{"id":"https://openalex.org/W3048832564","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162891","title":"App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification","display_name":"App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048832564","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162891","mag":"3048832564"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162891","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001843120","display_name":"Xin Wang","orcid":"https://orcid.org/0000-0002-5439-0361"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Wang","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053674695","display_name":"Shuhui Chen","orcid":"https://orcid.org/0000-0001-7413-8174"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuhui Chen","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":["National Key Laboratory for Parallel and Distributed Processing, National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory for Parallel and Distributed Processing, National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001843120"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":4.2134,"has_fulltext":false,"cited_by_count":83,"citation_normalized_percentile":{"value":0.9515706,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"424","last_page":"429"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.8455604314804077},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8314108848571777},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7981116771697998},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.7055526971817017},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5056021213531494},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48829054832458496},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4848133623600006},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.476073682308197},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.45229825377464294},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4455139935016632},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4420505166053772},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.43649935722351074},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.37827539443969727}],"concepts":[{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.8455604314804077},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8314108848571777},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7981116771697998},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.7055526971817017},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5056021213531494},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48829054832458496},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4848133623600006},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.476073682308197},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.45229825377464294},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4455139935016632},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4420505166053772},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.43649935722351074},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.37827539443969727}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162891","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W337489262","https://openalex.org/W1496436819","https://openalex.org/W2064675550","https://openalex.org/W2107878631","https://openalex.org/W2149600645","https://openalex.org/W2168924027","https://openalex.org/W2188471597","https://openalex.org/W2190207511","https://openalex.org/W2475585782","https://openalex.org/W2560100125","https://openalex.org/W2743678626","https://openalex.org/W2750674396","https://openalex.org/W2765490659","https://openalex.org/W2768726319","https://openalex.org/W2912386632","https://openalex.org/W2919115771","https://openalex.org/W2919493784","https://openalex.org/W2963403784","https://openalex.org/W2963516518","https://openalex.org/W3009005808"],"related_works":["https://openalex.org/W2041550843","https://openalex.org/W2537489883","https://openalex.org/W3119500019","https://openalex.org/W4287966854","https://openalex.org/W3171249834","https://openalex.org/W2179036394","https://openalex.org/W2017644937","https://openalex.org/W1976515580","https://openalex.org/W2917586021","https://openalex.org/W3011161512"],"abstract_inverted_index":{"With":[0],"the":[1,23,35,42,55,170],"exponential":[2],"growth":[3],"of":[4,25,38],"mobile":[5,8,112],"traffic":[6,9,51,65],"data,":[7],"classification":[10,52],"is":[11,17,116],"in":[12,123],"a":[13,124,132,150],"great":[14,47],"need.":[15],"It":[16],"an":[18,98,165],"essential":[19],"step":[20],"to":[21,49,88,103,136],"improve":[22],"performance":[24,167],"network":[26],"services":[27],"such":[28],"as":[29],"QoS":[30],"and":[31,74,121,142,168],"security":[32],"monitoring.":[33],"However,":[34],"widespread":[36],"use":[37],"encrypted":[39,64,90],"protocols,":[40],"especially":[41],"TLS":[43,109],"protocol,":[44],"has":[45],"posed":[46],"challenges":[48],"traditional":[50],"techniques.":[53],"As":[54],"rule-based":[56],"deep":[57,77],"packet":[58],"inspection":[59],"approaches":[60],"are":[61,85],"ineffective":[62],"for":[63,111],"classification,":[66],"various":[67],"machine":[68],"learning":[69,78],"methods":[70],"have":[71],"been":[72],"studied":[73],"used.":[75],"Recently,":[76],"solutions":[79],"which":[80],"enable":[81],"automatic":[82],"feature":[83],"extraction":[84],"also":[86],"proposed":[87],"classify":[89],"traffic.":[91],"In":[92],"this":[93],"paper":[94],"we":[95],"propose":[96],"App-Net,":[97],"end-to-end":[99],"hybrid":[100],"neural":[101],"network,":[102],"learn":[104,131],"effective":[105],"features":[106],"from":[107],"raw":[108],"flows":[110],"app":[113,144],"identification.":[114],"App-Net":[115,148],"designed":[117],"by":[118],"combining":[119],"RNN":[120],"CNN":[122],"parallel":[125],"way.":[126],"So":[127],"that":[128,153,160],"it":[129],"can":[130,163],"joint":[133],"flow-app":[134],"embedding":[135],"characterize":[137],"both":[138],"flow":[139],"sequence":[140],"patterns":[141],"unique":[143],"signatures.":[145],"We":[146],"evaluate":[147],"on":[149],"real-world":[151],"dataset":[152],"covering":[154],"80":[155],"apps.":[156],"The":[157],"results":[158],"show":[159],"our":[161],"method":[162],"achieve":[164],"excellent":[166],"outperform":[169],"state-of-the-art":[171],"methods.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":11},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":6}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
