{"id":"https://openalex.org/W3009872857","doi":"https://doi.org/10.1109/globecom38437.2019.9013277","title":"Self-Adaptive Probabilistic Sampling for Elephant Flows Detection","display_name":"Self-Adaptive Probabilistic Sampling for Elephant Flows Detection","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3009872857","doi":"https://doi.org/10.1109/globecom38437.2019.9013277","mag":"3009872857"},"language":"en","primary_location":{"id":"doi:10.1109/globecom38437.2019.9013277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9013277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062927280","display_name":"Jun Tao","orcid":"https://orcid.org/0000-0001-8742-687X"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Tao","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, China","Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045069716","display_name":"Yizheng Li","orcid":"https://orcid.org/0000-0003-0865-3877"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yizheng Li","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, China","Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101804440","display_name":"Zhaoyue Wang","orcid":"https://orcid.org/0000-0002-5820-8416"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoyue Wang","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, China","Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073899762","display_name":"Pengkun Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengkun Xu","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, China","Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039105183","display_name":"Cong Su","orcid":"https://orcid.org/0000-0003-2799-8256"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Su","raw_affiliation_strings":["Key Lab of CNII, MOE, Southeast University, Nanjing, China","Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of CNII, MOE, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Lab of Computer Network Technology of Jiangsu Province, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062927280"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.1768,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57794612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"51","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837107181549072},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.7223941087722778},{"id":"https://openalex.org/keywords/adaptive-sampling","display_name":"Adaptive sampling","score":0.6874740719795227},{"id":"https://openalex.org/keywords/kurtosis","display_name":"Kurtosis","score":0.5612645745277405},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5495714545249939},{"id":"https://openalex.org/keywords/importance-sampling","display_name":"Importance sampling","score":0.49743321537971497},{"id":"https://openalex.org/keywords/slice-sampling","display_name":"Slice sampling","score":0.47741949558258057},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.423694372177124},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3739776611328125},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.23034390807151794},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18555718660354614},{"id":"https://openalex.org/keywords/monte-carlo-method","display_name":"Monte Carlo method","score":0.13702678680419922},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11873883008956909},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.11434659361839294},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.10573047399520874},{"id":"https://openalex.org/keywords/markov-chain-monte-carlo","display_name":"Markov chain Monte Carlo","score":0.09382933378219604}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837107181549072},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.7223941087722778},{"id":"https://openalex.org/C2781395549","wikidata":"https://www.wikidata.org/wiki/Q4680762","display_name":"Adaptive sampling","level":3,"score":0.6874740719795227},{"id":"https://openalex.org/C166963901","wikidata":"https://www.wikidata.org/wiki/Q287251","display_name":"Kurtosis","level":2,"score":0.5612645745277405},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5495714545249939},{"id":"https://openalex.org/C52740198","wikidata":"https://www.wikidata.org/wiki/Q1539564","display_name":"Importance sampling","level":3,"score":0.49743321537971497},{"id":"https://openalex.org/C170593435","wikidata":"https://www.wikidata.org/wiki/Q4128565","display_name":"Slice sampling","level":4,"score":0.47741949558258057},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.423694372177124},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3739776611328125},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.23034390807151794},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18555718660354614},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.13702678680419922},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11873883008956909},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.11434659361839294},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.10573047399520874},{"id":"https://openalex.org/C111350023","wikidata":"https://www.wikidata.org/wiki/Q1191869","display_name":"Markov chain Monte Carlo","level":3,"score":0.09382933378219604},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom38437.2019.9013277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9013277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/1","display_name":"No poverty","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W139562302","https://openalex.org/W331617744","https://openalex.org/W1553409264","https://openalex.org/W1698388015","https://openalex.org/W1858168446","https://openalex.org/W1966994480","https://openalex.org/W1975379406","https://openalex.org/W2069980026","https://openalex.org/W2080234606","https://openalex.org/W2099235330","https://openalex.org/W2099421250","https://openalex.org/W2161371411","https://openalex.org/W2164998096","https://openalex.org/W2374144182","https://openalex.org/W2572562038","https://openalex.org/W2585275198","https://openalex.org/W2605823630","https://openalex.org/W2762095987","https://openalex.org/W2808672339","https://openalex.org/W2885706784","https://openalex.org/W2963399130","https://openalex.org/W2969998124","https://openalex.org/W4241250645","https://openalex.org/W6639080731","https://openalex.org/W6644256394","https://openalex.org/W6753705544"],"related_works":["https://openalex.org/W2049791232","https://openalex.org/W2890892537","https://openalex.org/W4248662691","https://openalex.org/W3011015278","https://openalex.org/W2995003016","https://openalex.org/W2352219667","https://openalex.org/W2031252569","https://openalex.org/W1965870577","https://openalex.org/W3081247894","https://openalex.org/W3022123134"],"abstract_inverted_index":{"Sampling":[0],"traffic":[1,16,30],"traces":[2],"to":[3,13,36,89,110,116],"collect":[4],"data":[5],"from":[6,56],"Internet":[7],"nodes":[8],"offers":[9],"a":[10,145],"new":[11],"approach":[12],"reduce":[14],"the":[15,21,25,37,47,52,57,63,75,81,91,99,104,133],"amount":[17],"of":[18,27,78,93,101,124,138],"sampling":[19,39,65,130,151],"and":[20,51,140],"memory":[22,141],"depletion.":[23],"However,":[24],"loss":[26],"accuracy":[28,147],"in":[29,136],"detection":[31,44,54,70,120],"may":[32],"be":[33],"large":[34],"due":[35],"impertinent":[38],"probability.":[40],"Many":[41],"elephant":[42,68,154],"flows":[43,95,155],"methods":[45],"suffer":[46],"high":[48,134,146],"time":[49,139],"consumption":[50,142],"poor":[53],"results":[55,123],"empirical":[58],"sampling.":[59],"In":[60],"this":[61,108],"paper,":[62],"self-adaptive":[64],"method":[66],"for":[67,103,153],"flow":[69],"is":[71,87],"investigated":[72],"based":[73],"on":[74],"heavy-tailed":[76,94],"distribution":[77],"Internet.":[79],"Specifically,":[80],"SaPS":[82],"(Self-adaptive":[83],"Probabilistic":[84],"Sampling)":[85],"algorithm":[86,109,131],"proposed":[88],"capture":[90],"characteristics":[92],"through":[96,148],"periodically":[97],"calculating":[98],"kurtosis":[100],"tailedness":[102],"flows.":[105],"We":[106],"employ":[107],"provide":[111],"simplified":[112],"but":[113],"representative":[114],"samples":[115],"four":[117],"well-":[118],"known":[119],"algorithms.":[121],"The":[122],"extensive":[125],"simulations":[126],"show":[127],"that":[128],"our":[129],"achieves":[132],"performance":[135],"terms":[137],"while":[143],"maintaining":[144],"dynamically":[149],"adjusting":[150],"probability":[152],"detection.":[156]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
