{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:00:12Z","timestamp":1773270012797,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_24","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:28:46Z","timestamp":1767320926000},"page":"448-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Training of\u00a0Efficient Traffic Classifier with\u00a0Noisy Labels"],"prefix":"10.1007","author":[{"given":"Zuoyu","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Mingwei","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Xianwen","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yijun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ruijie","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"24_CR1","unstructured":"Arazo, E., Ortego, D., Albert, P., O\u2019Connor, N., McGuinness, K.: Unsupervised label noise modeling and loss correction. In: International Conference on Machine Learning, pp. 312\u2013321 (2019)"},{"key":"24_CR2","unstructured":"Arpit, D., et\u00a0al.: A closer look at memorization in deep networks. In: International Conference on Machine Learning, pp. 233\u2013242. PMLR (2017)"},{"key":"24_CR3","unstructured":"Berthelot, D., Carlini, N., Goodfellow, I., Papernot, N., Oliver, A., Raffel, C.A.: MixMatch: A holistic approach to semi-supervised learning. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"issue":"2","key":"24_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJ Burges","year":"1998","unstructured":"Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121\u2013167 (1998)","journal-title":"Data Min. Knowl. Disc."},{"key":"24_CR5","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607. PMLR (2020)"},{"key":"24_CR6","unstructured":"Cui, Y., Yang, Z., Liu, T.: PERT: pre-training BERT with permuted language model. arXiv preprint arXiv:2203.06906 (2022)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Dadkhah, S., Mahdikhani, H., Danso, P.K., Zohourian, A., Truong, K.A., Ghorbani, A.A.: Towards the development of a realistic multidimensional IoT profiling dataset. In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST), pp. 1\u201311 (2022)","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"24_CR8","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Engelen, G., Rimmer, V., Joosen, W.: Troubleshooting an intrusion detection dataset: the cicids2017 case study. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 7\u201312 (2021)","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Fooladgar, F., To, M.N.N., Mousavi, P., Abolmaesumi, P.: Manifold DivideMix: a semi-supervised contrastive learning framework for severe label noise. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4012\u20134021 (2024)","DOI":"10.1109\/CVPRW63382.2024.00405"},{"key":"24_CR11","unstructured":"Gu, A., Dao, T.: Mamba: linear-time sequence modeling with selective state spaces. arXiv preprint arXiv:2312.00752 (2023)"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"102810","DOI":"10.1016\/j.cose.2022.102810","volume":"120","author":"JL Guerra","year":"2022","unstructured":"Guerra, J.L., Catania, C., Veas, E.: Datasets are not enough: challenges in labeling network traffic. Comput. Secur. 120, 102810 (2022)","journal-title":"Comput. Secur."},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Karim, N., Rizve, M.N., Rahnavard, N., Mian, A., Shah, M.: UNICON: combating label noise through uniform selection and contrastive learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9676\u20139686 (2022)","DOI":"10.1109\/CVPR52688.2022.00945"},{"key":"24_CR14","unstructured":"Krizhevsky, A., Hinton, G.: Learning multiple layers of features from tiny images. In: Handbook of Systemic Autoimmune Diseases, vol. 1 (2009)"},{"key":"24_CR15","unstructured":"Li, J., Socher, R., Hoi, S.C.: DivideMix: learning with noisy labels as semi-supervised learning. arXiv preprint arXiv:2002.07394 (2020)"},{"key":"24_CR16","doi-asserted-by":"publisher","first-page":"107974","DOI":"10.1016\/j.comnet.2021.107974","volume":"190","author":"K Lin","year":"2021","unstructured":"Lin, K., Xu, X., Gao, H.: TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT. Comput. Netw. 190, 107974 (2021)","journal-title":"Comput. Netw."},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Yu, J.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference 2022, pp. 633\u2013642 (2022)","DOI":"10.1145\/3485447.3512217"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: FS-Net: a flow sequence network for encrypted traffic classification. In: IEEE Conference on Computer Communications, IEEE INFOCOM 2019, pp. 1171\u20131179 (2019)","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"24_CR19","unstructured":"Lukasik, M., Bhojanapalli, S., Menon, A., Kumar, S.: Does label smoothing mitigate label noise? In: International Conference on Machine Learning, pp. 6448\u20136458 (2020)"},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"110714","DOI":"10.1016\/j.comnet.2024.110714","volume":"254","author":"D Niu","year":"2024","unstructured":"Niu, D., Cheng, G., Chen, Z., Qiu, X.: Video stalling identification for web live streaming under HTTP-FLV. Comput. Netw. 254, 110714 (2024)","journal-title":"Comput. Netw."},{"key":"24_CR21","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/j.patcog.2005.10.028","volume":"39","author":"H Permuter","year":"2006","unstructured":"Permuter, H., Francos, J., Jermyn, I.: A study of Gaussian mixture models of color and texture features for image classification and segmentation. Pattern Recogn. 39, 695\u2013706 (2006)","journal-title":"Pattern Recogn."},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Qing, Y., et al.: Low-quality training data only? A robust framework for detecting encrypted malicious network traffic. arXiv preprint arXiv:2309.04798 (2023)","DOI":"10.14722\/ndss.2024.23081"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Sachdeva, R., Cordeiro, F.R., Belagiannis, V., Reid, I., Carneiro, G.: EvidentialMix: learning with combined open-set and closed-set noisy labels. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 3607\u20133615 (2021)","DOI":"10.1109\/WACV48630.2021.00365"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A., et al.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp, vol. 1, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 439\u2013454 (2016)","DOI":"10.1109\/EuroSP.2016.40"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Van\u00a0Ede, T., et al.: FlowPrint: semi-supervised mobile-app fingerprinting on encrypted network traffic. In: Network and Distributed System Security Symposium (NDSS), vol.\u00a027 (2020)","DOI":"10.14722\/ndss.2020.24412"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Van\u00a0Gansbeke, W., Vandenhende, S., Georgoulis, S., Proesmans, M., Van\u00a0Gool, L.: SCAN: learning to classify images without labels. In: European Conference on Computer Vision, pp. 268\u2013285 (2020)","DOI":"10.1007\/978-3-030-58607-2_16"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp. 712\u2013717 (2017)","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Xu, J., Li, Y., Deng, R.H.: Differential training: a generic framework to reduce label noises for Android malware detection. In: Proceedings 2021 Network and Distributed System Security Symposium (2021)","DOI":"10.14722\/ndss.2021.24126"},{"key":"24_CR30","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: mixup: beyond empirical risk minimization. arXiv preprint arXiv:1710.09412 (2017)"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Zhao, R., et al.: Yet another traffic classifier: a masked autoencoder based traffic transformer with multi-level flow representation. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 5420\u20135427 (2023)","DOI":"10.1609\/aaai.v37i4.25674"},{"key":"24_CR32","unstructured":"Zhu, L., Liao, B., Zhang, Q., Wang, X., Liu, W., Wang, X.: Vision Mamba: efficient visual representation learning with bidirectional state space model. In: International Conference on Machine Learning, pp. 62429\u201362442 (2024)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:50Z","timestamp":1773214670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}