{"id":"https://openalex.org/W7147394250","doi":"https://doi.org/10.1109/cnml68938.2026.11453232","title":"A Lightweight GBM Based Approach for Dynamic QoS Management in Embedded Systems","display_name":"A Lightweight GBM Based Approach for Dynamic QoS Management in Embedded Systems","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147394250","doi":"https://doi.org/10.1109/cnml68938.2026.11453232"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11453232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11453232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011410684","display_name":"Rukai Liu","orcid":"https://orcid.org/0009-0005-7397-998X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210155932","display_name":"Changhong (China)","ror":"https://ror.org/04tttpd30","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210155932"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rukai Liu","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Integrated Circuits,China","Sichuan Changhong Network Technologies Co., Ltd.,Chengdu,China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Integrated Circuits,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Sichuan Changhong Network Technologies Co., Ltd.,Chengdu,China","institution_ids":["https://openalex.org/I4210155932"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100354225","display_name":"Cheng Li","orcid":"https://orcid.org/0000-0001-6110-8099"},"institutions":[{"id":"https://openalex.org/I4210155932","display_name":"Changhong (China)","ror":"https://ror.org/04tttpd30","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210155932"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Li","raw_affiliation_strings":["Shanghai Jiao Tong University,Sichuan Changhong Network Technologies Co., Ltd.,Chengdu,China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Sichuan Changhong Network Technologies Co., Ltd.,Chengdu,China","institution_ids":["https://openalex.org/I4210155932"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132627997","display_name":"Liang Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Qian","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Integrated Circuits,China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Integrated Circuits,China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126213362","display_name":"Ruifeng Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210155932","display_name":"Changhong (China)","ror":"https://ror.org/04tttpd30","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210155932"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruifeng Liu","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Integrated Circuits,China","Sichuan Changhong Network Technologies Co., Ltd.,Chengdu,China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Integrated Circuits,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Sichuan Changhong Network Technologies Co., Ltd.,Chengdu,China","institution_ids":["https://openalex.org/I4210155932"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5132711250","display_name":"Rui Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Yang","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Integrated Circuits,China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Integrated Circuits,China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011410684"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I4210155932"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.94484848,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1081","last_page":"1086"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.00860000029206276,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.007799999788403511,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6133999824523926},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5999000072479248},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5393000245094299},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5090000033378601},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5067999958992004},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.48260000348091125},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43880000710487366},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.3898000121116638},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3847000002861023}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7488999962806702},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6133999824523926},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5999000072479248},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5393000245094299},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5134999752044678},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5090000033378601},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5067999958992004},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.48260000348091125},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47519999742507935},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45399999618530273},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43880000710487366},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.3898000121116638},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3847000002861023},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.3797000050544739},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.3788999915122986},{"id":"https://openalex.org/C207512268","wikidata":"https://www.wikidata.org/wiki/Q3074551","display_name":"Traffic flow (computer networking)","level":2,"score":0.3659000098705292},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.35569998621940613},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3346000015735626},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.3255000114440918},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3197000026702881},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.3174999952316284},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3084000051021576},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27869999408721924},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.2637999951839447},{"id":"https://openalex.org/C140781008","wikidata":"https://www.wikidata.org/wiki/Q1221081","display_name":"Service quality","level":3,"score":0.26030001044273376},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11453232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11453232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5117628574371338},{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.41902658343315125}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2963516518","https://openalex.org/W3010162966","https://openalex.org/W4296229353","https://openalex.org/W4388972011"],"related_works":[],"abstract_inverted_index":{"Network":[0],"traffic":[1,36,52,88,156,170,193],"identification":[2,166],"and":[3,14,32,44,61,69,97,109,112,122,138,195],"classification":[4,89,150],"play":[5],"a":[6,85,98,114,149,187],"crucial":[7],"role":[8],"in":[9,57,65,73],"network":[10,35,198],"management,":[11],"security":[12],"monitoring,":[13],"quality":[15],"of":[16,23,152],"service":[17],"assurance.":[18],"With":[19],"the":[20,145,173],"rapid":[21],"development":[22],"emerging":[24],"applications":[25],"such":[26,183],"as":[27,184],"virtual":[28],"reality,":[29],"remote":[30],"control,":[31],"embodied":[33],"intelligence,":[34],"characteristics":[37],"have":[38],"become":[39],"increasingly":[40],"bursty,":[41],"short":[42,59],"lived,":[43],"encrypted.":[45],"Traditional":[46],"statistical":[47,67],"methods":[48],"based":[49,91],"on":[50,92,180],"predefined":[51],"patterns":[53],"exhibit":[54],"limited":[55],"effectiveness":[56],"identifying":[58],"flows":[60],"bursty":[62],"traffic,":[63],"resulting":[64],"significant":[66],"bias":[68],"low":[70],"matching":[71],"efficiency":[72],"real":[74,191],"time":[75,192],"QoS":[76],"provisioning.":[77],"To":[78],"address":[79],"this":[80,82],"issue,":[81],"paper":[83],"proposes":[84],"flow":[86],"level":[87],"method":[90,147],"an":[93],"improved":[94],"nDPI":[95],"tool":[96],"LightGBM":[99],"model.":[100],"The":[101],"proposed":[102,146],"approach":[103],"performs":[104],"single":[105],"packet":[106],"feature":[107,110],"extraction":[108],"aggregation,":[111],"adopts":[113],"stratified":[115],"cross":[116],"validation":[117],"strategy":[118],"for":[119,190],"model":[120,175],"training":[121],"evaluation,":[123],"enabling":[124],"effective":[125],"discrimination":[126],"among":[127],"multiple":[128],"application":[129],"types,":[130],"including":[131],"video":[132],"streaming,":[133],"instant":[134],"messaging,":[135],"online":[136],"gaming,":[137],"web":[139],"browsing.":[140],"Experimental":[141],"results":[142],"demonstrate":[143],"that":[144],"achieves":[148],"accuracy":[151],"0.83":[153],"under":[154],"encrypted":[155],"scenarios,":[157],"while":[158],"its":[159],"balanced":[160],"F1":[161],"score":[162],"effectively":[163],"enhances":[164],"dynamic":[165],"performance":[167],"across":[168],"different":[169],"categories.":[171],"Furthermore,":[172],"lightweight":[174],"architecture":[176],"allows":[177],"efficient":[178],"deployment":[179],"embedded":[181],"platforms":[182],"routers,":[185],"providing":[186],"feasible":[188],"solution":[189],"awareness":[194],"fine":[196],"grained":[197],"management.":[199]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
