{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T16:32:22Z","timestamp":1754152342046,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,7]]},"DOI":"10.1145\/3735358.3737756","type":"proceedings-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T23:08:27Z","timestamp":1752793707000},"page":"261-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Graph-Based Encrypted Malicious Traffic Detection Under Flow Distribution Drift With Flow Sampling"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8883-9865","authenticated-orcid":false,"given":"Yunpeng","family":"Tan","sequence":"first","affiliation":[{"name":"Peking University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0552-865X","authenticated-orcid":false,"given":"Qingyang","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0700-8299","authenticated-orcid":false,"given":"Mingxin","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, BeiJing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0484-5951","authenticated-orcid":false,"given":"Xinggong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, BeiJing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Chuanpu Fu Qi Li and Ke Xu. 2023. Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2301.13686 (2023)."},{"key":"e_1_3_3_1_3_2","first-page":"1771","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Hsieh Kevin","year":"2024","unstructured":"Kevin Hsieh, Mike Wong, Santiago Segarra, Sathiya\u00a0Kumaran Mani, Trevor Eberl, Anatoliy Panasyuk, Ravi Netravali, Ranveer Chandra, and Srikanth Kandula. 2024. { NetVigil} : Robust and { Low-Cost} Anomaly Detection for { East-West} Data Center Security. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 1771\u20131789."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"e_1_3_3_1_5_2","unstructured":"Zscaler. 2024. ThreatLabz 2024 Encrypted Attacks Report. https:\/\/www.zscaler.com\/campaign\/threatlabz-encrypted-attacks-report 2025-03-13."}],"event":{"name":"APNET 2025: The 9th Asia-Pacific Workshop on Networking","acronym":"APNET 2025","location":"Shang Hai China"},"container-title":["Proceedings of the 9th Asia-Pacific Workshop on Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3735358.3737756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T05:10:30Z","timestamp":1753161030000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3735358.3737756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,6]]},"references-count":4,"alternative-id":["10.1145\/3735358.3737756","10.1145\/3735358"],"URL":"https:\/\/doi.org\/10.1145\/3735358.3737756","relation":{},"subject":[],"published":{"date-parts":[[2025,8,6]]},"assertion":[{"value":"2025-08-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}