{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:51:37Z","timestamp":1770749497399,"version":"3.50.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"General Program of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172093"],"award-info":[{"award-number":["62172093"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foundation of Key Laboratory of National Defense Science and Technology Project","award":["6142103200101"],"award-info":[{"award-number":["6142103200101"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3183247","type":"journal-article","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T20:03:07Z","timestamp":1655323387000},"page":"4583-4599","source":"Crossref","is-referenced-by-count":14,"title":["Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6261-6965","authenticated-orcid":false,"given":"Ying","family":"Hu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8642-4362","authenticated-orcid":false,"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"}]},{"given":"Wenchao","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"}]},{"given":"Bomiao","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering and the International Governance Research Base of Cyberspace, Jiangsu Ubiquitous Cyber Security Engineering Research Center, Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356534"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3046876"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2804394"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380090"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3122940"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322732"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107258"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.219"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692682"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624124"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888043"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155292"},{"key":"ref24","first-page":"1","article-title":"Characterization of encrypted and VPN traffic using time-related features","volume-title":"Proc. Int. Conf. Inf. Syst. Security Privacy (ICISSP)","author":"Lashkari"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.140"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00454"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.05.012"},{"key":"ref28","first-page":"501","article-title":"Fingerprinting SDN applications via encrypted control traffic","volume-title":"Proc. 22nd Int. Symp. Res. Attacks Intrus. Defenses","author":"Cao"},{"key":"ref29","article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","author":"Bai","year":"2018","journal-title":"arxiv:1803.01271"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1477"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3051381"},{"key":"ref32","article-title":"Skip-thought vectors","volume-title":"Advances in Neural Information Processing Systems","volume":"28","author":"Kiros","year":"2015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref34","first-page":"2121","article-title":"DeViSE: A deep visual-semantic embedding model","volume-title":"Proc. 27th Annu. Conf. Neural Inf. Process. Syst.","author":"Frome"},{"key":"ref35","first-page":"5767","article-title":"Improved training of Wasserstein GANs","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Gulrajani"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00581"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref38","first-page":"7","article-title":"OpenMAX","volume-title":"Proc. ACM SIGGRAPH Courses","author":"Murray"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09796642.pdf?arnumber=9796642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T01:08:06Z","timestamp":1709341686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":38,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3183247","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}