{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:55:53Z","timestamp":1771707353009,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,7]]},"DOI":"10.1145\/3155133.3155175","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T13:26:53Z","timestamp":1512998813000},"page":"333-339","source":"Crossref","is-referenced-by-count":82,"title":["A Deep Learning Based Method for Handling Imbalanced Problem in Network Traffic Classification"],"prefix":"10.1145","author":[{"given":"Ly","family":"Vu","sequence":"first","affiliation":[{"name":"Le Quy Don Technical University, Hanoi, Vietnam"}]},{"given":"Cong Thanh","family":"Bui","sequence":"additional","affiliation":[{"name":"Posts and Telecommunications, Institute of Technology, Hanoi, Vietnam"}]},{"given":"Quang Uy","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University, Hanoi, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","year":"2017"},{"key":"e_1_3_2_1_2_1","unstructured":"2010. Model Evaluation - Classification. (2010). Retrieved September 14 2017 from http:\/\/chem-eng.utoronto.ca\/~datamining\/dmc\/model_evaluation_c.htm  2010. Model Evaluation - Classification. (2010). Retrieved September 14 2017 from http:\/\/chem-eng.utoronto.ca\/~datamining\/dmc\/model_evaluation_c.htm"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","year":"2017"},{"key":"e_1_3_2_1_4_1","unstructured":"2014. Scikit-learn tutorial. (2014). Retrieved September 14 2017 from http:\/\/scikit-learn.org\/stable\/  2014. Scikit-learn tutorial. (2014). Retrieved September 14 2017 from http:\/\/scikit-learn.org\/stable\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Alec Radford Luke Metz and Soumith Chintala. 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. In Computer Vision and Pattern Regconition (CVPR). CoRR. https:\/\/arxiv.org\/abs\/1506.05751  Alec Radford Luke Metz and Soumith Chintala. 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. In Computer Vision and Pattern Regconition (CVPR). CoRR. https:\/\/arxiv.org\/abs\/1506.05751"},{"key":"e_1_3_2_1_6_1","first-page":"1326","article-title":"Can encrypted traffic be identified without port numbers, IP addresses and payload inspection","volume":"22","author":"Alshammari Riyad","year":"2010","journal-title":"Elsevier"},{"key":"e_1_3_2_1_7_1","unstructured":"Arthur Callado Carlos Kamienski St\u00eanio Fernandes and Djamel Sadok. 2008. A Survey on Internet Traffic Identification and Classification. (2008).  Arthur Callado Carlos Kamienski St\u00eanio Fernandes and Djamel Sadok. 2008. A Survey on Internet Traffic Identification and Classification. (2008)."},{"key":"e_1_3_2_1_9_1","unstructured":"Emily Denton Soumith Chintala Arthur Szlam and Rob Fergus. 2015. Deep Generative Image Models using a Laplacian Pyramid of Adversarial Networks. In Computer Vision and Pattern Regconition (CVPR). CoRR. https:\/\/arxiv.org\/abs\/1506.05751  Emily Denton Soumith Chintala Arthur Szlam and Rob Fergus. 2015. Deep Generative Image Models using a Laplacian Pyramid of Adversarial Networks. In Computer Vision and Pattern Regconition (CVPR). CoRR. https:\/\/arxiv.org\/abs\/1506.05751"},{"key":"e_1_3_2_1_10_1","unstructured":"Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Networks. In Neural Information Processing Systems. Montreal Canada. https:\/\/arxiv.org\/pdf\/1406.2661.pdf   Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Networks. In Neural Information Processing Systems. Montreal Canada. https:\/\/arxiv.org\/pdf\/1406.2661.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2007.4404178"},{"key":"e_1_3_2_1_12_1","unstructured":"Olson David L and Delen Dursun. 2008. Advanced Data Mining Techniques 1st edition (Ed.). Springer 138.   Olson David L and Delen Dursun. 2008. Advanced Data Mining Techniques 1st edition (Ed.). Springer 138."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.475"},{"key":"e_1_3_2_1_15_1","unstructured":"A. More. 2016. Survey of resampling techniques for improving classification performance in unbalanced datasets. ArXiv e-prints (Aug. 2016). arXiv:stat.AP\/1608.06048  A. More. 2016. Survey of resampling techniques for improving classification performance in unbalanced datasets. ArXiv e-prints (Aug. 2016). arXiv:stat.AP\/1608.06048"},{"key":"e_1_3_2_1_16_1","volume-title":"Neural Information Processing Systems.","author":"Odena Augustus"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Ly Vu Thi Dong Van Tra and Quang Uy Nguyen. 2016. Learning from Imbalanced Data for Encrypted Traffic Identification Problem. SoICT Ho Chi Minh Vietnam. 10.1145\/3011077.3011132   Ly Vu Thi Dong Van Tra and Quang Uy Nguyen. 2016. Learning from Imbalanced Data for Encrypted Traffic Identification Problem. SoICT Ho Chi Minh Vietnam. 10.1145\/3011077.3011132","DOI":"10.1145\/3011077.3011132"},{"key":"e_1_3_2_1_18_1","unstructured":"Joe Touch Eliot Lear Allison Mankin Markku Kojo Kumiko Ono Martin Stiemerling Lars Eggert Alexey Melnikov Wes Eddy Alexander Zimmermann Brian Trammell and Jana Iyengar. 2017. Service Name and Transport Protocol Port Number Registry. In The Internet Assigned Numbers Authority (IANA).  Joe Touch Eliot Lear Allison Mankin Markku Kojo Kumiko Ono Martin Stiemerling Lars Eggert Alexey Melnikov Wes Eddy Alexander Zimmermann Brian Trammell and Jana Iyengar. 2017. Service Name and Transport Protocol Port Number Registry. In The Internet Assigned Numbers Authority (IANA)."},{"key":"e_1_3_2_1_19_1","volume-title":"International Journal of Network Management","author":"Vladutu Alina"},{"key":"e_1_3_2_1_20_1","unstructured":"Zhanyi Wang. 2015. The applications of Deep Learning on Traffic Identification. In Black Hat. Lasvegas USA.  Zhanyi Wang. 2015. The applications of Deep Learning on Traffic Identification. In Black Hat. Lasvegas USA."},{"key":"e_1_3_2_1_21_1","volume-title":"Network Operations and Managements Symposium (NOMS). IEEE, 160--167","author":"Won Young J"},{"key":"e_1_3_2_1_22_1","unstructured":"Jun Zhang XiaoChen YangXiang Wanlei Zhou and JieWu. 2014. Synthesizing the preferred inputs for neurons in neural networks via deep generator networks. In IEEE\/ACM transaction on networking (1063-6692). IEEE. https:\/\/pdfs.semanticscholar.org\/763d\/7955354cd0fbd6b2983ef46880dcc21533f6.pdf  Jun Zhang XiaoChen YangXiang Wanlei Zhou and JieWu. 2014. Synthesizing the preferred inputs for neurons in neural networks via deep generator networks. In IEEE\/ACM transaction on networking (1063-6692). IEEE. https:\/\/pdfs.semanticscholar.org\/763d\/7955354cd0fbd6b2983ef46880dcc21533f6.pdf"}],"event":{"name":"SoICT 2017: The Eighth International Symposium on Information and Communication Technology","location":"Nha Trang City Viet Nam","acronym":"SoICT 2017","sponsor":["SOICT School of Information and Communication Technology - HUST","NAFOSTED The National Foundation for Science and Technology Development"]},"container-title":["Proceedings of the Eighth International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3155133.3155175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:28Z","timestamp":1750217428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":21,"alternative-id":["10.1145\/3155133.3155175","10.1145\/3155133"],"URL":"https:\/\/doi.org\/10.1145\/3155133.3155175","relation":{},"subject":[],"published":{"date-parts":[[2017,12,7]]}}}