{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:32:46Z","timestamp":1768426366338,"version":"3.49.0"},"reference-count":70,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T00:00:00Z","timestamp":1659139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2022,7,30]]},"abstract":"<jats:p>The recent success of Artificial Intelligence (AI) is rooted into several concomitant factors, namely theoretical progress coupled with abundance of data and computing power. Large companies can take advantage of a deluge of data, typically withhold from the research community due to privacy or business sensitivity concerns, and this is particularly true for networking data. Therefore, the lack of high quality data is often recognized as one of the main factors currently limiting networking research from fully leveraging AI methodologies potential.<\/jats:p>\n          <jats:p>Following numerous requests we received from the scientific community, we release AppClassNet, a commercial-grade dataset for benchmarking traffic classification and management methodologies. AppClassNet is significantly larger than the datasets generally available to the academic community in terms of both the number of samples and classes, and reaches scales similar to the popular ImageNet dataset commonly used in computer vision literature. To avoid leaking user- and business-sensitive information, we opportunely anonymized the dataset, while empirically showing that it still represents a relevant benchmark for algorithmic research. In this paper, we describe the public dataset and our anonymization process. We hope that AppClassNet can be instrumental for other researchers to address more complex commercial-grade problems in the broad field of traffic classification and management.<\/jats:p>","DOI":"10.1145\/3561954.3561958","type":"journal-article","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T22:12:57Z","timestamp":1662502377000},"page":"19-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["AppClassNet"],"prefix":"10.1145","volume":"52","author":[{"given":"Chao","family":"Wang","sequence":"first","affiliation":[{"name":"Huawei Technologies France SASU"}]},{"given":"Alessandro","family":"Finamore","sequence":"additional","affiliation":[{"name":"Huawei Technologies France SASU"}]},{"given":"Lixuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Huawei Technologies France SASU"}]},{"given":"Kevin","family":"Fauvel","sequence":"additional","affiliation":[{"name":"Huawei Technologies France SASU"}]},{"given":"Dario","family":"Rossi","sequence":"additional","affiliation":[{"name":"Huawei Technologies France SASU"}]}],"member":"320","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"https:\/\/www.image-net.org\/download.php.  https:\/\/www.image-net.org\/download.php."},{"key":"e_1_2_2_2_1","unstructured":"https:\/\/commoncrawl.org\/.  https:\/\/commoncrawl.org\/."},{"key":"e_1_2_2_3_1","unstructured":"https:\/\/recon.meddle.mobi\/cross-market.html.  https:\/\/recon.meddle.mobi\/cross-market.html."},{"key":"e_1_2_2_4_1","unstructured":"https:\/\/wand.net.nz\/projects\/details\/libprotoident.  https:\/\/wand.net.nz\/projects\/details\/libprotoident."},{"key":"e_1_2_2_5_1","unstructured":"https:\/\/sourceforge.net\/projects\/l7-filter\/.  https:\/\/sourceforge.net\/projects\/l7-filter\/."},{"key":"e_1_2_2_6_1","unstructured":"https:\/\/github.com\/ntop\/nDPI.  https:\/\/github.com\/ntop\/nDPI."},{"key":"e_1_2_2_7_1","unstructured":"https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/network-based-application-recognition-nbar\/index.html.  https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/network-based-application-recognition-nbar\/index.html."},{"key":"e_1_2_2_8_1","unstructured":"https:\/\/www.ipoque.com\/products\/dpi-engine-rs-pace-2-for-application-awareness.  https:\/\/www.ipoque.com\/products\/dpi-engine-rs-pace-2-for-application-awareness."},{"key":"e_1_2_2_9_1","unstructured":"https:\/\/support.huawei.com\/enterprise\/de\/doc\/EDOC1000012889?section=j00c.  https:\/\/support.huawei.com\/enterprise\/de\/doc\/EDOC1000012889?section=j00c."},{"key":"e_1_2_2_10_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/General_Data_Protection_Regulation.  https:\/\/en.wikipedia.org\/wiki\/General_Data_Protection_Regulation."},{"key":"e_1_2_2_11_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Personal_Information_Protection_Law_of_the_People's_Republic_of_China.  https:\/\/en.wikipedia.org\/wiki\/Personal_Information_Protection_Law_of_the_People's_Republic_of_China."},{"key":"e_1_2_2_12_1","unstructured":"https:\/\/figshare.com\/articles\/dataset\/AppClassNet_-_A_commercial-grade_dataset_for_application_identification_research\/20375580.  https:\/\/figshare.com\/articles\/dataset\/AppClassNet_-_A_commercial-grade_dataset_for_application_identification_research\/20375580."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2019.8888137"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506558"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298327"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"e_1_2_2_19_1","volume-title":"Machine unlearning. arXiv preprint arXiv:1912.03817","author":"Bourtoule Lucas","year":"2019","unstructured":"Lucas Bourtoule , Varun Chandrasekaran , Christopher A Choquette-Choo , Hengrui Jia , Adelin Travers , Baiwu Zhang , David Lie , and Nicolas Papernot . Machine unlearning. arXiv preprint arXiv:1912.03817 , 2019 . Lucas Bourtoule, Varun Chandrasekaran, Christopher A Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, and Nicolas Papernot. Machine unlearning. arXiv preprint arXiv:1912.03817, 2019."},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"e_1_2_2_21_1","volume-title":"IFIP Traffic Monitoring and Analysis (TMA)","author":"Bovenzi Giampaolo","year":"2021","unstructured":"Giampaolo Bovenzi , Lixuan Yang , Alessandro Finamore , Giuseppe Aceto , Domenico Ciuonzo , Antonio Pescape , and Dario Rossi . A first look at class incremental learning in deep learning mobile traffic . In IFIP Traffic Monitoring and Analysis (TMA) , 2021 . Giampaolo Bovenzi, Lixuan Yang, Alessandro Finamore, Giuseppe Aceto, Domenico Ciuonzo, Antonio Pescape, and Dario Rossi. A first look at class incremental learning in deep learning mobile traffic. In IFIP Traffic Monitoring and Analysis (TMA), 2021."},{"key":"e_1_2_2_22_1","first-page":"45","article-title":"Random forests","author":"Breiman L.","year":"2001","unstructured":"L. Breiman . Random forests . Machine Learning , 45 , 2001 . L. Breiman. Random forests. Machine Learning, 45, 2001.","journal-title":"Machine Learning"},{"key":"e_1_2_2_23_1","volume-title":"Classification and Regression Trees","author":"Breiman L.","year":"1984","unstructured":"L. Breiman , J. Friedman , C.J. Stone , and R.A. Olshen . Classification and Regression Trees . Taylor & Francis , 1984 . L. Breiman, J. Friedman, C.J. Stone, and R.A. Olshen. Classification and Regression Trees. Taylor & Francis, 1984."},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"e_1_2_2_25_1","volume-title":"Neuracrypt is not private. CoRR, abs\/2108.07256","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini , Sanjam Garg , Somesh Jha , Saeed Mahloujifar , Mohammad Mahmoody , and Florian Tram\u00e8r . Neuracrypt is not private. CoRR, abs\/2108.07256 , 2021 . Nicholas Carlini, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Florian Tram\u00e8r. Neuracrypt is not private. CoRR, abs\/2108.07256, 2021."},{"key":"e_1_2_2_26_1","first-page":"1597","volume-title":"International conference on machine learning","author":"Chen Ting","year":"2020","unstructured":"Ting Chen , Simon Kornblith , Mohammad Norouzi , and Geoffrey Hinton . A simple framework for contrastive learning of visual representations . In International conference on machine learning , pages 1597 -- 1607 . PMLR, 2020 . Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. A simple framework for contrastive learning of visual representations. In International conference on machine learning, pages 1597--1607. PMLR, 2020."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398784"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3322706.3361996"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796677"},{"key":"e_1_2_2_32_1","volume-title":"ACM\/IEEE Symposium on Edge Computing (SEC)","author":"Gallo Massimo","year":"2021","unstructured":"Massimo Gallo , Alessandro Finamore , Gwendal Simon , and Dario Rossi . Fenxi : Deep-learning traffic analytics at the edge . ACM\/IEEE Symposium on Edge Computing (SEC) , 2021 . Massimo Gallo, Alessandro Finamore, Gwendal Simon, and Dario Rossi. Fenxi: Deep-learning traffic analytics at the edge. ACM\/IEEE Symposium on Edge Computing (SEC), 2021."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3086952"},{"key":"e_1_2_2_34_1","volume-title":"Acm code of ethics and professional conduct","author":"Gotterbarn DW","year":"2018","unstructured":"DW Gotterbarn , Bo Brinkman , Catherine Flick , Michael S Kirkpatrick , Keith Miller , Kate Vazansky , and Marty J Wolf . Acm code of ethics and professional conduct . 2018 . DW Gotterbarn, Bo Brinkman, Catherine Flick, Michael S Kirkpatrick, Keith Miller, Kate Vazansky, and Marty J Wolf. Acm code of ethics and professional conduct. 2018."},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629607.1629610"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_2_37_1","first-page":"4507","volume-title":"Proceedings of the 37th International Conference on Machine Learning","volume":"119","author":"Huang Yangsibo","year":"2020","unstructured":"Yangsibo Huang , Zhao Song , Kai Li , and Sanjeev Arora . InstaHide : Instance-hiding schemes for private distributed learning . In Proceedings of the 37th International Conference on Machine Learning , volume 119 , pages 4507 -- 4518 , Jul 2020 . Yangsibo Huang, Zhao Song, Kai Li, and Sanjeev Arora. InstaHide: Instance-hiding schemes for private distributed learning. In Proceedings of the 37th International Conference on Machine Learning, volume 119, pages 4507--4518, Jul 2020."},{"key":"e_1_2_2_38_1","volume-title":"NeurIPS Workshop on Private Multi-Party Machine Learning","author":"Kone\u010dn\u1ef3 Jakub","year":"2016","unstructured":"Jakub Kone\u010dn\u1ef3 , H Brendan McMahan , Felix X Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh , and Dave Bacon . Federated learning : Strategies for improving communication efficiency . In NeurIPS Workshop on Private Multi-Party Machine Learning , 2016 . Jakub Kone\u010dn\u1ef3, H Brendan McMahan, Felix X Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. Federated learning: Strategies for improving communication efficiency. In NeurIPS Workshop on Private Multi-Party Machine Learning, 2016."},{"key":"e_1_2_2_39_1","first-page":"3","volume-title":"IEEE International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)","author":"Lindorfer Martina","year":"2014","unstructured":"Martina Lindorfer , Matthias Neugschwandtner , Lukas Weichselbaum , Yanick Fratantonio , Victor Van Der Veen , and Christian Platzer . Andrubis-1,000,000 apps later : A view on current android malware behaviors . In IEEE International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) , pages 3 -- 17 , 2014 . Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor Van Der Veen, and Christian Platzer. Andrubis-1,000,000 apps later: A view on current android malware behaviors. In IEEE International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pages 3--17, 2014."},{"key":"e_1_2_2_40_1","volume-title":"Dp-image: Differential privacy for image data in feature space","author":"Liu Bo","year":"2021","unstructured":"Bo Liu , Ming Ding , Hanyu Xue , Tianqing Zhu , Dayong Ye , Li Song , and Wanlei Zhou . Dp-image: Differential privacy for image data in feature space , 2021 . Bo Liu, Ming Ding, Hanyu Xue, Tianqing Zhu, Dayong Ye, Li Song, and Wanlei Zhou. Dp-image: Differential privacy for image data in feature space, 2021."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"e_1_2_2_42_1","volume-title":"Ramin Shirali Hossein Zade, and Mohammdsadegh Saberian. Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing, 24(3)","author":"Lotfollahi Mohammad","year":"2020","unstructured":"Mohammad Lotfollahi , Mahdi Jafari Siavoshani , Ramin Shirali Hossein Zade, and Mohammdsadegh Saberian. Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing, 24(3) , 2020 . Mohammad Lotfollahi, Mahdi Jafari Siavoshani, Ramin Shirali Hossein Zade, and Mohammdsadegh Saberian. Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing, 24(3), 2020."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243809"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322122"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_2_2_48_1","first-page":"1","volume-title":"IEEE Communications Surveys and Tutorials","author":"Pacheco F.","year":"2018","unstructured":"F. Pacheco , E. Exposito , M. Gineste , C. Baudoin , and J. Aguilar . Towards the deployment of machine learning solutions in network traffic classification: A systematic survey . IEEE Communications Surveys and Tutorials , pages 1 -- 1 , 2018 . F. Pacheco, E. Exposito, M. Gineste, C. Baudoin, and J. Aguilar. Towards the deployment of machine learning solutions in network traffic classification: A systematic survey. IEEE Communications Surveys and Tutorials, pages 1--1, 2018."},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485259"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_2_51_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","volume":"10","author":"Ren Jingjing","year":"2018","unstructured":"Jingjing Ren , Martina Lindorfer , Daniel J Dubois , Ashwin Rao , David Choffnes , and Narseo Vallina-Rodriguez . A longitudinal study of PII leaks across android app versions . In Network and Distributed System Security Symposium (NDSS) , volume 10 , 2018 . Jingjing Ren, Martina Lindorfer, Daniel J Dubois, Ashwin Rao, David Choffnes, and Narseo Vallina-Rodriguez. A longitudinal study of PII leaks across android app versions. In Network and Distributed System Security Symposium (NDSS), volume 10, 2018."},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"e_1_2_2_55_1","volume-title":"Tabular data: Deep learning is not all you need. CoRR, abs\/2106.03253","author":"Shwartz-Ziv Ravid","year":"2021","unstructured":"Ravid Shwartz-Ziv and Amitai Armon . Tabular data: Deep learning is not all you need. CoRR, abs\/2106.03253 , 2021 . Ravid Shwartz-Ziv and Amitai Armon. Tabular data: Deep learning is not all you need. CoRR, abs\/2106.03253, 2021."},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2873134"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"e_1_2_2_58_1","volume-title":"Encrypted network traffic classification using self-supervised learning","author":"Towhid Md Shamim","year":"2022","unstructured":"Md Shamim Towhid and Nashid Shahriar . Encrypted network traffic classification using self-supervised learning . In IEEE NetSoft , 2022 . Md Shamim Towhid and Nashid Shahriar. Encrypted network traffic classification using self-supervised learning. In IEEE NetSoft, 2022."},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"e_1_2_2_60_1","volume-title":"Split learning for health: Distributed deep learning without sharing raw patient data. CoRR, abs\/1812.00564","author":"Vepakomma Praneeth","year":"2018","unstructured":"Praneeth Vepakomma , Otkrist Gupta , Tristan Swedish , and Ramesh Raskar . Split learning for health: Distributed deep learning without sharing raw patient data. CoRR, abs\/1812.00564 , 2018 . Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. Split learning for health: Distributed deep learning without sharing raw patient data. CoRR, abs\/1812.00564, 2018."},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3155133.3155175"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"key":"e_1_2_2_65_1","volume-title":"BlackHat USA","author":"Wang Zhanyi","year":"2015","unstructured":"Zhanyi Wang . The applications of deep learning on traffic identification . BlackHat USA , 2015 . Zhanyi Wang. The applications of deep learning on traffic identification. BlackHat USA, 2015."},{"key":"e_1_2_2_66_1","first-page":"280","volume-title":"IEEE International Conference on Network Protocols (ICNP)","author":"Xu Jun","year":"2002","unstructured":"Jun Xu , Jinliang Fan , Mostafa H Ammar , and Sue B Moon . Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme . In IEEE International Conference on Network Protocols (ICNP) , pages 280 -- 289 . IEEE, 2002 . Jun Xu, Jinliang Fan, Mostafa H Ammar, and Sue B Moon. Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In IEEE International Conference on Network Protocols (ICNP), pages 280--289. IEEE, 2002."},{"key":"e_1_2_2_67_1","volume-title":"Neuracrypt: Hiding private health data via random neural networks for public training","author":"Yala Adam","year":"2021","unstructured":"Adam Yala , Homa Esfahanizadeh , Rafael G. L. D' Oliveira , Ken R. Duffy , Manya Ghobadi , Tommi S. Jaakkola , Vinod Vaikuntanathan , Regina Barzilay , and Muriel Medard . Neuracrypt: Hiding private health data via random neural networks for public training , 2021 . Adam Yala, Homa Esfahanizadeh, Rafael G. L. D' Oliveira, Ken R. Duffy, Manya Ghobadi, Tommi S. Jaakkola, Vinod Vaikuntanathan, Regina Barzilay, and Muriel Medard. Neuracrypt: Hiding private health data via random neural networks for public training, 2021."},{"key":"e_1_2_2_68_1","volume-title":"Syfer: Neural obfuscation for private data release","author":"Yala Adam","year":"2022","unstructured":"Adam Yala , Victor Quach , Homa Esfahanizadeh , Rafael G. L. D'Oliveira , Ken R. Duffy , Muriel M\u00e9dard , Tommi S. Jaakkola , and Regina Barzilay . Syfer: Neural obfuscation for private data release , 2022 . Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel M\u00e9dard, Tommi S. Jaakkola, and Regina Barzilay. Syfer: Neural obfuscation for private data release, 2022."},{"key":"e_1_2_2_69_1","volume-title":"IJCAI Workshop on Federated Learning","author":"Yang Lixuan","year":"2020","unstructured":"Lixuan Yang , Cedric Beliard , and Dario Rossi . Heterogeneous data-aware federated learning . In IJCAI Workshop on Federated Learning , 2020 . Lixuan Yang, Cedric Beliard, and Dario Rossi. Heterogeneous data-aware federated learning. In IJCAI Workshop on Federated Learning, 2020."},{"key":"e_1_2_2_70_1","first-page":"18","article-title":"Deep learning and zero-day traffic classification: Lessons learned from a commercial-grade dataset","author":"Yang Lixuan","year":"2021","unstructured":"Lixuan Yang , Alessandro Finamore , Jun Feng , and Dario Rossi . Deep learning and zero-day traffic classification: Lessons learned from a commercial-grade dataset . IEEE Transactions on Network and Service Management , 18 , 2021 . Lixuan Yang, Alessandro Finamore, Jun Feng, and Dario Rossi. Deep learning and zero-day traffic classification: Lessons learned from a commercial-grade dataset. IEEE Transactions on Network and Service Management, 18, 2021.","journal-title":"IEEE Transactions on Network and Service Management"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3561954.3561958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3561954.3561958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:07Z","timestamp":1750182547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3561954.3561958"}},"subtitle":["a commercial-grade dataset for application identification research"],"short-title":[],"issued":{"date-parts":[[2022,7,30]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,7,30]]}},"alternative-id":["10.1145\/3561954.3561958"],"URL":"https:\/\/doi.org\/10.1145\/3561954.3561958","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7,30]]},"assertion":[{"value":"2022-09-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}