{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:38Z","timestamp":1772164118078,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR Project","award":["No ANR-21-CE94-0001 (MINT)"],"award-info":[{"award-number":["No ANR-21-CE94-0001 (MINT)"]}]},{"name":"The F\u00e9d\u00e9ration Informatique de Lyon through the INTERFERE Project"},{"name":"Chicago Collaborating in the Sciences Program"},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2124393"],"award-info":[{"award-number":["CNS-2124393"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,10]]},"DOI":"10.1145\/3652963.3655071","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T18:21:15Z","timestamp":1717266075000},"page":"85-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1652-8419","authenticated-orcid":false,"given":"Xi","family":"Jiang","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6170-2167","authenticated-orcid":false,"given":"Shinan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3771-7876","authenticated-orcid":false,"given":"Aaron","family":"Gember-Jacobson","sequence":"additional","affiliation":[{"name":"Colgate University, Hamilton, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2803-5649","authenticated-orcid":false,"given":"Arjun Nitin","family":"Bhagoji","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2156-5305","authenticated-orcid":false,"given":"Paul","family":"Schmitt","sequence":"additional","affiliation":[{"name":"University of Hawaii, Manoa \/ Invisv, Honolulu, HI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4447-960X","authenticated-orcid":false,"given":"Francesco","family":"Bronzino","sequence":"additional","affiliation":[{"name":"Univ Lyon, EnsL, UCBL, CNRS, LIP, Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-5201","authenticated-orcid":false,"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jay Beale Angela Orebaugh and Gilbert Ramirez. 2006. Wireshark & Ethereal network protocol analyzer toolkit. Elsevier."},{"key":"e_1_3_2_1_2_1","volume-title":"Gorby Kabasele Ndonda, and Ramin Sadre","author":"De Keersmaeker Francc","year":"2023","unstructured":"Francc ois De Keersmaeker, Yinan Cao, Gorby Kabasele Ndonda, and Ramin Sadre. 2023. A Survey of Public IoT Datasets for Network Security Research. IEEE Communications Surveys & Tutorials (2023)."},{"key":"e_1_3_2_1_3_1","unstructured":"Tcpreplay Developers. 2023. Tcpreplay. https:\/\/tcpreplay.appneta.com\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639037"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_2_1_6_1","volume-title":"2018 international conference on networking, embedded and wireless systems (ICNEWS). IEEE, 1--5.","author":"Rohith R","year":"2018","unstructured":"R Rohith, Minal Moharir, G Shobha, et al. 2018. SCAPY-A powerful interactive packet manipulation program. In 2018 international conference on networking, embedded and wireless systems (ICNEWS). IEEE, 1--5."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_8_1","volume-title":"International conference on machine learning. PMLR, 2256--2265","author":"Sohl-Dickstein Jascha","year":"2015","unstructured":"Jascha Sohl-Dickstein, Eric Weiss, Niru Maheswaranathan, and Surya Ganguli. 2015. Deep unsupervised learning using nonequilibrium thermodynamics. In International conference on machine learning. PMLR, 2256--2265."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87839-9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544251"},{"key":"e_1_3_2_1_11_1","volume-title":"MTT: an model for encrypted network traffic classification using multi-task transformer. Applied Intelligence","author":"Zheng Weiping","year":"2022","unstructured":"Weiping Zheng, Jianhao Zhong, Qizhi Zhang, and Gansen Zhao. 2022. MTT: an model for encrypted network traffic classification using multi-task transformer. Applied Intelligence (2022), 1--16. io"}],"event":{"name":"SIGMETRICS\/PERFORMANCE '24: ACM SIGMETRICS\/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems","location":"Venice Italy","acronym":"SIGMETRICS\/PERFORMANCE '24","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Abstracts of the 2024 ACM SIGMETRICS\/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652963.3655071","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652963.3655071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:17:58Z","timestamp":1750281478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652963.3655071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,10]]},"references-count":11,"alternative-id":["10.1145\/3652963.3655071","10.1145\/3652963"],"URL":"https:\/\/doi.org\/10.1145\/3652963.3655071","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3673660.3655071","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2024,6,10]]},"assertion":[{"value":"2024-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}