{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:40:22Z","timestamp":1743658822750,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031823480","type":"print"},{"value":"9783031823497","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82349-7_14","type":"book-chapter","created":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:22:10Z","timestamp":1743657730000},"page":"193-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secrecy and\u00a0Sensitivity: Privacy-Performance Trade-Offs in\u00a0Encrypted Traffic Classification"],"prefix":"10.1007","author":[{"given":"Spencer","family":"Giddens","sequence":"first","affiliation":[]},{"given":"Raphael","family":"Labaca-Castro","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Sandra","family":"Guasch","sequence":"additional","affiliation":[]},{"given":"Parth","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Gama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"14_CR1","first-page":"751","volume":"52","author":"S Ahn","year":"2015","unstructured":"Ahn, S.: Whose genome is it anyway?: re-identification and privacy protection in public and participatory genomics. The San Diego Law Rev. 52, 751 (2015)","journal-title":"The San Diego Law Rev."},{"key":"14_CR2","unstructured":"Akbari, I., Tahoun, E.: PrivPkt: privacy preserving collaborative encrypted traffic classification. ResearchGate (2020). https:\/\/doi.org\/10.13140\/RG.2.2.22431.59046"},{"key":"14_CR3","unstructured":"Beaulieu-Jones, B.K., Yuan, W., Finlayson, S.G., Wu, Z.S.: Privacy-preserving distributed deep learning for clinical data (2018)"},{"key":"14_CR4","unstructured":"Cha, S., Kim, H.: Detecting encrypted traffic: a machine learning approach. In: Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers 17, pp. 54\u201365. Springer (2017)"},{"key":"14_CR5","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. J. Mach. Learn. Res. 12(29), 1069\u20131109 (2011). http:\/\/jmlr.org\/papers\/v12\/chaudhuri11a.html"},{"key":"14_CR6","unstructured":"Desfontaines, D.: Demystifying the us census Bureau\u2019s reconstruction attack. https:\/\/desfontain.es\/privacy\/us-census-reconstruction-attack.html (2021). Accessed 5 Sept 2023"},{"key":"14_CR7","unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017). http:\/\/archive.ics.uci.edu\/ml"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486\u2013503. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_29"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography, pp. 265\u2013284. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878-14","DOI":"10.1007\/11681878_14"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014). https:\/\/doi.org\/10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Friedman, A., Schuster, A.: Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493\u2013502. KDD \u201910, Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1835804.1835868","DOI":"10.1145\/1835804.1835868"},{"key":"14_CR12","unstructured":"Holohan, N., Braghin, S., Mac\u00a0Aonghusa, P., Levacher, K.: Diffprivlib: the IBM differential privacy library. ArXiv e-prints 1907.02444 [cs.CR] (2019)"},{"key":"14_CR13","unstructured":"Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1895\u20131912. USENIX Association, Santa Clara, CA (2019). https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/jayaraman"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Kermany, D.S., et al.: Identifying medical diagnoses and treatable diseases by image-based deep learning. Cell 172(5) (2018). https:\/\/doi.org\/10.1016\/j.cell.2018.02.010","DOI":"10.1016\/j.cell.2018.02.010"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 111\u2013125 (2008). https:\/\/doi.org\/10.1109\/SP.2008.33","DOI":"10.1109\/SP.2008.33"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Pollard, T.J., Johnson, A.E., Raffa, J.D., Celi, L.A., Mark, R.G., Badawi, O.: The eICU collaborative research database, a freely available multi-center database for critical care research. Sci. Data 5 (2018)","DOI":"10.1038\/sdata.2018.178"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Shapira, T., Shavitt, Y.: FlowPic: encrypted internet traffic classification is as easy as image recognition. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 680\u2013687. IEEE (2019)","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"14_CR18","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017). https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Singh, R., Srivastav, G.: Novel framework for anomaly detection using machine learning technique on CIC-IDS2017 dataset. In: 2021 International Conference on Technological Advancements and Innovations (ICTAI), pp. 632\u2013636. IEEE (2021)","DOI":"10.1109\/ICTAI53825.2021.9673238"},{"key":"14_CR21","unstructured":"Sweeney, L.: Only you, your doctor, and many others may know. Technol. Sci. (2015). https:\/\/techscience.org\/a\/2015092903\/"},{"key":"14_CR22","doi-asserted-by":"publisher","unstructured":"Yeom, S., Giacomelli, I., Fredrikson, M., Jha, S.: Privacy risk in machine learning: analyzing the connection to overfitting. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 268\u2013282 (2018). https:\/\/doi.org\/10.1109\/CSF.2018.00027","DOI":"10.1109\/CSF.2018.00027"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving AdaBoost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. J. Phys.: Conf. Ser. 1192, 012018. IOP Publishing (2019)","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Zhao, B.Z.H., et al.: On the (in)feasibility of attribute inference attacks on machine learning models. In: 2021 IEEE European Symposium on Security and Privacy, pp. 232\u2013251 (2021). https:\/\/doi.org\/10.1109\/EuroSP51992.2021.00025","DOI":"10.1109\/EuroSP51992.2021.00025"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Ziller, A., Usynin, D., Braren, R., Makowski, M., Rueckert, D., Kaissis, G.: Medical imaging deep learning with differential privacy. Sci. Rep. 11(13524) (2021). https:\/\/doi.org\/10.1038\/s41598-021-93030-0","DOI":"10.1038\/s41598-021-93030-0"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82349-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:22:23Z","timestamp":1743657743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82349-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823480","9783031823497"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82349-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}