{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:43:41Z","timestamp":1760057021781,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","funder":[{"name":"NSFC","award":["62132009, 62221003"],"award-info":[{"award-number":["62132009, 62221003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3748496.3748992","type":"proceedings-article","created":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T13:21:07Z","timestamp":1755696067000},"page":"29-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Traffic Analysis and Recognition in Data Insufficient Scenarios"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5732-7459","authenticated-orcid":false,"given":"Sijiang","family":"Huang","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9413-4461","authenticated-orcid":false,"given":"Xiaohui","family":"Xie","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0478-7787","authenticated-orcid":false,"given":"Rui","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9036-9859","authenticated-orcid":false,"given":"Cong","family":"Li","sequence":"additional","affiliation":[{"name":"ICBC"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4557-3916","authenticated-orcid":false,"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[{"name":"ICBC"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9085-2247","authenticated-orcid":false,"given":"Mowei","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2035-6157","authenticated-orcid":false,"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5171-739X","authenticated-orcid":false,"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991123"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.009"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3495883"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.34"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 4171--4186","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 4171--4186."},{"volume-title":"International Conference on Information Systems Security and Privacy (ICISSP '16)","author":"Draper-Gil Gerard","key":"e_1_3_2_1_7_1","unstructured":"Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, and Ali A. Ghorbani. 2016. Characterization of Encrypted and VPN Traffic using Time-related Features. In International Conference on Information Systems Security and Privacy (ICISSP '16). 407--414."},{"key":"e_1_3_2_1_8_1","volume-title":"Why Does Unsupervised Pre-training Help Deep Learning? 11","author":"Erhan Dumitru","year":"2010","unstructured":"Dumitru Erhan, Yoshua Bengio, Aaron Courville, Pierre-Antoine Manzagol, Pascal Vincent, and Samy Bengio. 2010. Why Does Unsupervised Pre-training Help Deep Learning? 11 (2010), 625--660."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607206"},{"key":"e_1_3_2_1_11_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium (USENIX Security 16). 1187--1203."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_13_1","volume-title":"Zhi Guo Yang, and Xiang Ning Chen","author":"He Hong Ye","year":"2020","unstructured":"Hong Ye He, Zhi Guo Yang, and Xiang Ning Chen. 2020. PERT: Payload Encoding Representation from Transformer for Encrypted Traffic Classification. In 2020 ITU Kaleidoscope: Industry-Driven Digital Transformation (ITU K). 1--8."},{"key":"e_1_3_2_1_14_1","volume-title":"Advances in Neural Information Processing Systems","volume":"25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems, Vol. 25."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"e_1_3_2_1_16_1","volume-title":"FS-Net: A Flow Sequence Network For Encrypted Traffic Classification. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 1171--1179","author":"Liu Chang","year":"2019","unstructured":"Chang Liu, Longtao He, Gang Xiong, Zigang Cao, and Zhen Li. 2019. FS-Net: A Flow Sequence Network For Encrypted Traffic Classification. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 1171--1179."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.463.0441"},{"key":"e_1_3_2_1_19_1","unstructured":"Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga Alban Desmaison Andreas K\u00f6pf Edward Yang Zach DeVito Martin Raison Alykhan Tejani Sasank Chilamkurthy Benoit Steiner Lu Fang Junjie Bai and Soumith Chintala. 2019. PyTorch: an imperative style high-performance deep learning library."},{"key":"e_1_3_2_1_20_1","volume-title":"Ptu: Pre-Trained Model for Network Traffic Understanding. In 2024 IEEE 32nd International Conference on Network Protocols (ICNP). IEEE, 1--12","author":"Peng Lingfeng","year":"2024","unstructured":"Lingfeng Peng, Xiaohui Xie, Sijiang Huang, Ziyi Wang, and Yong Cui. 2024. Ptu: Pre-Trained Model for Network Traffic Understanding. In 2024 IEEE 32nd International Conference on Network Protocols (ICNP). IEEE, 1--12."},{"key":"e_1_3_2_1_21_1","first-page":"7","article-title":"Multilayer perceptron and neural networks","volume":"8","author":"Popescu Marius-Constantin","year":"2009","unstructured":"Marius-Constantin Popescu, Valentina E. Balas, Liliana Perescu-Popescu, and Nikos Mastorakis. 2009. Multilayer perceptron and neural networks. WSEAS Trans. Cir. and Sys. 8, 7 (July 2009), 579--588.","journal-title":"WSEAS Trans. Cir. and Sys."},{"volume-title":"IEEE INFOCOM 2009 - IEEE Conference on Computer Communications. 648--656","author":"Qi Y.","key":"e_1_3_2_1_22_1","unstructured":"Y. Qi, L. Xu, B. Yang, Y. Xue, and J. Li. 2009. Packet Classification Algorithms: From Theory to Practice. In IEEE INFOCOM 2009 - IEEE Conference on Computer Communications. 648--656."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Joaquin Quionero-Candela Masashi Sugiyama Anton Schwaighofer and Neil D. Lawrence. 2009. Dataset Shift in Machine Learning.","DOI":"10.7551\/mitpress\/9780262170055.001.0001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"D. E. Rumelhart G. E. Hinton and R. J. Williams. 1988. Learning internal representations by error propagation. 673--695.","DOI":"10.1016\/B978-1-4832-1446-7.50035-2"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700200"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP61940.2024.10858569"},{"key":"e_1_3_2_1_30_1","volume-title":"Hai Long Nguyen, and Francois Petitjean","author":"Webb Geoffrey I.","year":"2016","unstructured":"Geoffrey I. Webb, Roy Hyde, Hong Cao, Hai Long Nguyen, and Francois Petitjean. 2016. Characterizing concept drift. (2016), 964--994."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2940675"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583227"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25674"}],"event":{"name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Coimbra Portugal","acronym":"SIGCOMM '25"},"container-title":["Proceedings of the 1st Workshop on Next-Generation Network Observability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748496.3748992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T14:11:11Z","timestamp":1760019071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748496.3748992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":33,"alternative-id":["10.1145\/3748496.3748992","10.1145\/3748496"],"URL":"https:\/\/doi.org\/10.1145\/3748496.3748992","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}