{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:17:23Z","timestamp":1774023443938,"version":"3.50.1"},"reference-count":117,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001631","name":"School of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001631","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tccn.2021.3119062","type":"journal-article","created":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T19:58:16Z","timestamp":1633982296000},"page":"422-439","source":"Crossref","is-referenced-by-count":49,"title":["Active Learning for Network Traffic Classification: A Technical Study"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5065-9968","authenticated-orcid":false,"given":"Amin","family":"Shahraki","sequence":"first","affiliation":[{"name":"Communication Systems Division, Fraunhofer IIS, Erlangen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1886-8284","authenticated-orcid":false,"given":"Mahmoud","family":"Abbasi","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Free University of Bozen-Bolzano, Bolzano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1672-054X","authenticated-orcid":false,"given":"Amir","family":"Taherkordi","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Oslo, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2705-1823","authenticated-orcid":false,"given":"Anca Delia","family":"Jurcut","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University College Dublin, Dublin, Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.307"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700560"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2940116.2940117"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933358"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102538"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912896"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474340"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2986415"},{"key":"ref14","article-title":"Active learning literature survey","author":"Settles","year":"2009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924243"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2926625"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2846401"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.08.007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102576"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.54"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100613.00161"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70087-8_47"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.07.018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064220"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9131-2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0463-8"},{"key":"ref34","volume-title":"Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists","author":"Zheng","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1201\/9781315181080"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298307"},{"key":"ref37","article-title":"How to achieve high classification accuracy with just a few labels: A semi-supervised approach using sampled packets","volume-title":"arXiv:1812.09761","author":"Rezaei","year":"2018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICKII.2018.8569113"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/AIMSEC.2011.6010803"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502818"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1111-8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2017.00069"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4707909"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254059"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref49","article-title":"Federated learning for malware detection in IoT devices","volume-title":"arXiv:2104.09994","author":"Rey","year":"2021"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6623554"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3151006"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900283"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539449"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/s19071568"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.008"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-021-00244-8"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111145120"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162688"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711267"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024293"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.06.012"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406262"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2042445"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2012.2236570"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012675"},{"key":"ref69","article-title":"Curious machines: Active learning with structured instances","author":"Settles","year":"2008"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1201\/b17320","article-title":"Active learning: A survey","volume-title":"Data Classification: Algorithms and Applications","author":"Aggarwal","year":"2014"},{"key":"ref71","first-page":"4225","article-title":"Learning active learning from data","volume-title":"Advances in Neural Information Processing Systems","author":"Konyushkova","year":"2017"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613855"},{"key":"ref73","first-page":"1","article-title":"From theories to queries: Active learning in practice","volume-title":"Proc. Active Learn. Exp. Design Workshop Conjunction","author":"Settles"},{"key":"ref74","first-page":"2079","article-title":"Active learning with a drifting distribution","volume-title":"Advances in Neural Information Processing Systems","author":"Yang"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622549"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882872"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489364"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102388"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT48636.2020.9061419"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2631905"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058397"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_6"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.06.010"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2915388"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402618"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012675"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0281-3"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2019.04.008"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.04.020"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114885"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505528"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.013"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1162\/coli.07-034-R2"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.10.085"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.26"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458165"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015349"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_14"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/1177055.1177056"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSC.2019.8665646"},{"key":"ref103","article-title":"A method for stopping active learning based on stabilizing predictions and the need for user-adjustable stopping","volume-title":"arXiv:1409.5165","author":"Bloodgood","year":"2014"},{"key":"ref104","article-title":"Deciding when to stop: Efficient stopping of active learning guided drug-target prediction","volume-title":"arXiv:1504.02406","author":"Temerinac-Ott","year":"2015"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.13"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref108","volume-title":"Applied Statistics: From Bivariate Through Multivariate Techniques","author":"Warner","year":"2008"},{"key":"ref109","first-page":"337","article-title":"Analysis of a greedy active learning strategy","volume-title":"Advances in Neural Information Processing Systems","author":"Dasgupta","year":"2005"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10593-2_37"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.11.010"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3472291"},{"key":"ref114","article-title":"Deep active learning for anomaly detection","volume-title":"arXiv:1805.09411","author":"Pimentel","year":"2018"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800079"},{"key":"ref116","first-page":"717","article-title":"Peer-to-peer traffic identification using active learning","volume":"2","author":"Dai","year":"2012","journal-title":"Appl. Res. Comput."},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687307\/9729919\/09566310.pdf?arnumber=9566310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:04:40Z","timestamp":1705017880000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9566310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":117,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2021.3119062","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}