{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:00:26Z","timestamp":1773518426862,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9162940","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:55:09Z","timestamp":1597096509000},"page":"734-739","source":"Crossref","is-referenced-by-count":21,"title":["Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning"],"prefix":"10.1109","author":[{"given":"Junchi","family":"Xing","sequence":"first","affiliation":[]},{"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","year":"0","journal-title":"Ctu-13 dataset"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.064"},{"key":"ref12","article-title":"Deep packet: A novel approach for encrypted traffic classification using deep learning","volume":"abs 1709 2656","author":"lotfollahi","year":"2017","journal-title":"CoRR"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930717"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3326937.3341256"},{"key":"ref16","article-title":"Greedy deep dictionary learning","volume":"abs 1602 203","author":"tariyal","year":"2016","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref19","author":"chollet","year":"0","journal-title":"Keras"},{"key":"ref28","year":"0","journal-title":"Stratosphere IPS Malware Capture Facility Project"},{"key":"ref4","year":"0","journal-title":"HTTPS encryption on the web"},{"key":"ref27","year":"0","journal-title":"Malware Traffic Analysis"},{"key":"ref3","year":"0","journal-title":"Encrypted Traffic Analytics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959079"},{"key":"ref29","year":"0","journal-title":"Lastline"},{"key":"ref5","first-page":"589","article-title":"Execscent: Mining for new c&c domains in live networks with adaptive control protocol templates","author":"nelms","year":"2013","journal-title":"Proceedings of the 22th USENIX Security Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912553"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927886"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186355"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/812"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2771408"},{"key":"ref24","article-title":"k-sparse autoencoders","author":"makhzani","year":"2014","journal-title":"Proc 2nd Int Conf on Learning Representations ICLR 2014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref26","first-page":"681","article-title":"Dynamic visual attention: searching for coding length increments","author":"hou","year":"0","journal-title":"Advances in Neural Information Processing Systems 21 Proceedings of the Twenty-Second Annual Conference on Neural Information Processing Systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/cpa.20042"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Toronto, ON, Canada","start":{"date-parts":[[2020,7,6]]},"end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09162940.pdf?arnumber=9162940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:08Z","timestamp":1656453368000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9162940","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}