{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:51:44Z","timestamp":1774540304006,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T00:00:00Z","timestamp":1597017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,14]]},"DOI":"10.1145\/3405671.3405811","type":"proceedings-article","created":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T10:05:25Z","timestamp":1595325925000},"page":"14-20","source":"Crossref","is-referenced-by-count":29,"title":["SAM"],"prefix":"10.1145","author":[{"given":"Guorui","family":"Xie","sequence":"first","affiliation":[{"name":"Tsinghua University, Peng Cheng Laboratory"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Peng Cheng Laboratory"}]},{"given":"Yong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Tao","family":"Dai","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Gengbiao","family":"Shen","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Rui","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Richard","family":"Sinnott","sequence":"additional","affiliation":[{"name":"University of Melbourne"}]},{"given":"Shutao","family":"Xia","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2020,8,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Libprotoident: Traffic Classification using lightweight packet inspection. Technical Report","author":"Alcock Shane","year":"2012"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"e_1_3_2_1_3_1","unstructured":"Jimmy Lei Ba Jamie Ryan Kiros and Geoffrey E Hinton. 2016. Layer normalization. arXiv preprint arXiv:1607.06450 (2016).  Jimmy Lei Ba Jamie Ryan Kiros and Geoffrey E Hinton. 2016. Layer normalization. arXiv preprint arXiv:1607.06450 (2016)."},{"key":"e_1_3_2_1_4_1","first-page":"1137","article-title":"A Neural Probabilistic Language Model","volume":"3","author":"Ducharme R\u00e9jean","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_5_1","unstructured":"Jianpeng Cheng Li Dong and Mirella Lapata. 2016. Long shortterm memory-networks for machine reading. arXiv preprint arXiv:1601.06733 (2016).  Jianpeng Cheng Li Dong and Mirella Lapata. 2016. Long shortterm memory-networks for machine reading. arXiv preprint arXiv:1601.06733 (2016)."},{"key":"e_1_3_2_1_6_1","unstructured":"Junyoung Chung \u00c7aglar G\u00fcl\u00e7ehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. arXiv preprint arXiv:1412.3555 (2014).  Junyoung Chung \u00c7aglar G\u00fcl\u00e7ehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. arXiv preprint arXiv:1412.3555 (2014)."},{"key":"e_1_3_2_1_7_1","first-page":"35","article-title":"Issues and Future Directions in Traffic Classification","volume":"26","author":"Dainotti A.","year":"2012","journal-title":"Network"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906427"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress","author":"Draper-Gil Gerard"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1855"},{"key":"e_1_3_2_1_12_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624128"},{"key":"e_1_3_2_1_14_1","unstructured":"Zhouhan Lin Minwei Feng Cicero Nogueira dos Santos Mo Yu Bing Xiang Bowen Zhou and Yoshua Bengio. 2017. A structured self-attentive sentence embedding. arXiv preprint arXiv:1703.03130 (2017).  Zhouhan Lin Minwei Feng Cicero Nogueira dos Santos Mo Yu Bing Xiang Bowen Zhou and Yoshua Bengio. 2017. A structured self-attentive sentence embedding. arXiv preprint arXiv:1703.03130 (2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"Mohammad Lotfollahi Ramin Shirali Hossein Zade Mahdi Jafari Siavoshani and Mohammdsadegh Saberian. 2017. Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning. arXiv preprint arXiv:1709.02656 (2017).  Mohammad Lotfollahi Ramin Shirali Hossein Zade Mahdi Jafari Siavoshani and Mohammdsadegh Saberian. 2017. Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning. arXiv preprint arXiv:1709.02656 (2017)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 2019 Advances in Neural Information Processing Systems. Curran Associates, Inc.","author":"Paszke Adam","year":"2019"},{"key":"e_1_3_2_1_17_1","unstructured":"Romain Paulus Caiming Xiong and Richard Socher. 2017. A deep reinforced model for abstractive summarization. arXiv preprint arXiv:1705.04304 (2017).  Romain Paulus Caiming Xiong and Richard Socher. 2017. A deep reinforced model for abstractive summarization. arXiv preprint arXiv:1705.04304 (2017)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2017.1321891"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 30th Annual Conference on Neural Information Processing Systems. Curran Associates, Inc.","author":"Vaswani Ashish","year":"2017"},{"key":"e_1_3_2_1_22_1","unstructured":"Yong Wei Z Yun-Feng and Li-chao Guo. 2011. Analysis of message identification for OpenDPI. Computer Engineering (2011) S1.  Yong Wei Z Yun-Feng and Li-chao Guo. 2011. Analysis of message identification for OpenDPI. Computer Engineering (2011) S1."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2381230"}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","location":"Virtual Event USA","acronym":"SIGCOMM '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Workshop on Network Meets AI &amp; ML"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405671.3405811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3405671.3405811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:09Z","timestamp":1750195929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3405671.3405811"}},"subtitle":["Self-Attention based Deep Learning Method for Online Traffic Classification"],"short-title":[],"issued":{"date-parts":[[2020,8,10]]},"references-count":23,"alternative-id":["10.1145\/3405671.3405811","10.1145\/3405671"],"URL":"https:\/\/doi.org\/10.1145\/3405671.3405811","relation":{},"subject":[],"published":{"date-parts":[[2020,8,10]]}}}