{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,11]],"date-time":"2025-05-11T04:01:47Z","timestamp":1746936107103,"version":"3.40.5"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1109\/wcnc61545.2025.10978498","type":"proceedings-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:53:33Z","timestamp":1746813213000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Encrypted Traffic Classification Through Packet-Flow Dual Views"],"prefix":"10.1109","author":[{"given":"Beibei","family":"Feng","sequence":"first","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"Coordination Center of China,National Computer Network Emergency Response Technical Team,Beijing,China"}]},{"given":"Wang","family":"Yijing","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Feifan","family":"Li","sequence":"additional","affiliation":[{"name":"China Assets Cybersecurity Technology Co., Ltd.,Beijing,China"}]},{"given":"Xiaolin","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory,Beijing,China"}]},{"given":"Tianning","family":"Zang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Jingrun","family":"Ma","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.8.1195-1200"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380090"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2516020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"journal-title":"An international view of privacy risks for mobile apps","year":"2019","author":"Ren","key":"ref14"},{"journal-title":"How to achieve high classification accuracy with just a few labels: A semi-supervised approach using sampled packets","year":"2018","author":"Rezaei","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"journal-title":"Bidirectional lstm-crf models for sequence tagging","year":"2015","author":"Huang","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/ituk50268.2020.9303204"}],"event":{"name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2025,3,24]]},"location":"Milan, Italy","end":{"date-parts":[[2025,3,27]]}},"container-title":["2025 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10978109\/10978116\/10978498.pdf?arnumber=10978498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:41:00Z","timestamp":1746859260000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10978498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wcnc61545.2025.10978498","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]}}}