{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:29:51Z","timestamp":1770226191842,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561436","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"647-654","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["A few shots traffic classification with mini-FlowPic augmentations"],"prefix":"10.1145","author":[{"given":"Eyal","family":"Horowicz","sequence":"first","affiliation":[{"name":"Tel Aviv University, Israel"}]},{"given":"Tal","family":"Shapira","sequence":"additional","affiliation":[{"name":"Reichman University, Israel"}]},{"given":"Yuval","family":"Shavitt","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Israel"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"e_1_3_2_2_2_1","volume-title":"International conference on machine learning. PMLR, 1597--1607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen , Simon Kornblith , Mohammad Norouzi , and Geoffrey Hinton . 2020 . A simple framework for contrastive learning of visual representations . In International conference on machine learning. PMLR, 1597--1607 . Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597--1607."},{"key":"e_1_3_2_2_3_1","volume-title":"IEEE International Conference on Big Data (Big Data). 1271--1276","author":"Chen Z.","unstructured":"Z. Chen , K. He , J. Li , and Y. Geng . 2017. Seq2Img: A sequence-to-image based approach towards IP traffic classification using convolutional neural networks . In IEEE International Conference on Big Data (Big Data). 1271--1276 . Z. Chen, K. He, J. Li, and Y. Geng. 2017. Seq2Img: A sequence-to-image based approach towards IP traffic classification using convolutional neural networks. In IEEE International Conference on Big Data (Big Data). 1271--1276."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy -","volume":"414","author":"Draper-Gil Gerard","unstructured":"Gerard Draper-Gil , Arash Habibi Lashkari , Mohammad Saiful Islam Mamun , and Ali A. Ghorbani . 2016. Characterization of Encrypted and VPN Traffic using Time-related Features . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. INSTICC, SciTePress, 407-- 414 . Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, and Ali A. Ghorbani. 2016. Characterization of Encrypted and VPN Traffic using Time-related Features. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. INSTICC, SciTePress, 407--414."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.005"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijet.v13i04.8466"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962106"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy -","volume":"262","author":"Lashkari Arash Habibi","unstructured":"Arash Habibi Lashkari , Gerard Draper Gil , Mohammad Saiful Islam Mamun , and Ali A. Ghorbani . 2017. Characterization of Tor Traffic using Time based Features . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,. INSTICC, SciTePress, 253-- 262 . Arash Habibi Lashkari, Gerard Draper Gil, Mohammad Saiful Islam Mamun, and Ali A. Ghorbani. 2017. Characterization of Tor Traffic using Time based Features. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,. INSTICC, SciTePress, 253--262."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406218"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.03.002"},{"key":"e_1_3_2_2_15_1","volume-title":"Industrial Conference on Data Mining (ICDM) (NYC, NY, USA).","author":"Rezaei Shahbaz","year":"2019","unstructured":"Shahbaz Rezaei and Xin Liu . 2019 . How to achieve high classification accuracy with just a few labels: A semi-supervised approach using sampled packets . In Industrial Conference on Data Mining (ICDM) (NYC, NY, USA). Shahbaz Rezaei and Xin Liu. 2019. How to achieve high classification accuracy with just a few labels: A semi-supervised approach using sampled packets. In Industrial Conference on Data Mining (ICDM) (NYC, NY, USA)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209652"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.02.003"},{"key":"e_1_3_2_2_18_1","volume-title":"A machine learning based framework for IoT device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies","author":"Salman Ola","year":"2019","unstructured":"Ola Salman , Imad H Elhajj , Ali Chehab , and Ayman Kayssi . 2019. A machine learning based framework for IoT device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies ( 2019 ), e3743. Ola Salman, Imad H Elhajj, Ali Chehab, and Ayman Kayssi. 2019. A machine learning based framework for IoT device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies (2019), e3743."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071441"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France","acronym":"IMC '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:16Z","timestamp":1750182556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":20,"alternative-id":["10.1145\/3517745.3561436","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561436","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}