{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T11:48:43Z","timestamp":1775648923686,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/icnp61940.2024.10858569","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:45Z","timestamp":1738693785000},"page":"1-11","source":"Crossref","is-referenced-by-count":55,"title":["Netmamba: Efficient Network Traffic Classification Via Pre-Training Unidirectional Mamba"],"prefix":"10.1109","author":[{"given":"Tongze","family":"Wang","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University"}]},{"given":"Xiaohui","family":"Xie","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]},{"given":"Wenduo","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]},{"given":"Chuyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]},{"given":"Youjian","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","author":"Hayes","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583227"},{"key":"ref7","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25674"},{"key":"ref11","first-page":"arXiv2402","article-title":"Lens: A foundation model for network traffic in cybersecurity","author":"Wang","year":"2024","journal-title":"arXiv e-prints"},{"key":"ref12","article-title":"Vision mamba: Efficient visual representation learning with bidirectional state space model","author":"Zhu","year":"2024","journal-title":"arXiv preprint"},{"key":"ref13","article-title":"Trafficgpt: Breaking the token barrier for efficient long traffic analysis and generation","author":"Qu","year":"2024","journal-title":"arXiv preprint"},{"key":"ref14","article-title":"Mamba: Linear-time sequence modeling with selective state spaces","author":"Gu","year":"2023","journal-title":"arXiv preprint"},{"key":"ref15","article-title":"Densemamba: State space models with dense hidden connection for efficient large language models","author":"He","year":"2024","journal-title":"arXiv preprint"},{"key":"ref16","article-title":"Graph-mamba: Towards long-range graph sequence modeling with selective state spaces","author":"Wang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-03032-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539314"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/ITUK50268.2020.9303204"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607206"},{"key":"ref21","article-title":"Netgpt: Generative pretrained transformer for network traffic","author":"Meng","year":"2023","journal-title":"arXiv preprint"},{"key":"ref22","article-title":"Vmamba: Visual state space model","author":"Liu","year":"2024","journal-title":"arXiv preprint"},{"key":"ref23","article-title":"Stg-mamba: Spatialtemporal graph learning via selective state space model","author":"Li","year":"2024","journal-title":"arXiv preprint"},{"key":"ref24","article-title":"Spmamba: State-space model is all you need in speech separation","author":"Li","year":"2024","journal-title":"arXiv preprint"},{"key":"ref25","article-title":"Pointmamba: A simple state space model for point cloud analysis","author":"Liang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref26","article-title":"Vl-mamba: Exploring state space models for multimodal learning","author":"Qiao","year":"2024","journal-title":"arXiv preprint"},{"key":"ref27","article-title":"Flowlens: Enabling efficient flow classification for mlbased network security applications","author":"Barradas","year":"2021","journal-title":"NDSS"},{"key":"ref28","first-page":"6203","article-title":"An efficient design of intelligent network data plane","author":"Zhou","year":"2023","journal-title":"32nd USENIX Security Symposium (USENIX Security 23)"},{"key":"ref29","article-title":"An image is worth $16 \\times 16$ words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv preprint"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3485721"},{"key":"ref31","author":"Ren","year":"2019","journal-title":"An international view of privacy risks for mobile apps"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref33","first-page":"407","article-title":"Characterization of encrypted and vpn traffic using time-related features","author":"Gil","year":"2016","journal-title":"Proceedings of the 2nd international conference on information systems security and privacy (ICISSP 2016). SciTePress"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref36","article-title":"Attention is all you need","author":"Vaswani","year":"2017","journal-title":"arXiv preprint"},{"key":"ref37","first-page":"51565165","article-title":"Transformers are rnns: Fast autoregressive transformers with linear attention","author":"Katharopoulos","year":"2020","journal-title":"International conference on machine learning. PMLR"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"}],"event":{"name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","location":"Charleroi, Belgium","start":{"date-parts":[[2024,10,28]]},"end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 IEEE 32nd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858485\/10858498\/10858569.pdf?arnumber=10858569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:16:29Z","timestamp":1750875389000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icnp61940.2024.10858569","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}