{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:06Z","timestamp":1750220286777,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,11]]},"DOI":"10.1145\/3529399.3529444","type":"proceedings-article","created":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T15:43:09Z","timestamp":1654875789000},"page":"284-291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Multi-Task Attention Network for Digital Context Classification from Internet Traffic"],"prefix":"10.1145","author":[{"given":"Wenbin","family":"Li","sequence":"first","affiliation":[{"name":"Orange Labs, Orange S.A., France"}]},{"given":"Doua Hugues","family":"ZEMI","sequence":"additional","affiliation":[{"name":"Orange Labs, Orange S.A., France"}]},{"given":"Valentin","family":"REDON","sequence":"additional","affiliation":[{"name":"Orange Labs, Orange S.A., France"}]},{"given":"Matthieu","family":"LIEWIG","sequence":"additional","affiliation":[{"name":"Orange Labs, Orange S.A., France"}]}],"member":"320","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Kemp Simon","year":"2021","unstructured":"Simon Kemp . 2021 . Digital 2021: Global Overview Report . Retrieved January 19, 2022 from https:\/\/datareportal.com\/reports\/digital-2021-global-overview-report Simon Kemp. 2021. Digital 2021: Global Overview Report. Retrieved January 19, 2022 from https:\/\/datareportal.com\/reports\/digital-2021-global-overview-report"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2457276.2457297"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"volume-title":"Handheld and Ubiquitous Computing","author":"Abowd Gregory D.","key":"e_1_3_2_1_4_1","unstructured":"Gregory D. Abowd , Anind K. Dey , Peter J. Brown , Nigel Davies , Mark Smith , and Pete Steggles . 1999. Towards a Better Understanding of Context and Context-Awareness . In Handheld and Ubiquitous Computing , Springer Berlin Heidelberg , Berlin, Heidelberg , 304\u2013307. Gregory D. Abowd, Anind K. Dey, Peter J. Brown, Nigel Davies, Mark Smith, and Pete Steggles. 1999. Towards a Better Understanding of Context and Context-Awareness. In Handheld and Ubiquitous Computing, Springer Berlin Heidelberg, Berlin, Heidelberg, 304\u2013307."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI51764.2021.9486831"},{"key":"e_1_3_2_1_6_1","first-page":"1964","article-title":"Context Classification Framework for Handset-based End User Studies","volume":"20","author":"Soikkeli Tapio","year":"2014","unstructured":"Tapio Soikkeli , Juuso Karikoski , and Heikki H\u00e4mm\u00e4inen . 2014 . Context Classification Framework for Handset-based End User Studies . Journal of Universal Computer Science 20 , 14 (2014), 1964 \u2013 1986 . Tapio Soikkeli, Juuso Karikoski, and Heikki H\u00e4mm\u00e4inen. 2014. Context Classification Framework for Handset-based End User Studies. Journal of Universal Computer Science 20, 14 (2014), 1964\u20131986.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13060151"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447382"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01214-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2011.6143528"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery","author":"Hypolite Joel","year":"2022","unstructured":"Joel Hypolite , John Sonchack , Shlomo Hershkop , Nathan Dautenhahn , Andr\u00e9 DeHon , and Jonathan M. Smith . 2020. DeepMatch: practical deep packet inspection in the data plane using network processors . In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery , New York, NY, USA, 336\u2013350. Retrieved January 18, 2022 from https:\/\/doi.org\/10.1145\/3386367.3431290 10.1145\/3386367.3431290 Joel Hypolite, John Sonchack, Shlomo Hershkop, Nathan Dautenhahn, Andr\u00e9 DeHon, and Jonathan M. Smith. 2020. DeepMatch: practical deep packet inspection in the data plane using network processors. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery, New York, NY, USA, 336\u2013350. Retrieved January 18, 2022 from https:\/\/doi.org\/10.1145\/3386367.3431290"},{"key":"e_1_3_2_1_12_1","volume-title":"MAC Spoofing Attack Detection Based on Physical Layer Characteristics in Wireless Networks. In 2019 IEEE International Conference on Computational Electromagnetics (ICCEM), 1\u20133. DOI:https:\/\/doi.org\/10","author":"Liu Songyi","year":"2019","unstructured":"Songyi Liu . 2019 . MAC Spoofing Attack Detection Based on Physical Layer Characteristics in Wireless Networks. In 2019 IEEE International Conference on Computational Electromagnetics (ICCEM), 1\u20133. DOI:https:\/\/doi.org\/10 .1109\/COMPEM.2019.8779180 10.1109\/COMPEM.2019.8779180 Songyi Liu. 2019. MAC Spoofing Attack Detection Based on Physical Layer Characteristics in Wireless Networks. In 2019 IEEE International Conference on Computational Electromagnetics (ICCEM), 1\u20133. DOI:https:\/\/doi.org\/10.1109\/COMPEM.2019.8779180"},{"volume-title":"Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications","author":"Zou Zhuang","key":"e_1_3_2_1_13_1","unstructured":"Zhuang Zou , Jingguo Ge , Hongbo Zheng , Yulei Wu , Chunjing Han , and Zhongjiang Yao . 2018. Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications ; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS) , 329\u2013334. DOI:https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00074 10.1109\/HPCC Zhuang Zou, Jingguo Ge, Hongbo Zheng, Yulei Wu, Chunjing Han, and Zhongjiang Yao. 2018. Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), 329\u2013334. DOI:https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2018.8638232"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Graves Alex","year":"2014","unstructured":"Alex Graves , Greg Wayne , and Ivo Danihelka . 2014 . Neural Turing Machines. arXiv:1410.5401 [cs] (December 2014) . Retrieved January 19, 2022 from http:\/\/arxiv.org\/abs\/1410.5401 Alex Graves, Greg Wayne, and Ivo Danihelka. 2014. Neural Turing Machines. arXiv:1410.5401 [cs] (December 2014). Retrieved January 19, 2022 from http:\/\/arxiv.org\/abs\/1410.5401"},{"key":"e_1_3_2_1_16_1","volume-title":"Inc. Retrieved","author":"Ramachandran Prajit","year":"2019","unstructured":"Prajit Ramachandran , Niki Parmar , Ashish Vaswani , Irwan Bello , Anselm Levskaya , and Jon Shlens . 2019 . Stand-Alone Self-Attention in Vision Models. In Advances in Neural Information Processing Systems, Curran Associates , Inc. Retrieved January 19, 2022 from https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/3416a75f4cea9109507cacd8e2f2aefc-Abstract.html Prajit Ramachandran, Niki Parmar, Ashish Vaswani, Irwan Bello, Anselm Levskaya, and Jon Shlens. 2019. Stand-Alone Self-Attention in Vision Models. In Advances in Neural Information Processing Systems, Curran Associates, Inc. Retrieved January 19, 2022 from https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/3416a75f4cea9109507cacd8e2f2aefc-Abstract.html"},{"key":"e_1_3_2_1_17_1","volume-title":"Inc. Retrieved","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N Gomez , \u0141ukasz Kaiser , and Illia Polosukhin . 2017 . Attention is All you Need. In Advances in Neural Information Processing Systems, Curran Associates , Inc. Retrieved January 19, 2022 from https:\/\/papers.nips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems, Curran Associates, Inc. Retrieved January 19, 2022 from https:\/\/papers.nips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Canadian Institute for Cybersecurity.","year":"2016","unstructured":"Canadian Institute for Cybersecurity. 2016 . VPN-nonVPN dataset (ISCXVPN2016) . Retrieved January 19, 2022 from https:\/\/www.unb.ca\/cic\/datasets\/vpn.html Canadian Institute for Cybersecurity. 2016. VPN-nonVPN dataset (ISCXVPN2016). Retrieved January 19, 2022 from https:\/\/www.unb.ca\/cic\/datasets\/vpn.html"},{"key":"e_1_3_2_1_19_1","unstructured":"IP Network Traffic Flows Labeled with 75 Apps. Retrieved January 19 2022 from https:\/\/kaggle.com\/jsrojas\/ip-network-traffic-flows-labeled-with-87-apps  IP Network Traffic Flows Labeled with 75 Apps. Retrieved January 19 2022 from https:\/\/kaggle.com\/jsrojas\/ip-network-traffic-flows-labeled-with-87-apps"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"Martin La\u0161tovi\u010dka","year":"2019","unstructured":"La\u0161tovi\u010dka Martin , \u0160pa\u010dek Stanislav , Velan Petr , and \u010celeda Pavel . 2019 . Dataset Using TLS Fingerprints for OS Identification in Encrypted Traffic . Retrieved January 19, 2022 from https:\/\/zenodo.org\/record\/3461771\/preview\/flows_dataset_anonymized.zip La\u0161tovi\u010dka Martin, \u0160pa\u010dek Stanislav, Velan Petr, and \u010celeda Pavel. 2019. Dataset Using TLS Fingerprints for OS Identification in Encrypted Traffic. Retrieved January 19, 2022 from https:\/\/zenodo.org\/record\/3461771\/preview\/flows_dataset_anonymized.zip"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148743"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Li Wenbin","year":"2021","unstructured":"Wenbin Li . 2021 . Multi-Label Dataset of Internet Traffics (MLDIT) . Retrieved January 19, 2022 from https:\/\/kaggle.com\/artemis1216\/multi-label-dataset-of-internet-traffics Wenbin Li. 2021. Multi-Label Dataset of Internet Traffics (MLDIT). Retrieved January 19, 2022 from https:\/\/kaggle.com\/artemis1216\/multi-label-dataset-of-internet-traffics"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"e_1_3_2_1_24_1","first-page":"5","article-title":"Deep Learning for Encrypted Traffic Classification","volume":"57","author":"Rezaei Shahbaz","year":"2019","unstructured":"Shahbaz Rezaei and Xin Liu . 2019 . Deep Learning for Encrypted Traffic Classification : An Overview. IEEE Communications Magazine 57 , 5 (May 2019), 76\u201381. DOI:https:\/\/doi.org\/10.1109\/MCOM.2019.1800819 10.1109\/MCOM.2019.1800819 Shahbaz Rezaei and Xin Liu. 2019. Deep Learning for Encrypted Traffic Classification: An Overview. IEEE Communications Magazine 57, 5 (May 2019), 76\u201381. DOI:https:\/\/doi.org\/10.1109\/MCOM.2019.1800819","journal-title":"An Overview. IEEE Communications Magazine"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00770-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"e_1_3_2_1_27_1","volume-title":"Encrypted Application Classification with Convolutional Neural Network. In 2020 IFIP Networking Conference (Networking), 499\u2013503","author":"Yang Kun","year":"2020","unstructured":"Kun Yang , Lu Xu , Yang Xu , and Jonathan Chao . 2020 . Encrypted Application Classification with Convolutional Neural Network. In 2020 IFIP Networking Conference (Networking), 499\u2013503 . Kun Yang, Lu Xu, Yang Xu, and Jonathan Chao. 2020. Encrypted Application Classification with Convolutional Neural Network. In 2020 IFIP Networking Conference (Networking), 499\u2013503."},{"volume-title":"Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications","author":"Zou Zhuang","key":"e_1_3_2_1_28_1","unstructured":"Zhuang Zou , Jingguo Ge , Hongbo Zheng , Yulei Wu , Chunjing Han , and Zhongjiang Yao . 2018. Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications ; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS) , 329\u2013334. DOI:https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00074 10.1109\/HPCC Zhuang Zou, Jingguo Ge, Hongbo Zheng, Yulei Wu, Chunjing Han, and Zhongjiang Yao. 2018. Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), 329\u2013334. DOI:https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"e_1_3_2_1_29_1","volume-title":"App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 424\u2013429","author":"Wang Xin","year":"2020","unstructured":"Xin Wang , Shuhui Chen , and Jinshu Su . 2020 . App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 424\u2013429 . DOI:https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS50562.2020.9162891 10.1109\/INFOCOMWKSHPS50562.2020.9162891 Xin Wang, Shuhui Chen, and Jinshu Su. 2020. App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 424\u2013429. DOI:https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS50562.2020.9162891"},{"key":"e_1_3_2_1_30_1","volume-title":"Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Physica D: Nonlinear Phenomena 404, (March","author":"Sherstinsky Alex","year":"2020","unstructured":"Alex Sherstinsky . 2020. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Physica D: Nonlinear Phenomena 404, (March 2020 ), 132306. DOI:https:\/\/doi.org\/10.1016\/j.physd.2019.132306 10.1016\/j.physd.2019.132306 Alex Sherstinsky. 2020. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Physica D: Nonlinear Phenomena 404, (March 2020), 132306. DOI:https:\/\/doi.org\/10.1016\/j.physd.2019.132306"},{"key":"e_1_3_2_1_31_1","volume-title":"Byte Segment Neural Network for Network Traffic Classification. In 2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS), 1\u201310","author":"Li Rui","year":"2018","unstructured":"Rui Li , Xi Xiao , Shiguang Ni , Haitao Zheng , and Shutao Xia . 2018 . Byte Segment Neural Network for Network Traffic Classification. In 2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS), 1\u201310 . DOI:https:\/\/doi.org\/10.1109\/IWQoS.2018.8624128 10.1109\/IWQoS.2018.8624128 Rui Li, Xi Xiao, Shiguang Ni, Haitao Zheng, and Shutao Xia. 2018. Byte Segment Neural Network for Network Traffic Classification. In 2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS), 1\u201310. DOI:https:\/\/doi.org\/10.1109\/IWQoS.2018.8624128"},{"key":"e_1_3_2_1_32_1","volume-title":"Retrieved","author":"Bahdanau Dzmitry","year":"2016","unstructured":"Dzmitry Bahdanau , Kyunghyun Cho , and Yoshua Bengio . 2016 . Neural Machine Translation by Jointly Learning to Align and Translate. arXiv:1409.0473 [cs, stat] (May 2016) . Retrieved January 19, 2022 from http:\/\/arxiv.org\/abs\/1409.0473 Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2016. Neural Machine Translation by Jointly Learning to Align and Translate. arXiv:1409.0473 [cs, stat] (May 2016). Retrieved January 19, 2022 from http:\/\/arxiv.org\/abs\/1409.0473"},{"key":"e_1_3_2_1_33_1","volume-title":"Retrieved","author":"Luong Minh-Thang","year":"2022","unstructured":"Minh-Thang Luong , Hieu Pham , and Christopher D. Manning . 2015. Effective Approaches to Attention-based Neural Machine Translation. arXiv:1508.04025 [cs] (September 2015) . Retrieved January 19, 2022 from http:\/\/arxiv.org\/abs\/1508.04025 Minh-Thang Luong, Hieu Pham, and Christopher D. Manning. 2015. Effective Approaches to Attention-based Neural Machine Translation. arXiv:1508.04025 [cs] (September 2015). Retrieved January 19, 2022 from http:\/\/arxiv.org\/abs\/1508.04025"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3162150"},{"key":"e_1_3_2_1_35_1","volume-title":"Attention-based bidirectional GRU networks for efficient HTTPS traffic classification. Information Sciences 541, (December","author":"Liu Xun","year":"2020","unstructured":"Xun Liu , Junling You , Yulei Wu , Tong Li , Liangxiong Li , Zheyuan Zhang , and Jingguo Ge. 2020. Attention-based bidirectional GRU networks for efficient HTTPS traffic classification. Information Sciences 541, (December 2020 ), 297\u2013315. DOI:https:\/\/doi.org\/10.1016\/j.ins.2020.05.035 10.1016\/j.ins.2020.05.035 Xun Liu, Junling You, Yulei Wu, Tong Li, Liangxiong Li, Zheyuan Zhang, and Jingguo Ge. 2020. Attention-based bidirectional GRU networks for efficient HTTPS traffic classification. Information Sciences 541, (December 2020), 297\u2013315. DOI:https:\/\/doi.org\/10.1016\/j.ins.2020.05.035"},{"key":"e_1_3_2_1_36_1","volume-title":"Multitask Learning for Network Traffic Classification. 2020 29th International Conference on Computer Communications and Networks (ICCCN) (August 2020","author":"Rezaei Shahbaz","year":"2020","unstructured":"Shahbaz Rezaei and Xin Liu . 2020 . Multitask Learning for Network Traffic Classification. 2020 29th International Conference on Computer Communications and Networks (ICCCN) (August 2020 ), 1\u20139. DOI:https:\/\/doi.org\/10.1109\/ICCCN49398.2020.9209652 10.1109\/ICCCN49398.2020.9209652 Shahbaz Rezaei and Xin Liu. 2020. Multitask Learning for Network Traffic Classification. 2020 29th International Conference on Computer Communications and Networks (ICCCN) (August 2020), 1\u20139. DOI:https:\/\/doi.org\/10.1109\/ICCCN49398.2020.9209652"},{"key":"e_1_3_2_1_37_1","volume-title":"DISTILLER: Encrypted traffic classification via multimodal multitask deep learning. Journal of Network and Computer Applications 183\u2013184, (June","author":"Aceto Giuseppe","year":"2021","unstructured":"Giuseppe Aceto , Domenico Ciuonzo , Antonio Montieri , and Antonio Pescap\u00e9 . 2021 . DISTILLER: Encrypted traffic classification via multimodal multitask deep learning. Journal of Network and Computer Applications 183\u2013184, (June 2021), 102985. DOI:https:\/\/doi.org\/10.1016\/j.jnca.2021.102985 10.1016\/j.jnca.2021.102985 Giuseppe Aceto, Domenico Ciuonzo, Antonio Montieri, and Antonio Pescap\u00e9. 2021. DISTILLER: Encrypted traffic classification via multimodal multitask deep learning. Journal of Network and Computer Applications 183\u2013184, (June 2021), 102985. DOI:https:\/\/doi.org\/10.1016\/j.jnca.2021.102985"},{"key":"e_1_3_2_1_38_1","unstructured":"Wireshark \u00b7 Go Deep. Retrieved January 19 2022 from https:\/\/www.wireshark.org\/  Wireshark \u00b7 Go Deep. Retrieved January 19 2022 from https:\/\/www.wireshark.org\/"},{"key":"e_1_3_2_1_39_1","volume-title":"5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings, OpenReview.net. Retrieved","author":"Lin Zhouhan","year":"2017","unstructured":"Zhouhan Lin , Minwei Feng , C\u00edcero Nogueira dos Santos , Mo Yu , Bing Xiang , Bowen Zhou , and Yoshua Bengio . 2017 . A Structured Self-Attentive Sentence Embedding . In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings, OpenReview.net. Retrieved January 19, 2022 from https:\/\/openreview.net\/forum?id=BJC\\_jUqxe Zhouhan Lin, Minwei Feng, C\u00edcero Nogueira dos Santos, Mo Yu, Bing Xiang, Bowen Zhou, and Yoshua Bengio. 2017. A Structured Self-Attentive Sentence Embedding. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings, OpenReview.net. Retrieved January 19, 2022 from https:\/\/openreview.net\/forum?id=BJC\\_jUqxe"}],"event":{"name":"ICMLT 2022: 2022 7th International Conference on Machine Learning Technologies","acronym":"ICMLT 2022","location":"Rome Italy"},"container-title":["2022 7th International Conference on Machine Learning Technologies (ICMLT)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529399.3529444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529399.3529444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:25Z","timestamp":1750188685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529399.3529444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,11]]},"references-count":39,"alternative-id":["10.1145\/3529399.3529444","10.1145\/3529399"],"URL":"https:\/\/doi.org\/10.1145\/3529399.3529444","relation":{},"subject":[],"published":{"date-parts":[[2022,3,11]]},"assertion":[{"value":"2022-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}