{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:09Z","timestamp":1750221009224,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61872211"],"award-info":[{"award-number":["61872211"]}]},{"name":"National Key R&D Program of China","award":["2017YFB1010002"],"award-info":[{"award-number":["2017YFB1010002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329050","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Trigger relationship aware mobile traffic classification"],"prefix":"10.1145","author":[{"given":"Heyi","family":"Tang","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Xiaowei","family":"Yang","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Zhenjie","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n.d.}. Monkeyrunner. developer.android.com\/studio\/test\/monkeyrunner\/.  {n.d.}. Monkeyrunner. developer.android.com\/studio\/test\/monkeyrunner\/."},{"key":"e_1_3_2_1_2_1","unstructured":"{n.d.}. MySQL. https:\/\/www.mysql.com\/.  {n.d.}. MySQL. https:\/\/www.mysql.com\/."},{"volume-title":"Mobile Encrypted Traffic Classification Using Deep Learning. In TMA '18","author":"Aceto G.","key":"e_1_3_2_1_3_1","unstructured":"G. Aceto , D. Ciuonzo , A. Montieri , and A. Pescap\u00e9 . 2018 . Mobile Encrypted Traffic Classification Using Deep Learning. In TMA '18 . 1--8. G. Aceto, D. Ciuonzo, A. Montieri, and A. Pescap\u00e9. 2018. Mobile Encrypted Traffic Classification Using Deep Learning. In TMA '18. 1--8."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991123"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939929"},{"volume-title":"IWQoS '16","author":"Chen Z.","key":"e_1_3_2_1_7_1","unstructured":"and Z. Chen , L. Zhang, Q. Yan, B. Yang, and L. Peng and. 2016. TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic . In IWQoS '16 . 1--6. and Z. Chen, L. Zhang, Q. Yan, B. Yang, and L. Peng and. 2016. TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic. In IWQoS '16. 1--6."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1074"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"HDFS architecture guide","volume":"53","author":"Dhruba Borthakur","year":"2008","unstructured":"Dhruba Borthakur et al. 2008 . HDFS architecture guide . Hadoop Apache Project 53 (2008), 1 -- 13 . Dhruba Borthakur et al. 2008. HDFS architecture guide. Hadoop Apache Project 53 (2008), 1--13.","journal-title":"Hadoop Apache Project"},{"volume-title":"Inter-player Delay Optimization in Multiplayer Cloud Gaming. In 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). 702--709","author":"Chen Y.","key":"e_1_3_2_1_10_1","unstructured":"Y. Chen , J. Liu , and Y. Cui . 2016 . Inter-player Delay Optimization in Multiplayer Cloud Gaming. In 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). 702--709 . Y. Chen, J. Liu, and Y. Cui. 2016. Inter-player Delay Optimization in Multiplayer Cloud Gaming. In 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). 702--709."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Z. Chen B. Yu Y. Zhang J. Zhang and J. Xu. 2016. Automatic Mobile Application Traffic Identification by Convolutional Neural Networks. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. 301--307.  Z. Chen B. Yu Y. Zhang J. Zhang and J. Xu. 2016. Automatic Mobile Application Traffic Identification by Convolutional Neural Networks. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. 301--307.","DOI":"10.1109\/TrustCom.2016.0077"},{"volume-title":"Introduction to algorithms","author":"Cormen Thomas H","key":"e_1_3_2_1_12_1","unstructured":"Thomas H Cormen , Charles E Leiserson , Ronald L Rivest , and Clifford Stein . 2009. Introduction to algorithms . MIT press . Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, and Clifford Stein. 2009. Introduction to algorithms. MIT press."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2516020"},{"key":"e_1_3_2_1_15_1","volume-title":"Using combined network information to predict mobile application usage. Physica A: Statistical Mechanics and its Applications 515","author":"Jiang Yubo","year":"2019","unstructured":"Yubo Jiang , Xin Du , and Tao Jin . 2019. Using combined network information to predict mobile application usage. Physica A: Statistical Mechanics and its Applications 515 ( 2019 ), 430 -- 439. Yubo Jiang, Xin Du, and Tao Jin. 2019. Using combined network information to predict mobile application usage. Physica A: Statistical Mechanics and its Applications 515 (2019), 430 -- 439."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4, Article 173 (Dec.","author":"Jin Haojian","year":"2018","unstructured":"Haojian Jin , Minyi Liu , Kevan Dodhia , Yuanchun Li , Gaurav Srivastava , Matthew Fredrikson , Yuvraj Agarwal , and Jason I. Hong . 2018. Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4, Article 173 (Dec. 2018 ), 27 pages. Haojian Jin, Minyi Liu, Kevan Dodhia, Yuanchun Li, Gaurav Srivastava, Matthew Fredrikson, Yuvraj Agarwal, and Jason I. Hong. 2018. Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4, Article 173 (Dec. 2018), 27 pages."},{"volume-title":"AEECT '17","author":"Kuo J.","key":"e_1_3_2_1_17_1","unstructured":"J. Kuo , H. Ruan , C. Chan , and C. Lei . 2017. Investigation of mobile App behaviors, from the aspect of real world mobile backend system . In AEECT '17 . 1--6. J. Kuo, H. Ruan, C. Chan, and C. Lei. 2017. Investigation of mobile App behaviors, from the aspect of real world mobile backend system. In AEECT '17. 1--6."},{"volume-title":"AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic. In PAM '15","author":"Miskovic Stanislav","key":"e_1_3_2_1_18_1","unstructured":"Stanislav Miskovic , Gene Moo Lee , Yong Liao , and Mario Baldi . {n.d.}. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic. In PAM '15 . Stanislav Miskovic, Gene Moo Lee, Yong Liao, and Mario Baldi. {n.d.}. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic. In PAM '15."},{"volume-title":"Infocom '16","author":"Ranjan G.","key":"e_1_3_2_1_19_1","unstructured":"G. Ranjan , A. Tongaonkar , and R. Torres . 2016. Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic . In Infocom '16 . 1--9. G. Ranjan, A. Tongaonkar, and R. Torres. 2016. Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic. In Infocom '16. 1--9."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143400"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_1_22_1","volume-title":"Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. In WOOT '16","author":"Saltaformaggio Brendan","year":"2016","unstructured":"Brendan Saltaformaggio , Hongjun Choi , Kristen Johnson , Yonghwi Kwon , Qi Zhang , Xiangyu Zhang , Dongyan Xu , and John Qian . 2016 . Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. In WOOT '16 . USENIX Association, Austin, TX. Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, and John Qian. 2016. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. In WOOT '16. USENIX Association, Austin, TX."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645892.2645896"},{"volume-title":"Theory of linear and integer programming","author":"Schrijver Alexander","key":"e_1_3_2_1_24_1","unstructured":"Alexander Schrijver . 1998. Theory of linear and integer programming . John Wiley & Sons . Alexander Schrijver. 1998. Theory of linear and integer programming. John Wiley & Sons."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692682"},{"volume-title":"Parameter estimation: principles and problems","author":"Sorenson H.W.","key":"e_1_3_2_1_26_1","unstructured":"H.W. Sorenson . 1980. Parameter estimation: principles and problems . M. Dekker . H.W. Sorenson. 1980. Parameter estimation: principles and problems. M. Dekker."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"V. F. Taylor R. Spolaor M. Conti and I. Martinovic. 2016. AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. In EuroS&P '16. 439--454.  V. F. Taylor R. Spolaor M. Conti and I. Martinovic. 2016. AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. In EuroS&P '16. 439--454.","DOI":"10.1109\/EuroSP.2016.40"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.77"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_7"},{"volume-title":"CNS '15","author":"Wang Q.","key":"e_1_3_2_1_31_1","unstructured":"Q. Wang , A. Yahyavi , B. Kemme , and W. He . 2015. I know what you did on your smartphone: Inferring app usage over encrypted data traffic . In CNS '15 . 433--441. Q. Wang, A. Yahyavi, B. Kemme, and W. He. 2015. I know what you did on your smartphone: Inferring app usage over encrypted data traffic. In CNS '15. 433--441."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624143"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771228"},{"volume-title":"WiMob '16","author":"Wang W.","key":"e_1_3_2_1_34_1","unstructured":"W. Wang and J. Bickford . 2016. WhatApp: Modeling mobile applications by domain names . In WiMob '16 . 1--10. W. Wang and J. Bickford. 2016. WhatApp: Modeling mobile applications by domain names. In WiMob '16. 1--10."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.01.003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068847"},{"volume-title":"Infocom '15","author":"Xu Q.","key":"e_1_3_2_1_37_1","unstructured":"Q. Xu , Y. Liao , S. Miskovic , Z. M. Mao , M. Baldi , A. Nucci , and T. Andrews . 2015. Automatic generation of mobile app signatures from traffic observations . In Infocom '15 . 1481--1489. Q. Xu, Y. Liao, S. Miskovic, Z. M. Mao, M. Baldi, A. Nucci, and T. Andrews. 2015. Automatic generation of mobile app signatures from traffic observations. In Infocom '15. 1481--1489."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790097"},{"key":"e_1_3_2_1_39_1","first-page":"10","article-title":"Spark: Cluster computing with working sets","volume":"10","author":"Zaharia Matei","year":"2010","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Michael J Franklin , Scott Shenker , and Ion Stoica . 2010 . Spark: Cluster computing with working sets . HotCloud 10 , 10 -- 10 (2010), 95. Matei Zaharia, Mosharaf Chowdhury, Michael J Franklin, Scott Shenker, and Ion Stoica. 2010. Spark: Cluster computing with working sets. HotCloud 10, 10--10 (2010), 95.","journal-title":"HotCloud"},{"volume-title":"Improve Quality of Experience for Mobile Instant Video Clip Sharing. In ICDCS '15","author":"Zhang L.","key":"e_1_3_2_1_40_1","unstructured":"L. Zhang , F. Wang , and J. Liu . 2015 . Improve Quality of Experience for Mobile Instant Video Clip Sharing. In ICDCS '15 . 780--781. L. Zhang, F. Wang, and J. Liu. 2015. Improve Quality of Experience for Mobile Instant Video Clip Sharing. In ICDCS '15. 780--781."}],"event":{"name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","acronym":"IWQoS '19","location":"Phoenix Arizona"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":40,"alternative-id":["10.1145\/3326285.3329050","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329050","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}