{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:15Z","timestamp":1761611475563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,14]]},"DOI":"10.1145\/3314545.3316278","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T16:30:09Z","timestamp":1555518609000},"page":"139-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Effective Media Traffic Classification Using Deep Learning"],"prefix":"10.1145","author":[{"given":"Qing","family":"Lyu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing"}]},{"given":"Xingjian","family":"Lu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications Beijing"}]}],"member":"320","published-online":{"date-parts":[[2019,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"R. Aggarwal and Nanhay Singh. 2017. A New Hybrid Approach for Network Traffic Classification Using Svm and Na\u00efve Bayes Algorithm.  R. Aggarwal and Nanhay Singh. 2017. A New Hybrid Approach for Network Traffic Classification Using Svm and Na\u00efve Bayes Algorithm."},{"key":"e_1_3_2_1_2_1","volume-title":"Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology 33, 8","author":"Alipanahi Babak","year":"2015","unstructured":"Babak Alipanahi , Andrew Delong , Matthew T Weirauch , and Brendan J Frey . 2015. Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology 33, 8 ( 2015 ), 831. Babak Alipanahi, Andrew Delong, Matthew T Weirauch, and Brendan J Frey. 2015. Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology 33, 8 (2015), 831."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers. 69--78","author":"dos Santos Cicero","year":"2014","unstructured":"Cicero dos Santos and Maira Gatti . 2014 . Deep convolutional neural networks for sentiment analysis of short texts . In Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers. 69--78 . Cicero dos Santos and Maira Gatti. 2014. Deep convolutional neural networks for sentiment analysis of short texts. In Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers. 69--78."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2044046"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100613.00161"},{"key":"e_1_3_2_1_10_1","first-page":"2","article-title":"Software-defined networking: The new norm for networks","volume":"2","author":"Fundation Open Networking","year":"2012","unstructured":"Open Networking Fundation . 2012 . Software-defined networking: The new norm for networks . ONF White Paper 2 (2012), 2 -- 6 . Open Networking Fundation. 2012. Software-defined networking: The new norm for networks. ONF White Paper 2 (2012), 2--6.","journal-title":"ONF White Paper"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/70405.70408"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061946"},{"key":"e_1_3_2_1_14_1","unstructured":"IANA. {n. d.}. https:\/\/www.iana.org\/. ({n. d.}).  IANA. {n. d.}. https:\/\/www.iana.org\/. ({n. d.})."},{"key":"e_1_3_2_1_15_1","first-page":"1793","article-title":"Statistical normalization and back propagation for classification","volume":"3","author":"Jayalakshmi T","year":"2011","unstructured":"T Jayalakshmi and A Santhakumaran . 2011 . Statistical normalization and back propagation for classification . International Journal of Computer Theory and Engineering 3 , 1 (2011), 1793 -- 8201 . T Jayalakshmi and A Santhakumaran. 2011. Statistical normalization and back propagation for classification. International Journal of Computer Theory and Engineering 3, 1 (2011), 1793--8201.","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230718.3232111"},{"key":"e_1_3_2_1_17_1","volume-title":"File-sharing in the Internet: A characterization of P2P traffic in the backbone","author":"Karagiannis Thomas","year":"2003","unstructured":"Thomas Karagiannis , Andre Broido , Nevil Brownlee , Kimberly Claffy , and Michalis Faloutsos . 2003. File-sharing in the Internet: A characterization of P2P traffic in the backbone . University of California , Riverside, USA , Tech. Rep ( 2003 ). Thomas Karagiannis, Andre Broido, Nevil Brownlee, Kimberly Claffy, and Michalis Faloutsos. 2003. File-sharing in the Internet: A characterization of P2P traffic in the backbone. University of California, Riverside, USA, Tech. Rep (2003)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251394"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787478"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553453"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010062"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069326"},{"key":"e_1_3_2_1_24_1","volume-title":"Mahdi Jafari Siavoshani, and Mohammd-sadegh Saberian","author":"Lotfollahi Mohammad","year":"2017","unstructured":"Mohammad Lotfollahi , Ramin Shirali , Mahdi Jafari Siavoshani, and Mohammd-sadegh Saberian . 2017 . Deep Packet : A Novel Approach For Encrypted Traffic Classification Using Deep Learning . arXiv preprint arXiv:1709.02656 (2017). Mohammad Lotfollahi, Ramin Shirali, Mahdi Jafari Siavoshani, and Mohammd-sadegh Saberian. 2017. Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning. arXiv preprint arXiv:1709.02656 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. Australian Telecommunication Networks and Application Conference.","author":"Nguyen T","year":"2006","unstructured":"T Nguyen and Grenville Armitage . 2006 . Synthetic sub-flow pairs for timely and stable IP traffic identification . In Proc. Australian Telecommunication Networks and Application Conference. T Nguyen and Grenville Armitage. 2006. Synthetic sub-flow pairs for timely and stable IP traffic identification. In Proc. Australian Telecommunication Networks and Application Conference."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5120\/13715-1478"},{"key":"e_1_3_2_1_32_1","first-page":"220","article-title":"Network traffic classification using machine learning techniques over software defined networks","volume":"8","author":"Parsaei Mohammad Reza","year":"2017","unstructured":"Mohammad Reza Parsaei , Mohammad Javad Sobouti , Seyed Raouf Khayami , and Reza Javidan . 2017 . Network traffic classification using machine learning techniques over software defined networks . International Journal of Advanced Computer Science and Applications 8 , 7 (2017), 220 -- 225 . Mohammad Reza Parsaei, Mohammad Javad Sobouti, Seyed Raouf Khayami, and Reza Javidan. 2017. Network traffic classification using machine learning techniques over software defined networks. International Journal of Advanced Computer Science and Applications 8, 7 (2017), 220--225.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6898-0_19"},{"key":"e_1_3_2_1_34_1","volume-title":"Learning representations by back-propagating errors. nature 323, 6088","author":"Rumelhart David E","year":"1986","unstructured":"David E Rumelhart , Geoffrey E Hinton , and Ronald J Williams . 1986. Learning representations by back-propagating errors. nature 323, 6088 ( 1986 ), 533. David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533."},{"key":"e_1_3_2_1_35_1","volume-title":"Effective packet number for 5G IM WeChat application at early stage traffic classification. Mobile Information Systems 2017","author":"Shafiq Muhammad","year":"2017","unstructured":"Muhammad Shafiq and Xiangzhan Yu. 2017. Effective packet number for 5G IM WeChat application at early stage traffic classification. Mobile Information Systems 2017 ( 2017 ). Muhammad Shafiq and Xiangzhan Yu. 2017. Effective packet number for 5G IM WeChat application at early stage traffic classification. Mobile Information Systems 2017 (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6969799"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785300"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997530"},{"key":"e_1_3_2_1_39_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.133"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872430"},{"key":"e_1_3_2_1_42_1","volume-title":"The applications of deep learning on traffic identification. BlackHat USA","author":"Wang Zhanyi","year":"2015","unstructured":"Zhanyi Wang . 2015. The applications of deep learning on traffic identification. BlackHat USA ( 2015 ). Zhanyi Wang. 2015. The applications of deep learning on traffic identification. BlackHat USA (2015)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.34"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2010.31"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.04.331"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682724"}],"event":{"name":"ICCDA 2019: 2019 The 3rd International Conference on Compute and Data Analysis","acronym":"ICCDA 2019","location":"Kahului HI USA"},"container-title":["Proceedings of the 2019 3rd International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3316278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314545.3316278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:03Z","timestamp":1750208523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3316278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":46,"alternative-id":["10.1145\/3314545.3316278","10.1145\/3314545"],"URL":"https:\/\/doi.org\/10.1145\/3314545.3316278","relation":{},"subject":[],"published":{"date-parts":[[2019,3,14]]},"assertion":[{"value":"2019-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}