{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:24:09Z","timestamp":1759335849710,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,21]]},"DOI":"10.1145\/3690407.3690459","type":"proceedings-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T18:55:28Z","timestamp":1729796128000},"page":"306-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Network Traffic Classification Based on Multilevel Spatiotemporal Feature Fusion Enhancement"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5342-7577","authenticated-orcid":false,"given":"Yu","family":"Zhang","sequence":"first","affiliation":[{"name":"Xinjiang University, Urumqi, Xinjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6671-0206","authenticated-orcid":false,"given":"Zhenhong","family":"Jia","sequence":"additional","affiliation":[{"name":"Xinjiang University, Urumqi, Xinjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8302-6529","authenticated-orcid":false,"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[{"name":"Xinjiang University, Urumqi, Xinjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8023-4119","authenticated-orcid":false,"given":"Xiaoyi","family":"Lu","sequence":"additional","affiliation":[{"name":"Xinjiang University, Urumqi, Xinjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1144-6564","authenticated-orcid":false,"given":"Fei","family":"Shi","sequence":"additional","affiliation":[{"name":"Xinjiang University, Urumqi, Xinjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8390-5510","authenticated-orcid":false,"given":"Gang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Xinjiang University, Urumqi, Xinjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0219-4051","authenticated-orcid":false,"given":"Jiajia","family":"Wang","sequence":"additional","affiliation":[{"name":"Xinjiang University, Urumqi, Xinjiang, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,24]]},"reference":[{"issue":"2","key":"e_1_3_3_1_1_2","first-page":"375","article-title":"A Bitcoin Transaction Analyzing and Tracking Mechanism in Specified Network Zone[J]","volume":"40","author":"Huang D","year":"2024","unstructured":"Huang D, Chen C, Luo H, et al. A Bitcoin Transaction Analyzing and Tracking Mechanism in Specified Network Zone[J]. Journal of Information Science and Engineering, vol. 40, no. 2, pp. 375-396, 2024.","journal-title":"Journal of Information Science and Engineering"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3233793"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-023-01353-0"},{"key":"e_1_3_3_1_4_2","first-page":"1","volume-title":"Network traffic classification in encrypted environment: a case study of google hangout[C]\/\/national conference on communications","author":"Datta J","year":"2015","unstructured":"Datta J, Kataria N, Hubballi N. Network traffic classification in encrypted environment: a case study of google hangout[C]\/\/national conference on communications, pp. 1-6, 2015."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.12.004"},{"key":"e_1_3_3_1_6_2","first-page":"23","volume-title":"Network and Distributed System Security Symposium","volume":"27","author":"Thijs van Ede","year":"2020","unstructured":"Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, and et al. Flow-Print: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic [J]. Network and Distributed System Security Symposium, vol. 27, pp. 23-26, 2020."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"issue":"5","key":"e_1_3_3_1_8_2","first-page":"74","article-title":"A Novel Classification Scheme of Encrypted Traffic Based on Flow Spatio-temporal Features for Efficient Management of IIoT[J]","volume":"190","author":"Lin K","year":"2021","unstructured":"Lin K, Xu X, Gao H. TSCRNN: A Novel Classification Scheme of Encrypted Traffic Based on Flow Spatio-temporal Features for Efficient Management of IIoT[J]. Computer Networks, vol. 190, no. 5, pp. 74-79, 2021.","journal-title":"Computer Networks"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_3_1_10_2","first-page":"1179","volume-title":"FS-Net: A Flow Sequence Network For Encrypted Traffic Classification[C]\/\/Conference on Computer Communications","author":"Chang Liu","year":"2019","unstructured":"Chang Liu, Longtao He, Gang Xiong, Zigang Cao, and Zhen Li. 2019. FS-Net: A Flow Sequence Network For Encrypted Traffic Classification[C]\/\/Conference on Computer Communications, pp. 1171\u20131179, 2019."},{"key":"e_1_3_3_1_11_2","first-page":"8","volume-title":"Zhi Guo Yang, and Xiang Ning Chen. PERT: Payload Encoding Representation from Transformer for Encrypted Traffic Classification[C]\/\/ In 2020 ITU Kaleidoscope: Industry-Driven Digital Transformation","author":"Hong Ye He","year":"2020","unstructured":"Hong Ye He, Zhi Guo Yang, and Xiang Ning Chen. PERT: Payload Encoding Representation from Transformer for Encrypted Traffic Classification[C]\/\/ In 2020 ITU Kaleidoscope: Industry-Driven Digital Transformation, pp. 1\u20138, 2020."},{"key":"e_1_3_3_1_12_2","first-page":"633","volume-title":"ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification [C]\/\/Proceedings of the ACM Web Conference","author":"Lin X","year":"2023","unstructured":"Lin X, Xiong G, Gou G, et al. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification [C]\/\/Proceedings of the ACM Web Conference, pp. 633-642, 2023."},{"issue":"3","key":"e_1_3_3_1_13_2","first-page":"118","article-title":"Semi-supervised encrypted traffic classification with deep convolutional generative adversarial networks [J]","volume":"8","author":"Iliyasu A S","year":"2019","unstructured":"Iliyasu A S, Deng H. Semi-supervised encrypted traffic classification with deep convolutional generative adversarial networks [J]. IEEE Access, vol. 8, no. 3, pp. 118-126, 2019.","journal-title":"IEEE Access"}],"event":{"name":"CAIBDA 2024: 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms","acronym":"CAIBDA 2024","location":"Zhengzhou China"},"container-title":["Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690459","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690407.3690459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:37Z","timestamp":1750295377000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":13,"alternative-id":["10.1145\/3690407.3690459","10.1145\/3690407"],"URL":"https:\/\/doi.org\/10.1145\/3690407.3690459","relation":{},"subject":[],"published":{"date-parts":[[2024,6,21]]},"assertion":[{"value":"2024-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}