{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:52:26Z","timestamp":1743065546229,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819708079"},{"type":"electronic","value":"9789819708086"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0808-6_20","type":"book-chapter","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T16:02:20Z","timestamp":1708963340000},"page":"341-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FEAML: A Mobile Traffic Classification System with\u00a0Feature Expansion and\u00a0Autonomous Machine Learning"],"prefix":"10.1007","author":[{"given":"Qing","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1940-8674","authenticated-orcid":false,"given":"Xiangyu","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Yilei","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8770-3934","authenticated-orcid":false,"given":"Heng","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,27]]},"reference":[{"key":"20_CR1","unstructured":"Abadi, M., et al.: Tensorflow: large-scale machine learning on heterogeneous distributed systems (2015). http:\/\/download.tensorflow.org\/paper\/whitepaper2015.pdf"},{"key":"20_CR2","doi-asserted-by":"publisher","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Persico, V., Pescap\u00e9, A.: Mirage: mobile-app traffic capture and ground-truth creation. In: 2019 4th International Conference on Computing, Communications and Security (ICCCS), pp. 1\u20138 (2019). https:\/\/doi.org\/10.1109\/CCCS.2019.8888137","DOI":"10.1109\/CCCS.2019.8888137"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.jnca.2017.11.007","volume":"103","author":"G Aceto","year":"2018","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Multi-classification approaches for classifying mobile app traffic. J. Netw. Comput. Appl. 103, 131\u2013145 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"20_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944","volume":"165","author":"G Aceto","year":"2019","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e8, A.: Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165, 106944 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2019.106944","journal-title":"Comput. Netw."},{"key":"20_CR5","doi-asserted-by":"publisher","unstructured":"Akbari, I., et al.: A look behind the curtain: traffic classification in an increasingly encrypted web. In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 5, pp. 1\u201326 (2021). https:\/\/doi.org\/10.1145\/3447382","DOI":"10.1145\/3447382"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Al-Naami, K., Chandra, S., Mustafa, A., Khan, L., Lin, Z., Hamlen, K., Thuraisingham, B.: Adaptive encrypted traffic fingerprinting with bi-directional dependence. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, pp. 177\u2013188. Association for Computing Machinery (2016). https:\/\/doi.org\/10.1145\/2991079.2991123","DOI":"10.1145\/2991079.2991123"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"Beliard, C., Finamore, A., Rossi, D.: Opening the deep pandora box: explainable traffic classification. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1292\u20131293 (2020). https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS50562.2020.9162704","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162704"},{"key":"20_CR8","unstructured":"De La Calleja, J., Fuentes, O.: A distance-based over-sampling method for learning from imbalanced data sets. In: FLAIRS Conference, pp. 634\u2013635 (2007)"},{"key":"20_CR9","doi-asserted-by":"publisher","unstructured":"Diallo, A.F., Patras, P.: Adaptive clustering-based malicious traffic classification at the network edge. In: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications, pp. 1\u201310 (2021). https:\/\/doi.org\/10.1109\/INFOCOM42981.2021.9488690","DOI":"10.1109\/INFOCOM42981.2021.9488690"},{"key":"20_CR10","unstructured":"Dorogush, A.V., Ershov, V., Gulin, A.: Catboost: gradient boosting with categorical features support. CoRR arxiv:1810.11363 (2018)"},{"issue":"3","key":"20_CR11","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/LNET.2021.3098455","volume":"3","author":"Y Heng","year":"2021","unstructured":"Heng, Y., Chandrasekhar, V., Andrews, J.G.: Utmobilenettraffic 2021: a labeled public network traffic dataset. IEEE Network. Lett. 3(3), 156\u2013160 (2021). https:\/\/doi.org\/10.1109\/LNET.2021.3098455","journal-title":"IEEE Network. Lett."},{"key":"20_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108618","volume":"202","author":"P Horchulhack","year":"2022","unstructured":"Horchulhack, P., Viegas, E.K., Santin, A.O.: Toward feasible machine learning model updates in network-based intrusion detection. Comput. Netw. 202, 108618 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2021.108618","journal-title":"Comput. Netw."},{"key":"20_CR13","doi-asserted-by":"publisher","unstructured":"Huo, Y., Ge, H., Jiao, L., Gao, B., Yang, Y.: Encrypted traffic identification method based on multi-scale spatiotemporal feature fusion model with attention mechanism. In: Proceedings of the 11th International Conference on Computer Engineering and Networks, pp. 857\u2013866. Springer, Singapore (2022). DOI: https:\/\/doi.org\/10.1007\/978-981-16-6554-7_92","DOI":"10.1007\/978-981-16-6554-7_92"},{"key":"20_CR14","unstructured":"Ke, G., et al.: Lightgbm: a highly efficient gradient boosting decision tree. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol. 30. Curran Associates, Inc. (2017)"},{"key":"20_CR15","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: ICLR (Poster) (2015)"},{"issue":"11","key":"20_CR16","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998). https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proc. IEEE"},{"issue":"7553","key":"20_CR17","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"20_CR18","doi-asserted-by":"publisher","unstructured":"Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: FS-NET: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pp. 1171\u20131179 (2019). https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737507","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"18042","DOI":"10.1109\/ACCESS.2017.2747560","volume":"5","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5, 18042\u201318050 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2747560","journal-title":"IEEE Access"},{"key":"20_CR20","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"20_CR21","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/ACCESS.2019.2962018","volume":"8","author":"S Rezaei","year":"2020","unstructured":"Rezaei, S., Kroencke, B., Liu, X.: Large-scale mobile app identification using deep learning. IEEE Access 8, 348\u2013362 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2962018","journal-title":"IEEE Access"},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Sengupta, S., Ganguly, N., De, P., Chakraborty, S.: Exploiting diversity in android tls implementations for mobile app traffic classification. In: The World Wide Web Conference, WWW 2019, pp. 1657\u20131668. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3308558.3313738","DOI":"10.1145\/3308558.3313738"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Shahraki, A., Abbasi, M., Taherkordi, A., Kaosar, M.: Internet traffic classification using an ensemble of deep convolutional neural networks, pp. 38\u201343. Association for Computing Machinery (2021)","DOI":"10.1145\/3472735.3473386"},{"key":"20_CR24","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TIFS.2021.3050608","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367\u20132380 (2021). https:\/\/doi.org\/10.1109\/TIFS.2021.3050608","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR25","doi-asserted-by":"publisher","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Appscanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 439\u2013454 (2016). https:\/\/doi.org\/10.1109\/EuroSP.2016.40","DOI":"10.1109\/EuroSP.2016.40"},{"issue":"1","key":"20_CR26","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","volume":"13","author":"VF Taylor","year":"2018","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans. Inf. Forensics Secur. 13(1), 63\u201378 (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2737970","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR27","unstructured":"Van Rossum, G., Drake, F.L.: Python 3 Reference Manual. CreateSpace, Scotts Valley (2009)"},{"key":"20_CR28","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30. Curran Associates, Inc. (2017)"},{"key":"20_CR29","doi-asserted-by":"publisher","unstructured":"Wang, M., Zheng, K., Luo, D., Yang, Y., Wang, X.: An encrypted traffic classification framework based on convolutional neural networks and stacked autoencoders. In: 2020 IEEE 6th International Conference on Computer and Communications (ICCC), pp. 634\u2013641 (2020). https:\/\/doi.org\/10.1109\/ICCC51575.2020.9344978","DOI":"10.1109\/ICCC51575.2020.9344978"},{"key":"20_CR30","doi-asserted-by":"publisher","unstructured":"Wang, R., Liu, Z., Cai, Y., Tang, D., Yang, J., Yang, Z.: Benchmark data for mobile app traffic research. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2018, pp. 402\u2013411. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3286978.3287000","DOI":"10.1145\/3286978.3287000"},{"key":"20_CR31","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2018.12.014","volume":"133","author":"S Wang","year":"2019","unstructured":"Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L., Jia, Z.: A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133, 15\u201325 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"20_CR32","doi-asserted-by":"publisher","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348 (2017). https:\/\/doi.org\/10.1109\/ISI.2017.8004872","DOI":"10.1109\/ISI.2017.8004872"},{"key":"20_CR33","doi-asserted-by":"publisher","first-page":"182065","DOI":"10.1109\/ACCESS.2020.3029190","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang, X., Chen, S., Su, J.: Automatic mobile app identification from encrypted traffic with hybrid neural networks. IEEE Access 8, 182065\u2013182077 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3029190","journal-title":"IEEE Access"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Su, J.: Real network traffic collection and deep learning for mobile app identification. Wirel. Commun. Mobile Comput. 2020 (2020)","DOI":"10.1155\/2020\/4707909"},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Xie, G., et al.: Sam: self-attention based deep learning method for online traffic classification. In: Proceedings of the Workshop on Network Meets AI & ML, pp. 14\u201320 (2020)","DOI":"10.1145\/3405671.3405811"},{"key":"20_CR36","doi-asserted-by":"publisher","unstructured":"Zhang, J., Li, F., Ye, F., Wu, H.: Autonomous unknown-application filtering and labeling for dl-based traffic classifier update. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 397\u2013405 (2020). https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155292","DOI":"10.1109\/INFOCOM41043.2020.9155292"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0808-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T16:05:50Z","timestamp":1708963550000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0808-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819708079","9789819708086"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0808-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tjutanklab.com\/ica3pp2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online submission system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"439","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}