{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:31:03Z","timestamp":1757543463022,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/pimrc.2017.8292316","type":"proceedings-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T16:31:53Z","timestamp":1518712313000},"page":"1-7","source":"Crossref","is-referenced-by-count":26,"title":["Deep learning for malicious flow detection"],"prefix":"10.1109","author":[{"given":"Yun-Chun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yu-Jhe","family":"Li","sequence":"additional","affiliation":[]},{"given":"Aragorn","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Tsungnan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"journal-title":"Deciphering Malware's use of TLS (without Decryption)","year":"2016","author":"anderson","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref13","first-page":"87","article-title":"Deep learning for ransomware detection","volume":"116","author":"tseng","year":"2016","journal-title":"IEICE Tech Rep"},{"journal-title":"Discriminators for use in flow-based classification","year":"2013","author":"moore","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785325"},{"key":"ref4","first-page":"3","article-title":"Recurrent neural network based language model","volume":"2","author":"mikolov","year":"2010","journal-title":"InterSpeech"},{"key":"ref3","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems 25"},{"key":"ref6","first-page":"418","article-title":"Scheduling policies based on dynamic throughput and fairness tradeoff control in lte-a networks","author":"com?a","year":"2014","journal-title":"39th Annual IEEE Conference on Local Computer Networks (LCN)"},{"key":"ref5","first-page":"4387","article-title":"Adaptive proportional fair parameterization based lte scheduling using continuous actor-critic reinforcement learning","author":"com?a","year":"2014","journal-title":"IEEE Conferrence on Global Communication"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","article-title":"Exploratory undersampling for class-imbalance learning","volume":"39","author":"liu","year":"2009","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)"},{"journal-title":"Synthetic Minority over-sampling technique (SMOTE) for predicting software build outcomes","year":"2014","author":"pears","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2016.73017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5121\/ijdkp.2014.4602"}],"event":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2017,10,8]]},"location":"Montreal, QC","end":{"date-parts":[[2017,10,13]]}},"container-title":["2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8288420\/8292162\/08292316.pdf?arnumber=8292316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T22:09:24Z","timestamp":1570745364000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8292316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2017.8292316","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}