{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:36:57Z","timestamp":1775054217394,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T00:00:00Z","timestamp":1585526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,30]]},"DOI":"10.1145\/3341105.3373844","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T17:55:36Z","timestamp":1592243736000},"page":"1026-1033","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A novel network traffic classification approach via discriminative feature learning"],"prefix":"10.1145","author":[{"given":"Lixin","family":"Zhao","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences and University of Chinese Academy of Sciences Beijing, China"}]},{"given":"Lijun","family":"Cai","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences"}]},{"given":"Aimin","family":"Yu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences"}]},{"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences"}]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences"}]}],"member":"320","published-online":{"date-parts":[[2020,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506558"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"e_1_3_2_1_3_1","volume-title":"RFC 3924","author":"Baker Fred","year":"2004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10593-2_13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"e_1_3_2_1_9_1","volume-title":"2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06)","volume":"2","author":"Hadsell Raia","year":"2006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_11_1","volume-title":"Learning depth from single monocular images using deep convolutional neural fields","author":"Liu Fayao","year":"2015"},{"key":"e_1_3_2_1_12_1","volume-title":"Ramin Shirali Hossein Zade, and Mohammdsadegh Saberian.","author":"Lotfollahi Mohammad","year":"2017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.12.007"},{"key":"e_1_3_2_1_14_1","first-page":"146","article-title":"Towards a flow-based internet traffic classification for bandwidth optimization","volume":"3","author":"Mohd Abuagla Babiker","year":"2009","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187305"},{"key":"e_1_3_2_1_18_1","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","author":"Pedregosa Fabian","year":"2011","journal-title":"Journal of machine learning research 12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.228"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"e_1_3_2_1_21_1","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","volume":"99","author":"Martin Roesch","year":"1999","journal-title":"Lisa"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.007"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627557"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647128"},{"key":"e_1_3_2_1_26_1","volume-title":"Noise-resistant Statistical Traffic Classification","author":"Wang Binfeng","year":"2017"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912896"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_3_2_1_30_1","volume-title":"The applications of deep learning on traffic identification. BlackHat USA 24","author":"Wang Zhanyi","year":"2015"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.536364"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2566669"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289207"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.022713.120250"},{"key":"e_1_3_2_1_35_1","volume-title":"Internet traffic classification by aggregating correlated naive bayes predictions","author":"Zhang Jun","year":"2012"}],"event":{"name":"SAC '20: The 35th ACM\/SIGAPP Symposium on Applied Computing","location":"Brno Czech Republic","acronym":"SAC '20","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 35th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3373844","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341105.3373844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:11Z","timestamp":1750204451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3373844"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,30]]},"references-count":34,"alternative-id":["10.1145\/3341105.3373844","10.1145\/3341105"],"URL":"https:\/\/doi.org\/10.1145\/3341105.3373844","relation":{},"subject":[],"published":{"date-parts":[[2020,3,30]]},"assertion":[{"value":"2020-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}