{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:39:55Z","timestamp":1763811595123,"version":"3.37.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/icnp61940.2024.10858503","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:45Z","timestamp":1738693785000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Ptu: Pre-Trained Model for Network Traffic Understanding"],"prefix":"10.1109","author":[{"given":"Lingfeng","family":"Peng","sequence":"first","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Xiaohui","family":"Xie","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Sijiang","family":"Huang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]},{"given":"Ziyi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"108836","DOI":"10.1016\/j.comnet.2022.108836","article-title":"A comparative study on online machine learning techniques for network traffic streams analysis","volume":"207","author":"Shahraki","year":"2022","journal-title":"Computer Networks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3334212"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3306226"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318960"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.comcom.2021.01.021","article-title":"Deep learning for network traffic monitoring and analysis (ntma): A survey","volume":"170","author":"Abbasi","year":"2021","journal-title":"Computer Communications"},{"issue":"6","key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/3457904","article-title":"A survey on encrypted network traffic analysis applications, techniques, and countermeasures","volume":"54","author":"Papadogiannaki","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23477","article-title":"Website fingerprinting at internet scale","volume-title":"Network and Distributed System Security Symposium","author":"Panchenko"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486321"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"107974","DOI":"10.1016\/j.comnet.2021.107974","article-title":"Tscrnn: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of iiot","volume":"190","author":"Lin","year":"2021","journal-title":"Computer Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521288"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2895223"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900366"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00889-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126834"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref19","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","volume-title":"ArXiv","author":"Dosovitskiy","year":"2020"},{"key":"ref20","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","volume-title":"North American Chapter of the Association for Computational Linguistics","author":"Devlin","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w19-1909"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-024-02443-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607206"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v37i4.25674","article-title":"Yet another traffic classifier: A masked autoencoder based traffic transformer with multi-level flow representation","volume-title":"AAAI Conference on Artificial Intelligence","author":"Zhao"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/ISTAFRICA.2017.8102284"},{"key":"ref27","first-page":"624","article-title":"Capturing the relationship between sentence triplets for LLM and human-generated texts to enhance sentence embeddings","volume-title":"Findings of the Association for Computational Linguistics: EACL 2024","author":"An","year":"2024"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"102985","DOI":"10.1016\/j.jnca.2021.102985","article-title":"Distiller: Encrypted traffic classification via multimodal multitask deep learning","volume":"183-184","author":"Aceto","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2007.56"},{"article-title":"Interarrival time distribution for the non-homogeneous poisson process","year":"2005","author":"Yakovlev","key":"ref30"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"100407","DOI":"10.1016\/j.bdr.2023.100407","article-title":"A large comparison of normalization methods on time series","volume":"34","author":"Lima","year":"2023","journal-title":"Big Data Research"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-3041"},{"issue":"4","key":"ref33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3578707","article-title":"Impact of tokenization on language models: An analysis for turkish","volume":"22","author":"Toraman","year":"2023","journal-title":"ACM Transactions on Asian and Low-Resource Language Information Processing"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.5220\/0006639801080116","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume-title":"International Conference on Information Systems Security and Privacy","author":"Sharafaldin"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.5220\/0005740704070414","article-title":"Characterization of encrypted and vpn traffic using time-related features","volume-title":"International Conference on Information Systems Security and Privacy","author":"Draper-Gil"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1109\/PST55820.2022.9851966","article-title":"Towards the development of a realistic multidimensional iot profiling dataset","volume-title":"2022 19th Annual International Conference on Privacy","author":"Dadkhah"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX.2017.7965673"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2729891"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380090"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2001.989560"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3190711"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.24963\/ijcai.2023\/493","article-title":"Singularformer: learning to decompose self-attention to linearize the complexity of transformer","volume-title":"Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, ser. IJCAI \u201923","author":"Wu"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.12"},{"volume-title":"Efficient estimation of word representations in vector space","year":"2013","author":"Mikolov","key":"ref47"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"2686","DOI":"10.1109\/TNSM.2023.3329442","article-title":"Cross-network embeddings transfer for traffic analysis","volume":"21","author":"Gioacchini","year":"2024","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.93"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_5"},{"issue":"3","key":"ref51","doi-asserted-by":"crossref","DOI":"10.1145\/3595378","article-title":"i-darkvec: Incremental embeddings for darknet traffic analysis","volume":"23","author":"Gioacchini","year":"2023","journal-title":"ACM Trans. Internet Technol."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564108"},{"key":"ref53","first-page":"1","article-title":"Big Data in Computer Network Monitoring","author":"Drago","year":"2018","journal-title":"Cham: Springer International Publishing"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2841349"},{"journal-title":"Linformer: Selfattention with linear complexity","year":"2020","author":"Wang","key":"ref55"},{"volume-title":"Learning to (learn at test time): Rnns with expressive hidden states","year":"2024","author":"Sun","key":"ref56"}],"event":{"name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2024,10,28]]},"location":"Charleroi, Belgium","end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 IEEE 32nd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858485\/10858498\/10858503.pdf?arnumber=10858503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T05:58:32Z","timestamp":1738735112000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/icnp61940.2024.10858503","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}