{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:12:28Z","timestamp":1729635148988,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/cbd.2017.54","type":"proceedings-article","created":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T16:34:42Z","timestamp":1504802082000},"page":"273-278","source":"Crossref","is-referenced-by-count":3,"title":["Fast Identification of Encrypted Traffic via Large-Scale Sparse Screening"],"prefix":"10.1109","author":[{"given":"Peng","family":"Meng","sequence":"first","affiliation":[]},{"given":"Guopeng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Diehard A Battery of Tests of Randomness","year":"1996","author":"marsaglia","key":"ref10"},{"journal-title":"Crypt-X Test[CP\/OL]","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"ref13","first-page":"1070","article-title":"Lasso screening rules via dual polytope projection","author":"wang","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638277"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-014-3317-1"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","article-title":"Regression shrinkage and selection via the lasso","author":"tibshirani","year":"1996","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929958"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v033.i01"},{"key":"ref19","first-page":"606","article-title":"An interior-point method for large-scale L1-regularized least squares. Selected Topics in Signal Processing","volume":"1","author":"kim","year":"2007","journal-title":"IEEE Journal of"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.04.0103.0052"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","article-title":"Flow clustering using machine learning techniques","author":"mcgregor","year":"2004","journal-title":"Passive and Active Network Measurement"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01399-7_15"},{"key":"ref7","first-page":"464","article-title":"A comparison of unsupervised learning techniques for encrypted traffic identification","volume":"5","author":"bacquet","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"key":"ref9","article-title":"NIST special publication 800-22","author":"rukhin","year":"2001","journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925105"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2007.00607.x"},{"key":"ref22","article-title":"Safe feature elimination for the lasso and sparse supervised learning problems","author":"ghaoui","year":"2010","journal-title":"arXiv preprint arXiv 1009 4219"},{"key":"ref21","first-page":"491","article-title":"SLEP: Sparse learning with efficient projections","author":"liu","year":"2009","journal-title":"Arizona State University"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2004.1380068"},{"key":"ref23","first-page":"16","article-title":"Extreme learning machine with randomly assigned RBF kernels","volume":"11","author":"huang","year":"2005","journal-title":"International Journal of Information Technology"},{"journal-title":"Matrices Theory and Applications","year":"2002","author":"serre","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.875977"}],"event":{"name":"2017 Fifth International Conference on Advanced Cloud and Big Data (CBD)","start":{"date-parts":[[2017,8,13]]},"location":"Shanghai, China","end":{"date-parts":[[2017,8,16]]}},"container-title":["2017 Fifth International Conference on Advanced Cloud and Big Data (CBD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8026342\/8026894\/08026949.pdf?arnumber=8026949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T02:48:25Z","timestamp":1570070905000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8026949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cbd.2017.54","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}