{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:41:26Z","timestamp":1761000086102,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535361"},{"type":"electronic","value":"9789819535378"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3537-8_24","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T10:43:27Z","timestamp":1760870607000},"page":"438-456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TetheGAN: A GAN-Based Synthetic Mobile Tethering Traffic Generating Framework"],"prefix":"10.1007","author":[{"given":"Xuman","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Li","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"24_CR1","unstructured":"NS-3 network simulator (2020). https:\/\/www.nsnam.org\/"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"24_CR3","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: International Conference on Machine Learning, pp. 214\u2013223. PMLR (2017)"},{"issue":"8","key":"24_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3547139","volume":"55","author":"A Blanco-Justicia","year":"2022","unstructured":"Blanco-Justicia, A., S\u00e1nchez, D., Domingo-Ferrer, J., Muralidhar, K.: A critical review on the use (and misuse) of differential privacy in machine learning. ACM Comput. Surv. 55(8), 1\u201316 (2022)","journal-title":"ACM Comput. Surv."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, A.: PAC-GAN: packet generation of network traffic using generative adversarial networks. In: 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 0728\u20130734. IEEE (2019)","DOI":"10.1109\/IEMCON.2019.8936224"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-81242-3_1","volume-title":"Data and Applications Security and Privacy XXXV","author":"L Fan","year":"2021","unstructured":"Fan, L., Pokkunuru, A.: DPNeT: differentially private network traffic synthesis with generative adversarial networks. In: Barker, K., Ghazinour, K. (eds.) DBSec 2021. LNCS, vol. 12840, pp. 3\u201321. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81242-3_1"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Ge, Z., Wu, H., Cheng, G., Hu, X.: NFlowGAN: high-utility privacy-preserving network flow synthesis based on GAN. In: ICC 2023-IEEE International Conference on Communications, pp. 4057\u20134062. IEEE (2023)","DOI":"10.1109\/ICC45041.2023.10279346"},{"key":"24_CR8","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Hui, S., et al.: Knowledge enhanced GAN for IoT traffic generation. In: Proceedings of the ACM Web Conference 2022, pp. 3336\u20133346 (2022)","DOI":"10.1145\/3485447.3511976"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Ji, J., et al.: Spatio-temporal self-supervised learning for traffic flow prediction. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 4356\u20134364 (2023)","DOI":"10.1609\/aaai.v37i4.25555"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.comcom.2020.11.003","volume":"166","author":"Z Jin","year":"2021","unstructured":"Jin, Z., Liang, Z., Wang, Y., Meng, W.: Mobile network traffic pattern classification with incomplete a priori information. Comput. Commun. 166, 262\u2013270 (2021)","journal-title":"Comput. Commun."},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Kong, Z.J., Hu, N., Hu, Y.C., Meng, J., Koral, Y.: High-fidelity cellular network control-plane traffic generation without domain knowledge. In: Proceedings of the 2024 ACM on Internet Measurement Conference, pp. 530\u2013544 (2024)","DOI":"10.1145\/3646547.3688422"},{"key":"24_CR13","unstructured":"Kurakin, A., Song, S., Chien, S., Geambasu, R., Terzis, A., Thakurta, A.: Toward training at ImageNet scale with differential privacy. arXiv preprint arXiv:2201.12328 (2022)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Li, R., Li, Q., Zou, Q., et al.: IoTGemini: modeling IoT network behaviors for synthetic traffic generation. IEEE Trans. Mob. Comput. (2024)","DOI":"10.1109\/TMC.2024.3426600"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Lin, Z., Jain, A., Wang, C., Fanti, G., Sekar, V.: Using GANs for sharing networked time series data: challenges, initial promise, and open questions. In: Proceedings of the ACM Internet Measurement Conference, pp. 464\u2013483 (2020)","DOI":"10.1145\/3419394.3423643"},{"issue":"1","key":"24_CR16","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1038\/s41597-022-01418-y","volume":"9","author":"F Loh","year":"2022","unstructured":"Loh, F., Wamser, F., Poign\u00e9e, F., Gei\u00dfler, S., Ho\u00dffeld, T.: YouTube dataset on mobile streaming for internet traffic modeling and streaming analysis. Sci. Data 9(1), 293 (2022)","journal-title":"Sci. Data"},{"issue":"3","key":"24_CR17","doi-asserted-by":"publisher","first-page":"3647","DOI":"10.1109\/TNSM.2021.3062488","volume":"18","author":"R Mateless","year":"2021","unstructured":"Mateless, R., Zlatokrilov, H., Orevi, L., Segal, M., Moskovitch, R.: IPvest: clustering the IP traffic of network entities hidden behind a single IP address using machine learning. IEEE Trans. Netw. Serv. Manage. 18(3), 3647\u20133661 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Miyata, S.: Cost sharing method for a mobile tethering with a coalitional game theory. In: 2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 291\u2013296. IEEE (2024)","DOI":"10.1109\/ICAIIC60209.2024.10463469"},{"key":"24_CR19","unstructured":"Red\u017eovi\u0107, H., Smiljani\u0107, A., Bjelica, M.: IP traffic generator based on hidden Markov models. Parameters 1(2), 1 (2017)"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Ribeiro, I.F., Brotto, G., Rocha, A.A.D.A., Mota, V.F.: Measuring fidelity and utility of time series generative adversarial networks. In: 2024 IEEE Symposium on Computers and Communications (ISCC), pp.\u00a01\u20136. IEEE (2024)","DOI":"10.1109\/ISCC61673.2024.10733699"},{"key":"24_CR21","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.cose.2018.12.012","volume":"82","author":"M Ring","year":"2019","unstructured":"Ring, M., Schl\u00f6r, D., Landes, D., Hotho, A.: Flow-based network traffic generation using generative adversarial networks. Comput. Secur. 82, 156\u2013172 (2019)","journal-title":"Comput. Secur."},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Sommers, J., Kim, H., Barford, P.: Harpoon: a flow-level traffic generator for router and network tests. ACM SIGMETRICS Perform. Eval. Rev. 32(1), 392 (2004)","DOI":"10.1145\/1012888.1005733"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Sun, D., Chen, J.Q., Gong, C., Wang, T., Li, Z.: NetDPSyn: synthesizing network traces under differential privacy. In: Proceedings of the 2024 ACM on Internet Measurement Conference, pp. 545\u2013554 (2024)","DOI":"10.1145\/3646547.3689011"},{"issue":"3","key":"24_CR24","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TNET.2009.2020830","volume":"17","author":"KV Vishwanath","year":"2009","unstructured":"Vishwanath, K.V., Vahdat, A.: Swing: realistic and responsive network traffic generation. IEEE\/ACM Trans. Network. 17(3), 712\u2013725 (2009)","journal-title":"IEEE\/ACM Trans. Network."},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Wang, M., Yang, N., Forcade-Perkins, N.J., Weng, N.: ProGen: projection-based adversarial attack generation against network intrusion detection. IEEE Trans. Inf. Forensics Secur. (2024)","DOI":"10.1109\/TIFS.2024.3402155"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Wang, P., Li, S., Ye, F., Wang, Z., Zhang, M.: PacketCGAN: exploratory study of class imbalance for encrypted traffic classification using CGAN. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp.\u00a01\u20137. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9148946"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Xiao, H., Wan, J., Devadas, S.: Geometry of sensitivity: twice sampling and hybrid clipping in differential privacy with optimal gaussian noise and application to deep learning. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2636\u20132650 (2023)","DOI":"10.1145\/3576915.3623142"},{"key":"24_CR28","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"24_CR29","unstructured":"Xu, S., Marwah, M., Ramakrishnan, N.: STAN: synthetic network traffic generation using autoregressive neural models. CoRR abs\/2009.12740 (2020). https:\/\/arxiv.org\/abs\/2009.12740"},{"issue":"3","key":"24_CR30","doi-asserted-by":"publisher","first-page":"5179","DOI":"10.32604\/cmc.2022.021626","volume":"70","author":"T Yang","year":"2022","unstructured":"Yang, T., Wang, C., Zhou, T., Cai, Z., Wu, K., Hou, B.: Leveraging active decremental TTL measuring for flexible and efficient NAT identification. Comput. Mater. Continua 70(3), 5179\u20135198 (2022)","journal-title":"Comput. Mater. Continua"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Yin, Y., Lin, Z., Jin, M., Fanti, G., Sekar, V.: Practical GAN-based synthetic IP header trace generation using NetShare. In: Proceedings of the ACM SIGCOMM 2022 Conference, pp. 458\u2013472 (2022)","DOI":"10.1145\/3544216.3544251"},{"key":"24_CR32","unstructured":"Zhang, K., Patki, N., Veeramachaneni, K.: Sequential models in the synthetic data vault. arXiv preprint arXiv:2207.14406 (2022)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3537-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:02:41Z","timestamp":1760997761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3537-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535361","9789819535378"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3537-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}