{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:12:20Z","timestamp":1767183140348,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1006100"],"award-info":[{"award-number":["2020YFB1006100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,13]]},"DOI":"10.23919\/ifipnetworking55013.2022.9829771","type":"proceedings-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T16:42:14Z","timestamp":1658508134000},"page":"1-9","source":"Crossref","is-referenced-by-count":12,"title":["Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification"],"prefix":"10.23919","author":[{"given":"Jingyu","family":"Guo","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Scences"}]},{"given":"Mingxin","family":"Cui","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Scences"}]},{"given":"Chengshang","family":"Hou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Scences"}]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Scences"}]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Scences"}]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Scences"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Scences"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2074"},{"key":"ref10","article-title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks","author":"wei","year":"0","journal-title":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI) ISI"},{"key":"ref11","article-title":"Malware traffic classification using convolutional neural network for representation learning","author":"wei","year":"0","journal-title":"2017 International Conference on Information Networking (ICOIN)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref13","article-title":"Unsupervised traffic flow classification using a neural autoencoder","author":"hchst","year":"0","journal-title":"2017 IEEE 42nd Conference on Local Computer Networks (LCN)"},{"key":"ref14","article-title":"Deep packet: A novel approach for encrypted traffic classification using deep learning","author":"lotfollahi","year":"2017","journal-title":"Soft Computing"},{"key":"ref15","article-title":"Self-attentive deep learning method for online traffic classification and its interpretability","author":"gxa","year":"2021","journal-title":"Computer Networks"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108472"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162891"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962106"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3078745"},{"key":"ref28","article-title":"Deep rein- forcement learning with relational inductive biases","author":"zambaldi","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1407"},{"key":"ref3","first-page":"1","article-title":"A survey of deep metalearning","author":"huisman","year":"2021","journal-title":"Artificial Intelligence Review"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"ref29","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2991876"},{"key":"ref8","first-page":"412","article-title":"Learning a nonlinear embedding by preserving class neighbourhood structure","volume":"2","author":"salakhutdinov","year":"2007","journal-title":"Journal of Machine Learning Research"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380090"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref9","article-title":"Recent advances in deep learning: An overview","author":"minar","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref1","first-page":"35","article-title":"Issues and future directions In traffic classification","volume":"26","author":"pescape","year":"2012","journal-title":"IEEE Network The Magazine of Computer Communications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3081504"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3005724"},{"key":"ref24","first-page":"3630","article-title":"Matching networks for one shot learning","volume":"29","author":"vinyals","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref23","article-title":"Siamese neural networks for one-shot image recognition","volume":"2","author":"koch","year":"0","journal-title":"ICML Deep Learning Workshop"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"ref25","first-page":"4080","article-title":"Prototypical networks for few-shot learning","author":"snell","year":"0","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems"}],"event":{"name":"2022 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2022,6,13]]},"location":"Catania, Italy","end":{"date-parts":[[2022,6,16]]}},"container-title":["2022 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9829715\/9829755\/09829771.pdf?arnumber=9829771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:50:14Z","timestamp":1661809814000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9829771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,13]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking55013.2022.9829771","relation":{},"subject":[],"published":{"date-parts":[[2022,6,13]]}}}