{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T11:02:54Z","timestamp":1773658974648,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100005417","name":"Universiti Teknologi Malaysia","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005417","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s12065-025-01122-x","type":"journal-article","created":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T07:57:32Z","timestamp":1765007852000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bufferless network traffic classification using reinforcement learning-based joint pruning-quantization"],"prefix":"10.1007","volume":"19","author":[{"given":"Muhammad Nor Azzafri","family":"Nor-Azman","sequence":"first","affiliation":[]},{"given":"Usman Ullah","family":"Sheikh","sequence":"additional","affiliation":[]},{"given":"Mohammed Sultan","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Jeevan","family":"Sirkunan","sequence":"additional","affiliation":[]},{"given":"Muhammad Nadzir","family":"Marsono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,6]]},"reference":[{"issue":"11","key":"1122_CR1","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.1109\/JPROC.2021.3119950","volume":"109","author":"D Xu","year":"2021","unstructured":"Xu D, Li T, Li Y, Su X, Tarkoma S, Jiang T, Crowcroft J, Hui P (2021) Edge intelligence: empowering intelligence to the edge of network. Proc IEEE 109(11):1778\u20131837","journal-title":"Proc IEEE"},{"issue":"2","key":"1122_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-025-10462-w","volume":"29","author":"Z Li","year":"2025","unstructured":"Li Z, Liu Y, Zhang C, Shan W, Zhang H, Zhu X (2025) Trustworthy deep learning for encrypted traffic classification. Soft Comput 29(2):1\u201318","journal-title":"Soft Comput"},{"key":"1122_CR3","doi-asserted-by":"crossref","unstructured":"Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: International workshop on passive and active network measurement, pp 41\u201354. Springer","DOI":"10.1007\/978-3-540-31966-5_4"},{"issue":"2","key":"1122_CR4","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2013","unstructured":"Finsterbusch M, Richter C, Rocha E, Muller J-A, Hanssgen K (2013) A survey of payload-based traffic classification approaches. IEEE Commun Surv Tutor 16(2):1135\u20131156","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"1122_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-018-0087-2","volume":"9","author":"R Boutaba","year":"2018","unstructured":"Boutaba R, Salahuddin MA, Limam N, Ayoubi S, Shahriar N, Estrada-Solano F, Caicedo OM (2018) A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J Internet Serv Appl 9(1):1\u201399","journal-title":"J Internet Serv Appl"},{"issue":"4","key":"1122_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TT Nguyen","year":"2008","unstructured":"Nguyen TT, Armitage G (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv Tutor 10(4):56\u201376","journal-title":"IEEE Commun Surv Tutor"},{"issue":"5","key":"1122_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. IEEE Commun Mag 57(5):76\u201381","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"1122_CR8","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","volume":"16","author":"G Aceto","year":"2019","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e9 A (2019) Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manage 16(2):445\u2013458","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"3","key":"1122_CR9","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi M, Jafari Siavoshani M, Shirali Hossein Zade R, Saberian M (2020) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24(3):1999\u20132012","journal-title":"Soft Comput"},{"key":"1122_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102890","volume":"173","author":"G D\u2019Angelo","year":"2021","unstructured":"D\u2019Angelo G, Palmieri F (2021) Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial-temporal features extraction. J Netw Comput Appl 173:102890","journal-title":"J Netw Comput Appl"},{"key":"1122_CR11","doi-asserted-by":"publisher","first-page":"132950","DOI":"10.1109\/ACCESS.2020.3010637","volume":"8","author":"Z Bu","year":"2020","unstructured":"Bu Z, Zhou B, Cheng P, Zhang K, Ling Z-H (2020) Encrypted network traffic classification using deep and parallel network-in-network models. IEEE Access 8:132950\u2013132959","journal-title":"IEEE Access"},{"key":"1122_CR12","doi-asserted-by":"crossref","unstructured":"Lu M, Zhou B, Bu Z, Zhang K, Ling Z (2021) Compressed network in network models for traffic classification. In: 2021 IEEE wireless communications and networking conference (WCNC), pp 1\u20136. IEEE","DOI":"10.1109\/WCNC49053.2021.9417340"},{"issue":"16","key":"1122_CR13","doi-asserted-by":"publisher","first-page":"14152","DOI":"10.1109\/JIOT.2023.3263487","volume":"10","author":"M Lu","year":"2023","unstructured":"Lu M, Zhou B, Bu Z (2023) Two-stage distillation-aware compressed models for traffic classification. IEEE Internet Things J 10(16):14152\u201314166","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"1122_CR14","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1007\/s11227-025-07189-8","volume":"81","author":"Q Liang","year":"2025","unstructured":"Liang Q, Cong L, Du H (2025) Anomaly traffic detection in heterogeneous lightweight networks based on spatio-temporal features. J Supercomput 81(5):690","journal-title":"J Supercomput"},{"key":"1122_CR15","unstructured":"Han S, Mao H, Dally WJ (2016) Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding. In: International conference on learning representations"},{"key":"1122_CR16","doi-asserted-by":"crossref","unstructured":"Tung F, Mori G (2018) Clip-q: Deep network compression learning by in-parallel pruning-quantization. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 7873\u20137882","DOI":"10.1109\/CVPR.2018.00821"},{"key":"1122_CR17","doi-asserted-by":"crossref","unstructured":"Nor-Azman MNA, Sheikh UU, Mohammed MS, Sirkunan J, Marsono MN (2024) Correlation-aware joint pruning-quantization using graph neural networks. In: 2024 IEEE international conference on image processing (ICIP), pp 1403\u20131409. IEEE","DOI":"10.1109\/ICIP51287.2024.10647517"},{"issue":"11","key":"1122_CR18","doi-asserted-by":"publisher","first-page":"7063","DOI":"10.1109\/TCOMM.2024.3409561","volume":"72","author":"J Li","year":"2024","unstructured":"Li J, Xiao L, Qi X, Lv Z, Chen Q, Liu Y-J (2024) Reinforcement learning based energy-efficient fast routing for fanets. IEEE Trans Commun 72(11):7063\u20137076","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"1122_CR19","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/91.917124","volume":"9","author":"Q Liang","year":"2001","unstructured":"Liang Q, Mendel JM (2001) Mpeg vbr video traffic modeling and classification using fuzzy technique. IEEE Trans Fuzzy Syst 9(1):183\u2013193","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1122_CR20","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.ins.2023.01.067","volume":"626","author":"D Javaheri","year":"2023","unstructured":"Javaheri D, Gorgin S, Lee J-A, Masdari M (2023) Fuzzy logic-based ddos attacks and network traffic anomaly detection methods: classification, overview, and future perspectives. Inf Sci 626:315\u2013338","journal-title":"Inf Sci"},{"issue":"5","key":"1122_CR21","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s00779-017-1096-z","volume":"23","author":"F Al-Obeidat","year":"2019","unstructured":"Al-Obeidat F, El-Alfy E-S (2019) Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols. Pers Ubiquit Comput 23(5):777\u2013791","journal-title":"Pers Ubiquit Comput"},{"issue":"9","key":"1122_CR22","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1016\/j.patcog.2006.12.009","volume":"40","author":"C-H Tsang","year":"2007","unstructured":"Tsang C-H, Kwong S, Wang H (2007) Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognit 40(9):2373\u20132391","journal-title":"Pattern Recognit"},{"key":"1122_CR23","doi-asserted-by":"crossref","unstructured":"Ducange P, Mannar\u00e0 G, Marcelloni F, Pecori R, Vecchio M (2017) A novel approach for internet traffic classification based on multi-objective evolutionary fuzzy classifiers. In: 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp 1\u20136. IEEE","DOI":"10.1109\/FUZZ-IEEE.2017.8015518"},{"issue":"12","key":"1122_CR24","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1109\/JPROC.2017.2761740","volume":"105","author":"V Sze","year":"2017","unstructured":"Sze V, Chen Y-H, Yang T-J, Emer JS (2017) Efficient processing of deep neural networks: a tutorial and survey. Proc IEEE 105(12):2295\u20132329","journal-title":"Proc IEEE"},{"key":"1122_CR25","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"issue":"9","key":"1122_CR26","doi-asserted-by":"publisher","first-page":"10741","DOI":"10.1007\/s10489-021-03032-8","volume":"52","author":"W Zheng","year":"2022","unstructured":"Zheng W, Zhong J, Zhang Q, Zhao G (2022) Mtt: an efficient model for encrypted network traffic classification using multi-task transformer. Appl Intell 52(9):10741\u201310756","journal-title":"Appl Intell"},{"key":"1122_CR27","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE international conference on intelligence and security informatics (ISI), pp 43\u201348. IEEE","DOI":"10.1109\/ISI.2017.8004872"},{"key":"1122_CR28","doi-asserted-by":"crossref","unstructured":"Lim H-K, Kim J-B, Heo J-S, Kim K, Hong Y-G, Han Y-H (2019) Packet-based network traffic classification using deep learning. In: 2019 International conference on artificial intelligence in information and communication (ICAIIC), pp 046\u2013051. IEEE","DOI":"10.1109\/ICAIIC.2019.8669045"},{"key":"1122_CR29","unstructured":"Han S, Pool J, Tran J, Dally W (2015) Learning both weights and connections for efficient neural network. Adv Neural Inf Process Syst 28"},{"key":"1122_CR30","doi-asserted-by":"crossref","unstructured":"Lei M, Li X, Cai B, Li Y, Liu L, Kong W (2020) P-dnn: An effective intrusion detection method based on pruning deep neural network. In: 2020 International joint conference on neural networks (IJCNN), pp 1\u20139. IEEE","DOI":"10.1109\/IJCNN48605.2020.9206805"},{"key":"1122_CR31","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s10586-017-0971-8","volume":"21","author":"AJ Malik","year":"2018","unstructured":"Malik AJ, Khan FA (2018) A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Clust Comput 21:667\u2013680","journal-title":"Clust Comput"},{"key":"1122_CR32","doi-asserted-by":"crossref","unstructured":"He Y, Lin J, Liu Z, Wang H, Li L-J, Han S (2018) Amc: automl for model compression and acceleration on mobile devices. In: Proceedings of the European conference on computer vision (ECCV), pp 784\u2013800","DOI":"10.1007\/978-3-030-01234-2_48"},{"key":"1122_CR33","unstructured":"Molchanov P, Tyree S, Karras T, Aila T, Kautz J (2016) Pruning convolutional neural networks for resource efficient inference. In: Proceedings of the IEEE international conference on learning representations"},{"key":"1122_CR34","doi-asserted-by":"crossref","unstructured":"Gholami A, Kim S, Dong Z, Yao Z, Mahoney MW, Keutzer K (2022) A survey of quantization methods for efficient neural network inference. In: Low-power computer vision, pp 291\u2013326. Chapman and Hall\/CRC, New York","DOI":"10.1201\/9781003162810-13"},{"issue":"1\u20134","key":"1122_CR35","first-page":"1","volume":"37","author":"C Baskin","year":"2021","unstructured":"Baskin C, Liss N, Schwartz E, Zheltonozhskii E, Giryes R, Bronstein AM, Mendelson A (2021) Uniq: uniform noise injection for non-uniform quantization of neural networks. ACM Trans Comput Syst (TOCS) 37(1\u20134):1\u201315","journal-title":"ACM Trans Comput Syst (TOCS)"},{"key":"1122_CR36","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"1122_CR37","unstructured":"Lin M, Chen Q, Yan S (2013) Network in network. In: International conference on learning representations"},{"key":"1122_CR38","unstructured":"Yu S, Mazaheri A, Jannesari A (2022) Topology-aware network pruning using multi-stage graph embedding and reinforcement learning. In: International conference on machine learning, pp 25656\u201325667. PMLR"},{"issue":"3","key":"1122_CR39","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TPAMI.2018.2886192","volume":"42","author":"F Tung","year":"2018","unstructured":"Tung F, Mori G (2018) Deep neural network compression by in-parallel pruning-quantization. IEEE Trans Pattern Anal Mach Intell 42(3):568\u2013579","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1122_CR40","unstructured":"Schulman J, Wolski F, Dhariwal P, Radford A, Klimov O (2017) Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347"},{"issue":"4","key":"1122_CR41","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/JPROC.2020.2976475","volume":"108","author":"L Deng","year":"2020","unstructured":"Deng L, Li G, Han S, Shi L, Xie Y (2020) Model compression and hardware acceleration for neural networks: a comprehensive survey. Proc IEEE 108(4):485\u2013532","journal-title":"Proc IEEE"},{"key":"1122_CR42","doi-asserted-by":"crossref","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related features. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407\u2013414","DOI":"10.5220\/0005740704070414"},{"key":"1122_CR43","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International conference on information networking (ICOIN), pp 712\u2013717. IEEE","DOI":"10.1109\/ICOIN.2017.7899588"},{"issue":"1","key":"1122_CR44","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1186\/s13104-024-06718-7","volume":"17","author":"M Nikbakht","year":"2024","unstructured":"Nikbakht M, Teimouri M (2024) Itc-net-audio-5: an audio streaming dataset for application identification in network traffic classification. BMC Res Notes 17(1):57","journal-title":"BMC Res Notes"},{"issue":"1","key":"1122_CR45","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/103162.103163","volume":"23","author":"D Goldberg","year":"1991","unstructured":"Goldberg D (1991) What every computer scientist should know about floating-point arithmetic. ACM Comput Surv (CSUR) 23(1):5\u201348","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1122_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109556","volume":"140","author":"Y Lin","year":"2023","unstructured":"Lin Y, Niu L, Xiao Y, Zhou R (2023) Diluted binary neural network. Pattern Recogn 140:109556","journal-title":"Pattern Recogn"},{"key":"1122_CR47","unstructured":"Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L, et al (2019) Pytorch: an imperative style, high-performance deep learning library. Adv Neural Inf Process Syst 32"},{"key":"1122_CR48","doi-asserted-by":"crossref","unstructured":"Lin X, Xiong G, Gou G, Li Z, Shi J, Yu J (2022) Et-bert: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM web conference 2022, pp 633\u2013642","DOI":"10.1145\/3485447.3512217"},{"key":"1122_CR49","doi-asserted-by":"crossref","unstructured":"Ren A, Zhang T, Ye S, Li J, Xu W, Qian X, Lin X, Wang Y (2019) Admm-nn: an algorithm-hardware co-design framework of dnns using alternating direction methods of multipliers. In: Proceedings of the twenty-fourth international conference on architectural support for programming languages and operating systems (ASPLOS), pp 925\u2013938","DOI":"10.1145\/3297858.3304076"},{"key":"1122_CR50","doi-asserted-by":"crossref","unstructured":"Shen Y, Ferdman M, Milder P (2017) Escher: a cnn accelerator with flexible buffering to minimize off-chip transfer. In: 2017 IEEE 25th annual international symposium on field-programmable custom computing machines (FCCM), pp 93\u2013100. IEEE","DOI":"10.1109\/FCCM.2017.47"},{"key":"1122_CR51","unstructured":"Steiner B, Elhoushi M, Kahn J, Hegarty J (2023) Model: memory optimizations for deep learning. In: Proceedings of the 40th international conference on machine learning, pp 32618\u201332632"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-025-01122-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-025-01122-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-025-01122-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:23Z","timestamp":1773655763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-025-01122-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1122"],"URL":"https:\/\/doi.org\/10.1007\/s12065-025-01122-x","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,6]]},"assertion":[{"value":"23 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Muhammad Nadzir Marsono serves as a member of the editorial board of Evolutionary Intelligence.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"3"}}