{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:41:07Z","timestamp":1761000067502,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535361"},{"type":"electronic","value":"9789819535378"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3537-8_26","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T10:43:24Z","timestamp":1760870604000},"page":"476-492","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-modal Datagram Representation with\u00a0Spatial-Temporal State Space Models and\u00a0Inter-flow Contrastive Learning for\u00a0Encrypted Traffic Classification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6611-5295","authenticated-orcid":false,"given":"Xianwen","family":"Deng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6168-8687","authenticated-orcid":false,"given":"Ruijie","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5564-5397","authenticated-orcid":false,"given":"Mingwei","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Shaoqian","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4613-0340","authenticated-orcid":false,"given":"Yijun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Investigating two different approaches for encrypted traffic classification. In: 2008 Sixth Annual Conference on Privacy, Security and Trust, pp. 156\u2013166 (2008)","DOI":"10.1109\/PST.2008.15"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Machine learning based encrypted traffic classification: identifying SSH and skype. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.\u00a01\u20138 (2009)","DOI":"10.1109\/CISDA.2009.5356534"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Barradas, D., Santos, N., Rodrigues, L., Signorello, S., Ramos, F.M., Madeira, A.: Flowlens: enabling efficient flow classification for ml-based network security applications. In: NDSS (2021)","DOI":"10.14722\/ndss.2021.24067"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.comnet.2014.11.001","volume":"76","author":"T Bujlow","year":"2015","unstructured":"Bujlow, T., Carela-Espa\u00f1ol, V., Barlet-Ros, P.: Independent comparison of popular DPI tools for traffic classification. Comput. Netw. 76, 75\u201389 (2015)","journal-title":"Comput. Netw."},{"key":"26_CR5","unstructured":"Cao, Z., Xiong, G., Zhao, Y., Li, Z., Guo, L.: A survey on encrypted traffic classification. In: Applications and Techniques in Information Security: 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, 26\u201328 November 2014. Proceedings 5, pp. 73\u201381 (2014)"},{"key":"26_CR6","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607 (2020)"},{"key":"26_CR7","unstructured":"Constantinou, F., Mavrommatis, P.: Identifying known and unknown peer-to-peer traffic. In: Fifth IEEE International Symposium on Network Computing and Applications (NCA 2006), pp. 93\u2013102 (2006)"},{"key":"26_CR8","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407\u2013414 (2016)","DOI":"10.5220\/0005740704070414"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Dusi, M., Este, A., Gringoli, F., Salgarelli, L.: Using GMM and SVM-based techniques for the classification of SSH-encrypted traffic. In: 2009 IEEE International Conference on Communications, pp.\u00a01\u20136 (2009)","DOI":"10.1109\/ICC.2009.5199557"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International Conference on World Wide Web, pp. 883\u2013892 (2007)","DOI":"10.1145\/1242572.1242692"},{"issue":"2","key":"26_CR12","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2013","unstructured":"Finsterbusch, M., Richter, C., Rocha, E., Muller, J.A., Hanssgen, K.: A survey of payload-based traffic classification approaches. IEEE Commun. Surv. Tutor. 16(2), 1135\u20131156 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Fu, C., Li, Q., Shen, M., Xu, K.: Realtime robust malicious traffic detection via frequency domain analysis. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3431\u20133446 (2021)","DOI":"10.1145\/3460120.3484585"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Fu, C., Li, Q., Xu, K.: Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. arXiv preprint arXiv:2301.13686 (2023)","DOI":"10.14722\/ndss.2023.23080"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"He, K., Chen, X., Xie, S., Li, Y., Doll\u00e1r, P., Girshick, R.: Masked autoencoders are scalable vision learners. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16000\u201316009 (2022)","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Keralapura, R., Nucci, A., Chuah, C.N.: Self-learning peer-to-peer traffic classifier. In: 2009 Proceedings of 18th International Conference on Computer Communications and Networks, pp.\u00a01\u20138 (2009)","DOI":"10.1109\/ICCCN.2009.5235313"},{"key":"26_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107974","volume":"190","author":"K Lin","year":"2021","unstructured":"Lin, K., Xu, X., Gao, H.: TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT. Comput. Netw. 190, 107974 (2021)","journal-title":"Comput. Netw."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Yu, J.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference 2022, pp. 633\u2013642 (2022)","DOI":"10.1145\/3485447.3512217"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: FS-net: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference On Computer Communications, pp. 1171\u20131179 (2019)","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Qi, Y., Xu, L., Yang, B., Xue, Y., Li, J.: Packet classification algorithms: from theory to practice. In: IEEE INFOCOM 2009, pp. 648\u2013656 (2009)","DOI":"10.1109\/INFCOM.2009.5061972"},{"issue":"5","key":"26_CR21","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76\u201381 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Risso, F., Baldi, M., Morandi, O., Baldini, A., Monclus, P.: Lightweight, payload-based traffic classification: an experimental evaluation. In: 2008 IEEE International Conference on Communications, pp. 5869\u20135875 (2008)","DOI":"10.1109\/ICC.2008.1097"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 135\u2013148 (2004)","DOI":"10.1145\/1028788.1028805"},{"key":"26_CR24","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.comnet.2018.01.007","volume":"132","author":"H Shi","year":"2018","unstructured":"Shi, H., Li, H., Zhang, D., Cheng, C., Cao, X.: An efficient feature generation approach based on deep learning and feature selection techniques for traffic classification. Comput. Netw. 132, 81\u201398 (2018)","journal-title":"Comput. Netw."},{"issue":"1","key":"26_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","volume":"13","author":"VF Taylor","year":"2017","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans. Inf. Forensics Secur. 13(1), 63\u201378 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"26_CR26","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TBDATA.2019.2940675","volume":"8","author":"H Yao","year":"2019","unstructured":"Yao, H., Liu, C., Zhang, P., Wu, S., Jiang, C., Yu, S.: Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans. Big Data 8(1), 241\u2013252 (2019)","journal-title":"IEEE Trans. Big Data"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Zhao, R., et al.: Yet another traffic classifier: a masked autoencoder based traffic transformer with multi-level flow representation. In: AAAI, vol.\u00a037, pp. 5420\u20135427 (2023)","DOI":"10.1609\/aaai.v37i4.25674"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3537-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:02:52Z","timestamp":1760997772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3537-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535361","9789819535378"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3537-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}