{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:30:34Z","timestamp":1752229834844,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,23]]},"DOI":"10.1145\/3472735.3473386","type":"proceedings-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T23:26:21Z","timestamp":1628897181000},"page":"38-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Internet Traffic Classification Using an Ensemble of Deep Convolutional Neural Networks"],"prefix":"10.1145","author":[{"given":"Amin","family":"Shahraki","sequence":"first","affiliation":[{"name":"\u00d8stfold University College, Halden, Viken, Norway"}]},{"given":"Mahmoud","family":"Abbasi","sequence":"additional","affiliation":[{"name":"Islamic Azad University, Mashhad, Iran"}]},{"given":"Amir","family":"Taherkordi","sequence":"additional","affiliation":[{"name":"University of Oslo, Oslo, Norway"}]},{"given":"Mohammed","family":"Kaosar","sequence":"additional","affiliation":[{"name":"Murdoch University, Perth, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104234"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"e_1_3_2_1_4_1","volume-title":"Bagging predictors. Machine learning 24, 2","author":"Breiman Leo","year":"1996","unstructured":"Leo Breiman . 1996. Bagging predictors. Machine learning 24, 2 ( 1996 ), 123--140. Leo Breiman. 1996. Bagging predictors. Machine learning 24, 2 (1996), 123--140."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986013"},{"key":"e_1_3_2_1_9_1","volume-title":"Natinael Solomon Neggatu, and Andrew W Moore","author":"Joo Michael Ang Kun","year":"2017","unstructured":"Ang Kun Joo Michael , Emma Valla , Natinael Solomon Neggatu, and Andrew W Moore . 2017 . Network traffic classification via neural networks. Technical Report. University of Cambridge , Computer Laboratory. Ang Kun Joo Michael, Emma Valla, Natinael Solomon Neggatu, and Andrew W Moore. 2017. Network traffic classification via neural networks. Technical Report. University of Cambridge, Computer Laboratory."},{"volume-title":"Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (Banff","author":"Andrew","key":"e_1_3_2_1_10_1","unstructured":"Andrew W. Moore and Denis Zuev. 2005. Internet Traffic Classification Using Bayesian Analysis Techniques . In Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (Banff , Alberta, Canada) (SIGMETRICS '05). Association for Computing Machinery, New York, NY, USA, 50--60. https:\/\/doi.org\/10.1145\/1064212.1064220 Andrew W. Moore and Denis Zuev. 2005. Internet Traffic Classification Using Bayesian Analysis Techniques. In Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (Banff, Alberta, Canada) (SIGMETRICS '05). Association for Computing Machinery, New York, NY, USA, 50--60. https:\/\/doi.org\/10.1145\/1064212.1064220"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996425"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103770"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"volume-title":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Wang W.","key":"e_1_3_2_1_15_1","unstructured":"W. Wang , M. Zhu , J. Wang , X. Zeng , and Z. Yang . 2017. End-to-end encrypted traffic classification with one-dimensional convolution neural networks . In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) ( Beijing, China). IEEE, 43--48. W. Wang, M. Zhu, J. Wang, X. Zeng, and Z. Yang. 2017. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) (Beijing, China). IEEE, 43--48."},{"key":"e_1_3_2_1_16_1","volume-title":"SIFT meets CNN: A decade survey of instance retrieval","author":"Zheng Liang","year":"2017","unstructured":"Liang Zheng , Yi Yang , and Qi Tian . 2017. SIFT meets CNN: A decade survey of instance retrieval . IEEE transactions on pattern analysis and machine intelligence 40, 5 ( 2017 ), 1224--1244. Liang Zheng, Yi Yang, and Qi Tian. 2017. SIFT meets CNN: A decade survey of instance retrieval. IEEE transactions on pattern analysis and machine intelligence 40, 5 (2017), 1224--1244."}],"event":{"name":"SIGCOMM '21: ACM SIGCOMM 2021 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event USA","acronym":"SIGCOMM '21"},"container-title":["Proceedings of the 4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472735.3473386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472735.3473386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:35Z","timestamp":1750193315000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472735.3473386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":16,"alternative-id":["10.1145\/3472735.3473386","10.1145\/3472735"],"URL":"https:\/\/doi.org\/10.1145\/3472735.3473386","relation":{},"subject":[],"published":{"date-parts":[[2021,8,23]]},"assertion":[{"value":"2021-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}