (ICCCS) (2019)","DOI":"10.1109\/CCCS.2019.8888137"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447382","volume":"5","author":"I Akbari","year":"2021","unstructured":"Akbari, I., et al.: A look behind the curtain: traffic classification in an increasingly encrypted web. ACM Measur. Anal. Comput. Syst. 5(1), 1\u201326 (2021)","journal-title":"ACM Measur. Anal. Comput. Syst."},{"key":"7_CR5","unstructured":"Bovenzi, G., et al.: A first look at class incremental learning in deep learning mobile traffic classification. In: IFIP Traffic Measurement and Analysis (TMA) (2021)"},{"key":"7_CR6","unstructured":"Burg, M.F., et al.: A data augmentation perspective on diffusion models and retrieval. arXiv:2304.10253 (2023)"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"7_CR8","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. arXiv:2002.05709 (2020)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Mane, D., Vasudevan, V., Le, Q.V.: Autoaugment: learning augmentation policies from data. arXiv:1805.09501 (2019)","DOI":"10.1109\/CVPR.2019.00020"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Shlens, J., Le, Q.V.: Randaugment: practical automated data augmentation with a reduced search space. arXiv:1909.13719 (2019)","DOI":"10.1109\/CVPRW50498.2020.00359"},{"key":"7_CR11","unstructured":"Cubuk, E.D., Dyer, E.S., Lopes, R.G., Smullin, S.: Tradeoffs in data augmentation: an empirical study. In: International Conference on Learning Representations (ICLR) (2021)"},{"key":"7_CR12","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar, J.: Statistical comparisons of classifiers over multiple data sets. J. Mach. Learn. Res. 7, 1\u201330 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Eldele, E., et al.: Time-series representation learning via temporal and contextual contrasting. arXiv:2106.14112 (2021)","DOI":"10.24963\/ijcai.2021\/324"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Guarino, I., Aceto, G., Ciuonzo, D., Montieri, A., Persico, V., Pescap\u00e9, A.: Classification of communication and collaboration apps via advanced deep-learning approaches. In: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (2021)","DOI":"10.1109\/CAMAD52502.2021.9617789"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Guarino, I., Wang, C., Finamore, A., Pescap\u00e9, A., Rossi, D.: Many or few samples? Comparing transfer, contrastive and meta-learning in encrypted traffic classification. In: IFIP Traffic Measurement and Analysis (TMA) (2023)","DOI":"10.23919\/TMA58422.2023.10198965"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1007\/11538059_91","volume-title":"Advances in Intelligent Computing","author":"H Han","year":"2005","unstructured":"Han, H., Wang, W.-Y., Mao, B.-H.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 878\u2013887. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11538059_91"},{"key":"7_CR17","unstructured":"He, H., Bai, Y., Garcia, E.A., Li, S.: ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: International Joint Conference on Neural Networks (IJCNN) (2008)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. arXiv:1512.03385 (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Hong, Y., Zhang, J., Sun, Z., Yan, K.: SAFA: sample-adaptive feature augmentation for long-tailed image classification. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds) Computer Vision. ECCV 2022. LNCS, vol. 13684, pp. 587\u2013603. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20053-3_34","DOI":"10.1007\/978-3-031-20053-3_34"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Horowicz, E., Shapira, T., Shavitt, Y.: A few shots traffic classification with mini-flowpic augmentations. In: ACM Internet Measurement Conference (IMC) (2022)","DOI":"10.1145\/3517745.3561436"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Jain, S., Addepalli, S., Sahu, P.K., Dey, P., Babu, R.V.: Dart: diversify-aggregate-repeat training improves generalization of neural networks. In: Computer Vision and Pattern Recognition (CVPR) (2023)","DOI":"10.1109\/CVPR52729.2023.01540"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Jiang, X., Liu, S., Gember-Jacobson, A., Schmitt, P., Bronzino, F., Feamster, N.: Generative, high-fidelity network traces. In: ACM Workshop on Hot Topics in Networks (HotNets) (2023)","DOI":"10.1145\/3626111.3628196"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0192-5","volume":"6","author":"JM Johnson","year":"2019","unstructured":"Johnson, J.M., Khoshgoftaar, T.M.: Survey on deep learning with class imbalance. J. Big Data 6, 1\u201354 (2019)","journal-title":"J. Big Data"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Luxemburk, J., Hynek, K., Cejka, T.: Encrypted traffic classification: the QUIC case. In: IFIP Traffic Measument and Analysis (TMA) (2023)","DOI":"10.23919\/TMA58422.2023.10199052"},{"key":"7_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109467","volume":"220","author":"J Luxemburk","year":"2023","unstructured":"Luxemburk, J., \u010cejka, T.: Fine-grained TLS services classification with reject option. Comput. Netw. 220, 109467 (2023)","journal-title":"Comput. Netw."},{"key":"7_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100258","volume":"16","author":"A Mumuni","year":"2022","unstructured":"Mumuni, A., Mumuni, F.: Data augmentation: a comprehensive survey of modern approaches. Array 16, 100258 (2022)","journal-title":"Array"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"M\u00fcller, S.G., Hutter, F.: Trivialaugment: tuning-free yet state-of-the-art data augmentation. In: International Conference on Computer Vision (ICCV) (2021)","DOI":"10.1109\/ICCV48922.2021.00081"},{"key":"7_CR28","unstructured":"Odena, A., Olah, C., Shlens, J.: Conditional image synthesis with auxiliary classifier gans. arXiv:1610.09585 (2017)"},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/COMST.2018.2883147","volume":"21","author":"F Pacheco","year":"2019","unstructured":"Pacheco, F., Exposito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun. Surv. Tutor. 21(2), 1988\u20132014 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"7_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.108397","volume":"117","author":"J P\u00f6ppelbaum","year":"2022","unstructured":"P\u00f6ppelbaum, J., Chadha, G.S., Schwung, A.: Contrastive learning based self-supervised time-series analysis. Appl. Soft Comput. 117, 108397 (2022)","journal-title":"Appl. Soft Comput."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: Unified, real-time object detection. arXiv:1506.02640 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"7_CR32","unstructured":"Rezaei, S., Liu, X.: How to achieve high classification accuracy with just a few labels: a semi-supervised approach using sampled packets. In: IEEE Industrial Conference Advances in Data Mining - Applications and Theoretical Aspects (ICDM) (2019)"},{"key":"7_CR33","unstructured":"Schuhmann, C., et al.: LAION-5b: an open large-scale dataset for training next generation image-text models. In: Neural Information Processing Systems (NeurIPS) - Datasets and Benchmarks Track (2022)"},{"issue":"1","key":"7_CR34","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/COMST.2022.3208196","volume":"25","author":"M Shen","year":"2023","unstructured":"Shen, M., et al.: Machine learning-powered encrypted network traffic analysis: a comprehensive survey. IEEE Commun. Surv. Tutor. 25(1), 791\u2013824 (2023)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"7_CR35","unstructured":"Shen, R., Bubeck, S., Gunasekar, S.: Data augmentation as feature manipulation. arXiv:2203.01572 (2022)"},{"issue":"1","key":"7_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0197-0","volume":"6","author":"C Shorten","year":"2019","unstructured":"Shorten, C., Khoshgoftaar, T.M.: A survey on image data augmentation for deep learning. J. Big Data 6(1), 1\u201348 (2019)","journal-title":"J. Big Data"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Sivaroopan, N., Madarasingha, C., Muramudalige, S., Jourjon, G., Jayasumana, A., Thilakarathna, K.: SyNIG: synthetic network traffic generation through time series imaging. In: IEEE Local Computer Networks (LCN) (2023)","DOI":"10.1109\/LCN58197.2023.10223392"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Sivaroopan, N., Bandara, D., Madarasingha, C., Jourjon, G., Jayasumana, A., Thilakarathna, K.: Netdiffus: network traffic generation by diffusion models through time-series imaging. arXiv:2310.04429 (2023)","DOI":"10.2139\/ssrn.4772614"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Towhid, M.S., Shahriar, N.: Encrypted network traffic classification using self-supervised learning. In: IEEE International Conference on Network Softwarization (NetSoft) (2022)","DOI":"10.1109\/NetSoft54395.2022.9844044"},{"key":"7_CR40","unstructured":"Trabucco, B., Doherty, K., Gurinas, M., Salakhutdinov, R.: Effective data augmentation with diffusion models. arXiv:2302.07944 (2023)"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Wang, P., Li, S., Ye, F., Wang, Z., Zhang, M.: PacketCGAN: exploratory study of class imbalance for encrypted traffic classification using CGAN. In: International Conference on Communications (ICC) (2020)","DOI":"10.1109\/ICC40277.2020.9148946"},{"key":"7_CR42","unstructured":"Wang, Y., Pan, X., Song, S., Zhang, H., Wu, C., Huang, G.: Implicit semantic data augmentation for deep networks. arXiv:1909.12220 (2020)"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, P., Zhou, X., Li, S., Zhang, M.: FlowGAN: unbalanced network encrypted traffic identification method based on GAN. In: Conference on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA\/BDCloud\/SocialCom\/SustainCom) (2019)","DOI":"10.1109\/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00141"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Wen, Q., et al.: Time series data augmentation for deep learning: a survey. In: International Joint Conference on Artificial Intelligence (IJCAI) (2021)","DOI":"10.24963\/ijcai.2021\/631"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Wen, Q., et al.: Transformers in time series: a survey. arXiv:2202.07125 (2023)","DOI":"10.24963\/ijcai.2023\/759"},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Xie, R., et al.: Rosetta: enabling robust TLS encrypted traffic classification in diverse network environments with TCP-Aware traffic augmentation. In: USENIX Security Symposium (Security) (2023)","DOI":"10.1145\/3603165.3607437"},{"key":"7_CR47","unstructured":"Yang, H., Yu, H., Sano, A.: Empirical evaluation of data augmentations for biobehavioral time series data with deep learning. arXiv:2210.06701 (2022)"},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"Yin, C., Zhu, Y., Liu, S., Fei, J., Zhang, H.: An enhancing framework for botnet detection using generative adversarial networks. In: IEEE International Conference on Artificial Intelligence and Big Data (ICAIBD) (2018)","DOI":"10.1109\/ICAIBD.2018.8396200"},{"key":"7_CR49","unstructured":"Yu, H., Sano, A.: Semi-supervised learning and data augmentation in wearable-based momentary stress detection in the wild. arXiv:2202.12935 (2022)"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Yue, Z., et al.: Ts2vec: towards universal representation of time series. In: Proceedings of the Association for the Advancement of Artificial Intelligence Conference (AAAI) (2022)","DOI":"10.1609\/aaai.v36i8.20881"},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Yun, S., Han, D., Oh, S.J., Chun, S., Choe, J., Yoo, Y.: Cutmix: regularization strategy to train strong classifiers with localizable features. arXiv:1905.04899 (2019)","DOI":"10.1109\/ICCV.2019.00612"},{"key":"7_CR52","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: mixup: Beyond empirical risk minimization. arXiv:1710.09412 (2018)"},{"key":"7_CR53","unstructured":"Zou, D., Cao, Y., Li, Y., Gu, Q.: The benefits of mixup for feature learning. arXiv:2303.08433 (2023)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56249-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T15:31:28Z","timestamp":1731598288000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56249-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031562488","9783031562495"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56249-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2024.cs.northwestern.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.42","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}