{"id":"https://openalex.org/W3045578090","doi":"https://doi.org/10.1109/icc40277.2020.9148798","title":"ACETA: Accelerating Encrypted Traffic Analytics on Network Edge","display_name":"ACETA: Accelerating Encrypted Traffic Analytics on Network Edge","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3045578090","doi":"https://doi.org/10.1109/icc40277.2020.9148798","mag":"3045578090"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9148798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111799783","display_name":"Derek P. Manning","orcid":null},"institutions":[{"id":"https://openalex.org/I35429941","display_name":"Elizabethtown College","ror":"https://ror.org/01y0mgq54","country_code":"US","type":"education","lineage":["https://openalex.org/I35429941"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Derek Manning","raw_affiliation_strings":["Department of Computer Science, Elizabethtown College"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Elizabethtown College","institution_ids":["https://openalex.org/I35429941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101732107","display_name":"Peilong Li","orcid":"https://orcid.org/0000-0002-1622-0214"},"institutions":[{"id":"https://openalex.org/I35429941","display_name":"Elizabethtown College","ror":"https://ror.org/01y0mgq54","country_code":"US","type":"education","lineage":["https://openalex.org/I35429941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peilong Li","raw_affiliation_strings":["Department of Computer Science, Elizabethtown College"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Elizabethtown College","institution_ids":["https://openalex.org/I35429941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037669978","display_name":"Xiaoban Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoban Wu","raw_affiliation_strings":["Electrical and Computer Engineering, University of Massachusetts Lowell"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Massachusetts Lowell","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003621523","display_name":"Yan Luo","orcid":"https://orcid.org/0000-0002-5301-5092"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Luo","raw_affiliation_strings":["Electrical and Computer Engineering, University of Massachusetts Lowell"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Massachusetts Lowell","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100378754","display_name":"Tong Zhang","orcid":"https://orcid.org/0000-0001-6212-4891"},"institutions":[{"id":"https://openalex.org/I4210158342","display_name":"Intel (United Kingdom)","ror":"https://ror.org/058cxws58","country_code":"GB","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210158342"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tong Zhang","raw_affiliation_strings":["Intel Corporation"],"affiliations":[{"raw_affiliation_string":"Intel Corporation","institution_ids":["https://openalex.org/I4210158342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044470498","display_name":"Li Weigang","orcid":"https://orcid.org/0000-0003-1826-1850"},"institutions":[{"id":"https://openalex.org/I4210158342","display_name":"Intel (United Kingdom)","ror":"https://ror.org/058cxws58","country_code":"GB","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210158342"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Weigang Li","raw_affiliation_strings":["Intel Corporation"],"affiliations":[{"raw_affiliation_string":"Intel Corporation","institution_ids":["https://openalex.org/I4210158342"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5111799783"],"corresponding_institution_ids":["https://openalex.org/I35429941"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53630769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7999976873397827},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.7054970264434814},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6731612682342529},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.6008742451667786},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5598083138465881},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5545505285263062},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.5493221282958984},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5455498099327087},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5273326635360718},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.4885774552822113},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3636855185031891},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3509030342102051},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3267030119895935},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.30634260177612305},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30510133504867554},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23413050174713135}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7999976873397827},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.7054970264434814},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6731612682342529},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.6008742451667786},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5598083138465881},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5545505285263062},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.5493221282958984},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5455498099327087},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5273326635360718},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.4885774552822113},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3636855185031891},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3509030342102051},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3267030119895935},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30634260177612305},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30510133504867554},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23413050174713135},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9148798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2537766808","https://openalex.org/W2743556905","https://openalex.org/W2906631928"],"related_works":["https://openalex.org/W4231704780","https://openalex.org/W2083794993","https://openalex.org/W352609212","https://openalex.org/W4200340037","https://openalex.org/W1511772879","https://openalex.org/W2893779165","https://openalex.org/W4379115841","https://openalex.org/W2017432143","https://openalex.org/W2899531846","https://openalex.org/W2893963003"],"abstract_inverted_index":{"Applying":[0],"machine":[1,92],"learning":[2,93],"techniques":[3],"to":[4,24,58,72,118],"detect":[5],"malicious":[6],"encrypted":[7,27,75],"network":[8,21,66],"traffic":[9,76],"has":[10],"become":[11],"a":[12,46,86,126],"challenging":[13],"research":[14],"topic.":[15],"Traditional":[16],"approaches":[17],"based":[18],"on":[19,26],"studying":[20],"patterns":[22],"fail":[23],"operate":[25],"data,":[28],"especially":[29],"without":[30],"compromising":[31],"the":[32,38,51,69,120,136],"integrity":[33],"of":[34,40,88,129],"encryption.":[35],"In":[36,53],"addition,":[37],"requirement":[39],"rendering":[41],"network-wide":[42],"intelligent":[43],"protection":[44],"in":[45,110],"timely":[47],"manner":[48],"further":[49],"exacerbates":[50],"problem.":[52],"this":[54],"paper,":[55],"we":[56,84,100,115],"propose":[57],"leverage":[59],"\u00d786":[60],"multicore":[61],"platforms":[62],"provisioned":[63],"at":[64],"enterprises'":[65],"edge":[67],"with":[68,80,95],"software":[70],"accelerators":[71],"design":[73],"an":[74,96],"analytics":[77],"(ETA)":[78],"system":[79],"accelerated":[81],"speed.":[82],"Specifically,":[83],"explore":[85],"suite":[87],"data":[89],"features":[90],"and":[91,107,113,122,131],"models":[94],"open":[97],"dataset.":[98],"Then":[99],"show":[101],"that":[102],"by":[103,125],"using":[104],"Intel":[105],"DAAL":[106],"OpenVINO":[108],"libraries":[109],"model":[111,137],"training":[112,121],"inference,":[114],"are":[116],"able":[117],"reduce":[119],"inference":[123],"time":[124],"maximum":[127],"order":[128],"31\u00d7":[130],"46\u00d7":[132],"respectively":[133],"while":[134],"retaining":[135],"accuracy.":[138]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
