{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T22:25:38Z","timestamp":1773872738657,"version":"3.50.1"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tnsm.2021.3122940","type":"journal-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T20:35:18Z","timestamp":1635280518000},"page":"4103-4118","source":"Crossref","is-referenced-by-count":57,"title":["Deep Learning and Zero-Day Traffic Classification: Lessons Learned From a Commercial-Grade Dataset"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1973-383X","authenticated-orcid":false,"given":"Lixuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Finamore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8414-3521","authenticated-orcid":false,"given":"Feng","family":"Jun","sequence":"additional","affiliation":[]},{"given":"Dario","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405859"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162704"},{"key":"ref71","author":"kone?n?","year":"2016","journal-title":"Federated learning Strategies for improving communication efficiency"},{"key":"ref70","article-title":"A first look at class incremental learning in deep learning mobile traffic","author":"bovenzi","year":"2021","journal-title":"Proc IFIP Traffic Monitor Anal (TMA)"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.612"},{"key":"ref38","author":"aljalbout","year":"2018","journal-title":"Clustering with deep learning Taxonomy and new methods"},{"key":"ref33","author":"liang","year":"2017","journal-title":"Principled detection of out-of-distribution examples in neural networks"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6066"},{"key":"ref37","author":"hassen","year":"2018","journal-title":"Learning a neural-network-based representation for open set recognition"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_38"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5244\/C.31.42"},{"key":"ref34","first-page":"7167","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","author":"lee","year":"2018","journal-title":"Proc NIPS"},{"key":"ref60","article-title":"Distilling the knowledge in a neural network","author":"hinton","year":"2015","journal-title":"Proc NIPS Deep Learn Represent Learn Workshop"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.113010.00106"},{"key":"ref61","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3381831"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046741"},{"key":"ref64","article-title":"Inverted residuals and linear bottlenecks: Mobile networks for classification, detection and segmentation","author":"howard","year":"2018","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080246"},{"key":"ref66","first-page":"800","article-title":"TensorFlow lite micro: Embedded machine learning for tinyml systems","volume":"3","author":"david","year":"2021","journal-title":"Proc Mach Learn Syst"},{"key":"ref29","first-page":"65","article-title":"Wire-speed statistical classification of network traffic on commodity hardware","author":"del r\u00edo","year":"2012","journal-title":"Proc ACM IMC"},{"key":"ref67","first-page":"1","article-title":"FENXI: Fast in-network analytics","author":"gallo","year":"2021","journal-title":"Proc IEEE\/ACM Symp Edge Comput (SEC)"},{"key":"ref68","first-page":"1997","article-title":"Neural architecture search: A survey","volume":"20","author":"elsken","year":"2019","journal-title":"J Mach Learn Res"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0114-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"ref22","year":"2019","journal-title":"Spectre-6 The System of Control and Analysis of Traffic"},{"key":"ref21","year":"2018","journal-title":"Cisco Application Visibility and Control User Guide"},{"key":"ref24","year":"2021","journal-title":"Service Awareness"},{"key":"ref23","year":"2020","journal-title":"Traffic Perspective Application Intelligence"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref25","author":"rezaei","year":"2019","journal-title":"Large-Scale Mobile App Identification Using Deep Learning"},{"key":"ref50","first-page":"116","article-title":"ShuffleNet V2: Practical guidelines for efficient CNN architecture design","author":"ma","year":"2018","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1126\/science.abd0313"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3317287.3328534"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref55","first-page":"1","article-title":"Heterogeneous data-aware federated learning","author":"yang","year":"2020","journal-title":"Proc IJCAI Feder Learn Workshop"},{"key":"ref54","author":"wen","year":"2019","journal-title":"An overview of data-importance aware radio resource management for edge machine learning"},{"key":"ref53","first-page":"1","article-title":"Know your limits: Uncertainty estimation with Relu classifiers fails at reliable OOD detection","author":"ulmer","year":"2021","journal-title":"Proc UAI"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.556"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3155133.3155175"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506558"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3405837.3411398"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"ref8","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800155"},{"key":"ref9","article-title":"The applications of deep learning on traffic identification","author":"wang","year":"2015","journal-title":"Proc BlackHat USA"},{"key":"ref46","author":"bendale","year":"2015","journal-title":"Towards open set deep networks"},{"key":"ref45","author":"rudd","year":"2015","journal-title":"The Extreme Value Machine"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155292"},{"key":"ref47","author":"hendrycks","year":"2016","journal-title":"A baseline for detecting misclassified and out-of-distribution examples in neural networks"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00414"},{"key":"ref41","author":"devries","year":"2018","journal-title":"Learning confidence for out-of-distribution detection in neural networks"},{"key":"ref44","author":"jang","year":"2020","journal-title":"One-vs-rest network-based deep probability model for open set recognition"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2019.8798803"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9644641\/09585567.pdf?arnumber=9585567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:37Z","timestamp":1652194357000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9585567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":74,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3122940","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}