IEEEfull.bib
V1.12 (2007/01/11)
Copyright (c) 2002-2007 by Michael Shell
See: http://www.michaelshell.org/
for current contact information.

BibTeX bibliography string definitions of the FULL titles of
IEEE journals and magazines and online publications.

This file is designed for bibliography styles that require 
full-length titles and is not for use in bibliographies that
abbreviate titles.

Support sites:
http://www.michaelshell.org/tex/ieeetran/
http://www.ctan.org/tex-archive/macros/latex/contrib/IEEEtran/
and/or
http://www.ieee.org/

Special thanks to Laura Hyslop and ken Rawson of IEEE for their help
in obtaining the information needed to compile this file. Also,
Volker Kuhlmann and Moritz Borgmann kindly provided some corrections
and additions.

*************************************************************************
Legal Notice:
This code is offered as-is without any warranty either expressed or
implied; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE! 
User assumes all risk.
In no event shall IEEE or any contributor to this code be liable for
any damages or losses, including, but not limited to, incidental,
consequential, or any other damages, resulting from the use or misuse
of any information contained here.

All comments are the opinions of their respective authors and are not
necessarily endorsed by the IEEE.

This work is distributed under the LaTeX Project Public License (LPPL)
( http://www.latex-project.org/ ) version 1.3, and may be freely used,
distributed and modified. A copy of the LPPL, version 1.3, is included
in the base LaTeX documentation of all distributions of LaTeX released
2003/12/01 or later.
Retain all contribution notices and credits.
** Modified files should be clearly indicated as such, including  **
** renaming them and changing author support contact information. **

File list of work: IEEEabrv.bib, IEEEfull.bib, IEEEexample.bib,
                   IEEEtran.bst, IEEEtranS.bst, IEEEtranSA.bst,
                   IEEEtranN.bst, IEEEtranSN.bst, IEEEtran_bst_HOWTO.pdf
*************************************************************************


USAGE:

\bibliographystyle{mybstfile}
\bibliography{IEEEfull,mybibfile}

where the IEEE titles in the .bib database entries use the strings
defined here. e.g.,


   journal = IEEE_J_AC,


to yield "{IEEE} Transactions on Automatic Control"


WARNING: IEEE uses abbreviated journal titles in their bibliographies!
Because this file provides the full titles, you should NOT use this file
for work that is to be submitted to the IEEE.

For IEEE work, you should use the abbreviated titles provided in the
companion file, IEEEabrv.bib.


** NOTES **

 1. Journals have been grouped according to subject in order to make it
    easier to locate and extract the definitions for related journals - 
    as most works use references that are confined to a single topic.
    Magazines are listed in straight alphabetical order.

 2. String names are closely based on IEEE's own internal acronyms.

 3. Older, out-of-print IEEE titles are included (but not including titles
    dating prior to IEEE's formation from the IRE and AIEE in 1963).






IEEE Journals 



aerospace and military
@string{IEEE_J_AES        = "{IEEE} Transactions on Aerospace and Electronic Systems"}
@string{IEEE_J_ANE        = "{IEEE} Transactions on Aerospace and Navigational Electronics"}
@string{IEEE_J_ANNE       = "{IEEE} Transactions on Aeronautical and Navigational Electronics"}
@string{IEEE_J_AS         = "{IEEE} Transactions on Aerospace"}
@string{IEEE_J_AIRE       = "{IEEE} Transactions on Airborne Electronics"}
@string{IEEE_J_MIL        = "{IEEE} Transactions on Military Electronics"}
autos, transportation and vehicles (non-aerospace)
@string{IEEE_J_ITS        = "{IEEE} Transactions on Intelligent Transportation Systems"}
@string{IEEE_J_VT         = "{IEEE} Transactions on Vehicular Technology"}
@string{IEEE_J_VC         = "{IEEE} Transactions on Vehicular Communications"}
circuits, signals, systems, audio and controls
@string{IEEE_J_SPL        = "{IEEE} Signal Processing Letters"}
@string{IEEE_J_ASSP       = "{IEEE} Transactions on Acoustics, Speech, and Signal Processing"}
@string{IEEE_J_AU         = "{IEEE} Transactions on Audio"}
@string{IEEE_J_AUEA       = "{IEEE} Transactions on Audio and Electroacoustics"}
@string{IEEE_J_AC         = "{IEEE} Transactions on Automatic Control"}
@string{IEEE_J_CAS        = "{IEEE} Transactions on Circuits and Systems"}
@string{IEEE_J_CASVT      = "{IEEE} Transactions on Circuits and Systems for Video Technology"}
@string{IEEE_J_CASI       = "{IEEE} Transactions on Circuits and Systems---Part {I}: Fundamental Theory and Applications"}
@string{IEEE_J_CASII      = "{IEEE} Transactions on Circuits and Systems---Part {II}: Analog and Digital Signal Processing"}
in 2004 CASI and CASII renamed part title to CASI_RP and CASII_EB, respectively.
@string{IEEE_J_CASI_RP    = "{IEEE} Transactions on Circuits and Systems---Part {I}: Regular Papers"}
@string{IEEE_J_CASII_EB   = "{IEEE} Transactions on Circuits and Systems---Part {II}: Express Briefs"}
@string{IEEE_J_CT         = "{IEEE} Transactions on Circuit Theory"}
@string{IEEE_J_CST        = "{IEEE} Transactions on Control Systems Technology"}
@string{IEEE_J_SP         = "{IEEE} Transactions on Signal Processing"}
@string{IEEE_J_SU         = "{IEEE} Transactions on Sonics and Ultrasonics"}
@string{IEEE_J_SAP        = "{IEEE} Transactions on Speech and Audio Processing"}
@string{IEEE_J_UE         = "{IEEE} Transactions on Ultrasonics Engineering"}
@string{IEEE_J_UFFC       = "{IEEE} Transactions on Ultrasonics, Ferroelectrics, and Frequency Control"}
communications
@string{IEEE_J_COML       = "{IEEE} Communications Letters"}
@string{IEEE_J_JSAC       = "{IEEE} Journal on Selected Areas in Communications"}
@string{IEEE_J_COM        = "{IEEE} Transactions on Communications"}
@string{IEEE_J_COMT       = "{IEEE} Transactions on Communication Technology"}
@string{IEEE_J_WCOM       = "{IEEE} Transactions on Wireless Communications"}
components, packaging and manufacturing
@string{IEEE_J_ADVP       = "{IEEE} Transactions on Advanced Packaging"}
@string{IEEE_J_CHMT       = "{IEEE} Transactions on Components, Hybrids and Manufacturing Technology"}
@string{IEEE_J_CPMTA      = "{IEEE} Transactions on Components, Packaging and Manufacturing Technology---Part {A}"}
@string{IEEE_J_CPMTB      = "{IEEE} Transactions on Components, Packaging and Manufacturing Technology---Part {B}: Advanced Packaging"}
@string{IEEE_J_CPMTC      = "{IEEE} Transactions on Components, Packaging and Manufacturing Technology---Part {C}: Manufacturing"}
@string{IEEE_J_CAPT       = "{IEEE} Transactions on Components and Packaging Technology"}
@string{IEEE_J_CAPTS      = "{IEEE} Transactions on Components and Packaging Technologies"}
@string{IEEE_J_CPART      = "{IEEE} Transactions on Component Parts"}
@string{IEEE_J_EPM        = "{IEEE} Transactions on Electronics Packaging Manufacturing"}
@string{IEEE_J_MFT        = "{IEEE} Transactions on Manufacturing Technology"}
@string{IEEE_J_PHP        = "{IEEE} Transactions on Parts, Hybrids and Packaging"}
@string{IEEE_J_PMP        = "{IEEE} Transactions on Parts, Materials and Packaging"}
CAD
@string{IEEE_J_TCAD       = "{IEEE} Journal on Technology in Computer Aided Design"}
@string{IEEE_J_CAD        = "{IEEE} Transactions on Computer-Aided Design of Integrated Circuits and Systems"}
coding, data, information, knowledge
@string{IEEE_J_IT         = "{IEEE} Transactions on Information Theory"}
@string{IEEE_J_KDE        = "{IEEE} Transactions on Knowledge and Data Engineering"}
computers, computation, networking and software
@string{IEEE_J_C          = "{IEEE} Transactions on Computers"}
@string{IEEE_J_CAL        = "{IEEE} Computer Architecture Letters"}
@string{IEEE_J_DSC        = "{IEEE} Transactions on Dependable and Secure Computing"}
@string{IEEE_J_ECOMP      = "{IEEE} Transactions on Electronic Computers"}
@string{IEEE_J_EVC        = "{IEEE} Transactions on Evolutionary Computation"}
@string{IEEE_J_FUZZ       = "{IEEE} Transactions on Fuzzy Systems"}
@string{IEEE_J_IFS        = "{IEEE} Transactions on Information Forensics and Security"}
@string{IEEE_J_MC         = "{IEEE} Transactions on Mobile Computing"}
@string{IEEE_J_NET        = "{IEEE/ACM} Transactions on Networking"}
@string{IEEE_J_NN         = "{IEEE} Transactions on Neural Networks"}
@string{IEEE_J_PDS        = "{IEEE} Transactions on Parallel and Distributed Systems"}
@string{IEEE_J_SE         = "{IEEE} Transactions on Software Engineering"}
computer graphics, imaging, and multimedia
@string{IEEE_J_JDT        = "{IEEE/OSA} Journal of Display Technology"}
@string{IEEE_J_IP         = "{IEEE} Transactions on Image Processing"}
@string{IEEE_J_MM         = "{IEEE} Transactions on Multimedia"}
@string{IEEE_J_VCG        = "{IEEE} Transactions on Visualization and Computer Graphics"}
cybernetics, ergonomics, robots, man-machine, and automation
@string{IEEE_J_ASE        = "{IEEE} Transactions on Automation Science and Engineering"}
@string{IEEE_J_JRA        = "{IEEE} Journal of Robotics and Automation"}
@string{IEEE_J_HFE        = "{IEEE} Transactions on Human Factors in Electronics"}
@string{IEEE_J_MMS        = "{IEEE} Transactions on Man-Machine Systems"}
@string{IEEE_J_PAMI       = "{IEEE} Transactions on Pattern Analysis and Machine Intelligence"}
in 1989 JRA became RA
in August 2004, RA split into ASE and RO
@string{IEEE_J_RA         = "{IEEE} Transactions on Robotics and Automation"}
@string{IEEE_J_RO         = "{IEEE} Transactions on Robotics"}
@string{IEEE_J_SMC        = "{IEEE} Transactions on Systems, Man, and Cybernetics"}
@string{IEEE_J_SMCA       = "{IEEE} Transactions on Systems, Man, and Cybernetics---Part {A}: Systems and Humans"}
@string{IEEE_J_SMCB       = "{IEEE} Transactions on Systems, Man, and Cybernetics---Part {B}: Cybernetics"}
@string{IEEE_J_SMCC       = "{IEEE} Transactions on Systems, Man, and Cybernetics---Part {C}: Applications and Reviews"}
@string{IEEE_J_SSC        = "{IEEE} Transactions on Systems Science and Cybernetics"}
earth, wind, fire and water
@string{IEEE_J_GE         = "{IEEE} Transactions on Geoscience Electronics"}
@string{IEEE_J_GRS        = "{IEEE} Transactions on Geoscience and Remote Sensing"}
@string{IEEE_J_GRSL       = "{IEEE} Geoscience and Remote Sensing Letters"}
@string{IEEE_J_OE         = "{IEEE} Journal of Oceanic Engineering"}
education, engineering, history, IEEE, professional
@string{IEEE_J_CJECE      = "Canadian Journal of Electrical and Computer Engineering"}
@string{IEEE_J_PROC       = "Proceedings of the {IEEE}"}
@string{IEEE_J_EDU        = "{IEEE} Transactions on Education"}
@string{IEEE_J_EM         = "{IEEE} Transactions on Engineering Management"}
@string{IEEE_J_EWS        = "{IEEE} Transactions on Engineering Writing and Speech"}
@string{IEEE_J_PC         = "{IEEE} Transactions on Professional Communication"}
electromagnetics, antennas, EMI, magnetics and microwave
@string{IEEE_J_AWPL       = "{IEEE} Antennas and Wireless Propagation Letters"}
@string{IEEE_J_MGWL       = "{IEEE} Microwave and Guided Wave Letters"}
@string{IEEE_J_MWCL       = "{IEEE} Microwave and Wireless Components Letters"}
@string{IEEE_J_AP         = "{IEEE} Transactions on Antennas and Propagation"}
@string{IEEE_J_EMC        = "{IEEE} Transactions on Electromagnetic Compatibility"}
@string{IEEE_J_MAG        = "{IEEE} Transactions on Magnetics"}
@string{IEEE_J_MTT        = "{IEEE} Transactions on Microwave Theory and Techniques"}
@string{IEEE_J_RFI        = "{IEEE} Transactions on Radio Frequency Interference"}
@string{IEEE_J_TJMJ       = "{IEEE} Translation Journal on Magnetics in Japan"}
energy and power
@string{IEEE_J_EC         = "{IEEE} Transactions on Energy Conversion"}
@string{IEEE_J_PEL        = "{IEEE} Power Electronics Letters"}
@string{IEEE_J_PWRAS      = "{IEEE} Transactions on Power Apparatus and Systems"}
@string{IEEE_J_PWRD       = "{IEEE} Transactions on Power Delivery"}
@string{IEEE_J_PWRE       = "{IEEE} Transactions on Power Electronics"}
@string{IEEE_J_PWRS       = "{IEEE} Transactions on Power Systems"}
industrial, commercial and consumer
@string{IEEE_J_APPIND     = "{IEEE} Transactions on Applications and Industry"}
@string{IEEE_J_BC         = "{IEEE} Transactions on Broadcasting"}
@string{IEEE_J_BCTV       = "{IEEE} Transactions on Broadcast and Television Receivers"}
@string{IEEE_J_CE         = "{IEEE} Transactions on Consumer Electronics"}
@string{IEEE_J_IE         = "{IEEE} Transactions on Industrial Electronics"}
@string{IEEE_J_IECI       = "{IEEE} Transactions on Industrial Electronics and Control Instrumentation"}
@string{IEEE_J_IA         = "{IEEE} Transactions on Industry Applications"}
@string{IEEE_J_IGA        = "{IEEE} Transactions on Industry and General Applications"}
@string{IEEE_J_IINF       = "{IEEE} Transactions on Industrial Informatics"}
@string{IEEE_J_PSE        = "{IEEE} Journal of Product Safety Engineering"}
instrumentation and measurement
@string{IEEE_J_IM         = "{IEEE} Transactions on Instrumentation and Measurement"}
insulation and materials
@string{IEEE_J_JEM        = "{IEEE/TMS} Journal of Electronic Materials"}
@string{IEEE_J_DEI        = "{IEEE} Transactions on Dielectrics and Electrical Insulation"}
@string{IEEE_J_EI         = "{IEEE} Transactions on Electrical Insulation"}
mechanical
@string{IEEE_J_MECH       = "{IEEE/ASME} Transactions on Mechatronics"}
@string{IEEE_J_MEMS       = "{IEEE/ASME} Journal of Microelectromechanical Systems"}
medical and biological
@string{IEEE_J_BME        = "{IEEE} Transactions on Biomedical Engineering"}
Note: The B-ME journal later dropped the hyphen and became the BME.
@string{IEEE_J_B-ME       = "{IEEE} Transactions on Bio-Medical Engineering"}
@string{IEEE_J_BMELC      = "{IEEE} Transactions on Bio-Medical Electronics"}
@string{IEEE_J_CBB        = "{IEEE/ACM} Transactions on Computational Biology and Bioinformatics"}
@string{IEEE_J_ITBM       = "{IEEE} Transactions on Information Technology in Biomedicine"}
@string{IEEE_J_ME         = "{IEEE} Transactions on Medical Electronics"}
@string{IEEE_J_MI         = "{IEEE} Transactions on Medical Imaging"}
@string{IEEE_J_NB         = "{IEEE} Transactions on NanoBioscience"}
@string{IEEE_J_NSRE       = "{IEEE} Transactions on Neural Systems and Rehabilitation Engineering"}
@string{IEEE_J_RE         = "{IEEE} Transactions on Rehabilitation Engineering"}
optics, lightwave and photonics
@string{IEEE_J_PTL        = "{IEEE} Photonics Technology Letters"}
@string{IEEE_J_JLT        = "{IEEE/OSA} Journal of Lightwave Technology"}
physics, electrons, nanotechnology, nuclear and quantum electronics
@string{IEEE_J_EDL        = "{IEEE} Electron Device Letters"}
@string{IEEE_J_JQE        = "{IEEE} Journal of Quantum Electronics"}
@string{IEEE_J_JSTQE      = "{IEEE} Journal of Selected Topics in Quantum Electronics"}
@string{IEEE_J_ED         = "{IEEE} Transactions on Electron Devices"}
@string{IEEE_J_NANO       = "{IEEE} Transactions on Nanotechnology"}
@string{IEEE_J_NS         = "{IEEE} Transactions on Nuclear Science"}
@string{IEEE_J_PS         = "{IEEE} Transactions on Plasma Science"}
reliability
@string{IEEE_J_DMR        = "{IEEE} Transactions on Device and Materials Reliability"}
@string{IEEE_J_R          = "{IEEE} Transactions on Reliability"}
semiconductors, superconductors, electrochemical and solid state
@string{IEEE_J_ESSL       = "{IEEE/ECS} Electrochemical and Solid-State Letters"}
@string{IEEE_J_JSSC       = "{IEEE} Journal of Solid-State Circuits"}
@string{IEEE_J_ASC        = "{IEEE} Transactions on Applied Superconductivity"}
@string{IEEE_J_SM         = "{IEEE} Transactions on Semiconductor Manufacturing"}
sensors
@string{IEEE_J_SENSOR     = "{IEEE} Sensors Journal"}
VLSI
@string{IEEE_J_VLSI       = "{IEEE} Transactions on Very Large Scale Integration ({VLSI}) Systems"}
IEEE Magazines
@string{IEEE_M_AES        = "{IEEE} Aerospace and Electronics Systems Magazine"}
@string{IEEE_M_HIST       = "{IEEE} Annals of the History of Computing"}
@string{IEEE_M_AP         = "{IEEE} Antennas and Propagation Magazine"}
@string{IEEE_M_ASSP       = "{IEEE} {ASSP} Magazine"}
@string{IEEE_M_CD         = "{IEEE} Circuits and Devices Magazine"}
@string{IEEE_M_CAS        = "{IEEE} Circuits and Systems Magazine"}
@string{IEEE_M_COM        = "{IEEE} Communications Magazine"}
@string{IEEE_M_COMSOC     = "{IEEE} Communications Society Magazine"}
@string{IEEE_M_CIM        = "{IEEE} Computational Intelligence Magazine"}
CSEM changed to CSE in 1999
@string{IEEE_M_CSE        = "{IEEE} Computing in Science and Engineering"}
@string{IEEE_M_CSEM       = "{IEEE} Computational Science and Engineering Magazine"}
@string{IEEE_M_C          = "{IEEE} Computer"}
@string{IEEE_M_CAP        = "{IEEE} Computer Applications in Power"}
@string{IEEE_M_CGA        = "{IEEE} Computer Graphics and Applications"}
@string{IEEE_M_CONC       = "{IEEE} Concurrency"}
@string{IEEE_M_CS         = "{IEEE} Control Systems Magazine"}
@string{IEEE_M_DTC        = "{IEEE} Design and Test of Computers"}
@string{IEEE_M_EI         = "{IEEE} Electrical Insulation Magazine"}
@string{IEEE_M_ETR        = "{IEEE} ElectroTechnology Review"}
@string{IEEE_M_EMB        = "{IEEE} Engineering in Medicine and Biology Magazine"}
@string{IEEE_M_EMR        = "{IEEE} Engineering Management Review"}
@string{IEEE_M_EXP        = "{IEEE} Expert"}
@string{IEEE_M_IA         = "{IEEE} Industry Applications Magazine"}
@string{IEEE_M_IM         = "{IEEE} Instrumentation and Measurement Magazine"}
@string{IEEE_M_IS         = "{IEEE} Intelligent Systems"}
@string{IEEE_M_IC         = "{IEEE} Internet Computing"}
@string{IEEE_M_ITP        = "{IEEE} {IT} Professional"}
@string{IEEE_M_MICRO      = "{IEEE} Micro"}
@string{IEEE_M_MW         = "{IEEE} Microwave Magazine"}
@string{IEEE_M_MM         = "{IEEE} Multimedia"}
@string{IEEE_M_NET        = "{IEEE} Network"}
@string{IEEE_M_PCOM       = "{IEEE} Personal Communications Magazine"}
@string{IEEE_M_POT        = "{IEEE} Potentials"}
CAP and PER merged to form PE in 2003
@string{IEEE_M_PE         = "{IEEE} Power and Energy Magazine"}
@string{IEEE_M_PER        = "{IEEE} Power Engineering Review"}
@string{IEEE_M_PVC        = "{IEEE} Pervasive Computing"}
@string{IEEE_M_RA         = "{IEEE} Robotics and Automation Magazine"}
@string{IEEE_M_SAP        = "{IEEE} Security and Privacy"}
@string{IEEE_M_SP         = "{IEEE} Signal Processing Magazine"}
@string{IEEE_M_S          = "{IEEE} Software"}
@string{IEEE_M_SPECT      = "{IEEE} Spectrum"}
@string{IEEE_M_TS         = "{IEEE} Technology and Society Magazine"}
@string{IEEE_M_VT         = "{IEEE} Vehicular Technology Magazine"}
@string{IEEE_M_WC         = "{IEEE} Wireless Communications Magazine"}
@string{IEEE_M_TODAY      = "Today's Engineer"}
IEEE Online Publications
@string{IEEE_O_CSTO        = "{IEEE} Communications Surveys and Tutorials"}
@string{IEEE_O_DSO         = "{IEEE} Distributed Systems Online"}
--
EOF
@article{DBLP:journals/cmc/Jiyuancmcmaldetect,
	title        = {MalDetect: A Structure of Encrypted Malware Traffic Detection},
	author       = {Jiyuan Liu and Yingzhi Zeng and Jiangyong Shi and Yuexiang Yang and Rui Wang and Liangzhong He},
	year         = 2020,
	journal      = {Computers, Materials and Continua},
	volume       = 60,
	number       = {},
	pages        = {721--739},
	doi          = {10.32604/cmc.2019.05610},
	url          = {https://doi.org/10.32604/cmc.2019.05610}
}
@inproceedings{radivilova2018decrypting,
	title        = {Decrypting SSL/TLS traffic for hidden threats detection},
	author       = {Tamara {Radivilova} and Lyudmyla {Kirichenko} and Dmytro {Ageyev} and Maxim {Tawalbeh} and Vitalii {Bulakh}},
	year         = 2018,
	booktitle    = {2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)},
	pages        = {143--146},
	notes        = {Sourced from Microsoft Academic - https://academic.microsoft.com/paper/3106355239}
}
@inproceedings{DBLP:conf/sigcomm/SherryLPR15,
	title        = {BlindBox: Deep Packet Inspection over Encrypted Traffic},
	author       = {Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy},
	year         = 2015,
	booktitle    = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015},
	publisher    = {{ACM}},
	pages        = {213--226},
	doi          = {10.1145/2785956.2787502},
	url          = {https://doi.org/10.1145/2785956.2787502},
	timestamp    = {Mon, 26 Nov 2018 17:05:49 +0100},
	biburl       = {https://dblp.org/rec/conf/sigcomm/SherryLPR15.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NingPLCC19,
	title        = {PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules},
	author       = {Jianting Ning and Geong Sen Poh and Jia{-}Ch'ng Loh and Jason Chia and Ee{-}Chien Chang},
	year         = 2019,
	booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
	publisher    = {{ACM}},
	pages        = {1657--1670},
	doi          = {10.1145/3319535.3354204},
	url          = {https://doi.org/10.1145/3319535.3354204},
	timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
	biburl       = {https://dblp.org/rec/conf/ccs/NingPLCC19.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiYSLSSL20,
	title        = {Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes},
	author       = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu},
	year         = 2020,
	journal      = {{IACR} Cryptol. ePrint Arch.},
	volume       = 2020,
	pages        = 20,
	url          = {https://eprint.iacr.org/2020/020},
	timestamp    = {Mon, 11 May 2020 15:55:40 +0200},
	biburl       = {https://dblp.org/rec/journals/iacr/LaiYSLSSL20.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NingHPXLWD20,
	title        = {Pine: Enabling Privacy-Preserving Deep Packet Inspection on {TLS} with Rule-Hiding and Fast Connection Establishment},
	author       = {Jianting Ning and Xinyi Huang and Geong Sen Poh and Shengmin Xu and Jia{-}Ch'ng Loh and Jian Weng and Robert H. Deng},
	year         = 2020,
	booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}},
	publisher    = {Springer},
	series       = {Lecture Notes in Computer Science},
	volume       = 12308,
	pages        = {3--22},
	doi          = {10.1007/978-3-030-58951-6\_1},
	url          = {https://doi.org/10.1007/978-3-030-58951-6\_1},
	timestamp    = {Fri, 09 Apr 2021 18:36:28 +0200},
	biburl       = {https://dblp.org/rec/conf/esorics/NingHPXLWD20.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CanardDKPS17,
	title        = {BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic},
	author       = {S{\'{e}}bastien Canard and A{\"{\i}}da Diop and Nizar Kheir and Marie Paindavoine and Mohamed Sabt},
	year         = 2017,
	booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017},
	publisher    = {{ACM}},
	pages        = {561--574},
	doi          = {10.1145/3052973.3053013},
	url          = {https://doi.org/10.1145/3052973.3053013},
	timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
	biburl       = {https://dblp.org/rec/conf/ccs/CanardDKPS17.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-16388,
	title        = {A survey and analysis of {TLS} interception mechanisms and motivations},
	author       = {Xavier de Carn{\'{e}} de Carnavalet and Paul C. van Oorschot},
	year         = 2020,
	journal      = {CoRR},
	volume       = {abs/2010.16388},
	url          = {https://arxiv.org/abs/2010.16388},
	archiveprefix = {arXiv},
	eprint       = {2010.16388},
	timestamp    = {Tue, 03 Nov 2020 11:44:23 +0100},
	biburl       = {https://dblp.org/rec/journals/corr/abs-2010-16388.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-04338,
	title        = {A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes},
	author       = {Geong Sen Poh and Dinil Mon Divakaran and Hoon Wei Lim and Jianting Ning and Achintya Desai},
	year         = 2021,
	journal      = {CoRR},
	volume       = {abs/2101.04338},
	url          = {https://arxiv.org/abs/2101.04338},
	archiveprefix = {arXiv},
	eprint       = {2101.04338},
	timestamp    = {Fri, 22 Jan 2021 15:16:00 +0100},
	biburl       = {https://dblp.org/rec/journals/corr/abs-2101-04338.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AndersonM16,
	title        = {Identifying Encrypted Malware Traffic with Contextual Flow Data},
	author       = {Blake Anderson and David A. McGrew},
	year         = 2016,
	booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
	publisher    = {{ACM}},
	pages        = {35--46},
	doi          = {10.1145/2996758.2996768},
	url          = {https://doi.org/10.1145/2996758.2996768},
	timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
	biburl       = {https://dblp.org/rec/conf/ccs/AndersonM16.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/AndersonM17,
	title        = {Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity},
	author       = {Blake Anderson and David A. McGrew},
	year         = 2017,
	booktitle    = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017},
	publisher    = {{ACM}},
	pages        = {1723--1732},
	doi          = {10.1145/3097983.3098163},
	url          = {https://doi.org/10.1145/3097983.3098163},
	timestamp    = {Fri, 25 Dec 2020 01:14:16 +0100},
	biburl       = {https://dblp.org/rec/conf/kdd/AndersonM17.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AndersonPM18,
	title        = {Deciphering malware's use of {TLS} (without decryption)},
	author       = {Blake Anderson and Subharthi Paul and David A. McGrew},
	year         = 2018,
	journal      = {J. Comput. Virol. Hacking Tech.},
	volume       = 14,
	number       = 3,
	pages        = {195--211},
	doi          = {10.1007/s11416-017-0306-6},
	url          = {https://doi.org/10.1007/s11416-017-0306-6},
	timestamp    = {Fri, 13 Mar 2020 14:38:50 +0100},
	biburl       = {https://dblp.org/rec/journals/virology/AndersonPM18.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{david2018identifying,
	title        = {Identifying and using DNS contextual flows},
	author       = {Mcgrew {David} and Anderson Blake {Harrell} and Wing Daniel {G} and Andreasen {Flemming}},
	year         = 2018,
	notes        = {Sourced from Microsoft Academic - https://academic.microsoft.com/paper/2886476867}
}
@article{DBLP:journals/ton/FanGRCQ17,
	title        = {SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox},
	author       = {Jingyuan Fan and Chaowen Guan and Kui Ren and Yong Cui and Chunming Qiao},
	year         = 2017,
	journal      = {{IEEE/ACM} Trans. Netw.},
	volume       = 25,
	number       = 6,
	pages        = {3753--3766},
	doi          = {10.1109/TNET.2017.2753044},
	url          = {https://doi.org/10.1109/TNET.2017.2753044},
	timestamp    = {Wed, 18 Apr 2018 12:59:15 +0200},
	biburl       = {https://dblp.org/rec/journals/ton/FanGRCQ17.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/LanSPRL16,
	title        = {Embark: Securely Outsourcing Middleboxes to the Cloud},
	author       = {Chang Lan and Justine Sherry and Raluca Ada Popa and Sylvia Ratnasamy and Zhi Liu},
	year         = 2016,
	booktitle    = {13th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016},
	publisher    = {{USENIX} Association},
	pages        = {255--273},
	url          = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/lan},
	timestamp    = {Tue, 02 Feb 2021 08:05:49 +0100},
	biburl       = {https://dblp.org/rec/conf/nsdi/LanSPRL16.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/YuanWLW16,
	title        = {Privacy-preserving deep packet inspection in outsourced middleboxes},
	author       = {Xingliang Yuan and Xinyu Wang and Jianxiong Lin and Cong Wang},
	year         = 2016,
	booktitle    = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
	publisher    = {{IEEE}},
	pages        = {1--9},
	doi          = {10.1109/INFOCOM.2016.7524526},
	url          = {https://doi.org/10.1109/INFOCOM.2016.7524526},
	timestamp    = {Sun, 25 Oct 2020 23:14:25 +0100},
	biburl       = {https://dblp.org/rec/conf/infocom/YuanWLW16.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/NaylorSVLBLPRS15,
	title        = {Multi-Context {TLS} (mcTLS): Enabling Secure In-Network Functionality in {TLS}},
	author       = {David Naylor and Kyle Schomp and Matteo Varvello and Ilias Leontiadis and Jeremy Blackburn and Diego R. L{\'{o}}pez and Konstantina Papagiannaki and Pablo Rodr{\'{\i}}guez Rodr{\'{\i}}guez and Peter Steenkiste},
	year         = 2015,
	journal      = {Comput. Commun. Rev.},
	volume       = 45,
	number       = 5,
	pages        = {199--212},
	doi          = {10.1145/2829988.2787482},
	url          = {https://doi.org/10.1145/2829988.2787482},
	timestamp    = {Sun, 06 Sep 2020 18:03:58 +0200},
	biburl       = {https://dblp.org/rec/journals/ccr/NaylorSVLBLPRS15.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/NaylorLGKS17,
	title        = {And Then There Were More: Secure Communication for More Than Two Parties},
	author       = {David Naylor and Richard Li and Christos Gkantsidis and Thomas Karagiannis and Peter Steenkiste},
	year         = 2017,
	booktitle    = {Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017},
	publisher    = {{ACM}},
	pages        = {88--100},
	doi          = {10.1145/3143361.3143383},
	url          = {https://doi.org/10.1145/3143361.3143383},
	timestamp    = {Tue, 06 Nov 2018 16:58:31 +0100},
	biburl       = {https://dblp.org/rec/conf/conext/NaylorLGKS17.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BhargavanBDFO18,
	title        = {A Formal Treatment of Accountable Proxying Over {TLS}},
	author       = {Karthikeyan Bhargavan and Ioana Boureanu and Antoine Delignat{-}Lavaud and Pierre{-}Alain Fouque and Cristina Onete},
	year         = 2018,
	booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}},
	publisher    = {{IEEE} Computer Society},
	pages        = {799--816},
	doi          = {10.1109/SP.2018.00021},
	url          = {https://doi.org/10.1109/SP.2018.00021},
	timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
	biburl       = {https://dblp.org/rec/conf/sp/BhargavanBDFO18.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LeeSLCCCK19,
	title        = {maTLS: How to Make {TLS} middlebox-aware?},
	author       = {Hyunwoo Lee and Zach Smith and Junghwan Lim and Gyeongjae Choi and Selin Chun and Taejoong Chung and Ted Taekyoung Kwon},
	year         = 2019,
	booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019},
	publisher    = {The Internet Society},
	url          = {https://www.ndss-symposium.org/ndss-paper/matls-how-to-make-tls-middlebox-aware/},
	timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
	biburl       = {https://dblp.org/rec/conf/ndss/LeeSLCCCK19.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/0003LWZY21,
	title        = {Hierarchical Multiple Kernel Clustering},
	author       = {Jiyuan Liu and Xinwang Liu and Siwei Wang and Sihang Zhou and Yuexiang Yang},
	year         = 2021,
	booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021},
	publisher    = {{AAAI} Press},
	pages        = {8671--8679},
	url          = {https://ojs.aaai.org/index.php/AAAI/article/view/17051},
	timestamp    = {Sat, 05 Jun 2021 18:11:55 +0200},
	biburl       = {https://dblp.org/rec/conf/aaai/0003LWZY21.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/JiyuanTKDE20,
	title        = {Optimal Neighborhood Multiple Kernel Clustering with Adaptive Local Kernels},
	author       = {Jiyuan Liu and Xinwang Liu and Jian Xiong and Qing Liao and Sihang Zhou and Siwei Wang and Yuexiang Yang},
	year         = 2020,
	journal      = {{IEEE} Transactions on Knowledge and Data Engineering},
	volume       = {},
	number       = {},
	pages        = {},
	doi          = {10.1109/TKDE.2020.3014104},
	url          = {https://doi.org/10.1109/TKDE.2020.3014104}
}
@article{9399655,
	title        = {Multiview Subspace Clustering via Co-Training Robust Data Representation},
	author       = {J. {Liu} and X. {Liu} and Y. {Yang} and X. {Guo} and M. {Kloft} and L. {He}},
	year         = 2021,
	month        = {},
	journal      = {IEEE Transactions on Neural Networks and Learning Systems},
	volume       = {},
	number       = {},
	pages        = {1--13},
	doi          = {10.1109/TNNLS.2021.3069424},
	issn         = {2162-2388}
}
@inproceedings{DBLP:conf/aaai/NieCL17,
	title        = {Multi-View Clustering and Semi-Supervised Classification with Adaptive Neighbours},
	author       = {Feiping Nie and Guohao Cai and Xuelong Li},
	year         = 2017,
	booktitle    = {Proceedings of the Thirty-First {AAAI} Conference on Artificial Intelligence, February 4-9, 2017, San Francisco, California, {USA}},
	publisher    = {{AAAI} Press},
	pages        = {2408--2414},
	url          = {http://aaai.org/ocs/index.php/AAAI/AAAI17/paper/view/14833},
	timestamp    = {Wed, 10 Feb 2021 08:43:31 +0100},
	biburl       = {https://dblp.org/rec/conf/aaai/NieCL17.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acml/BoKZSC19,
	title        = {Latent Multi-view Semi-Supervised Classification},
	author       = {Xiaofan Bo and Zhao Kang and Zhitong Zhao and Yuanzhang Su and Wenyu Chen},
	year         = 2019,
	booktitle    = {Proceedings of The 11th Asian Conference on Machine Learning, {ACML} 2019, 17-19 November 2019, Nagoya, Japan},
	publisher    = {{PMLR}},
	series       = {Proceedings of Machine Learning Research},
	volume       = 101,
	pages        = {348--362},
	url          = {http://proceedings.mlr.press/v101/bo19a.html},
	timestamp    = {Mon, 18 Nov 2019 16:57:55 +0100},
	biburl       = {https://dblp.org/rec/conf/acml/BoKZSC19.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-02051,
	title        = {Trusted Multi-View Classification},
	author       = {Zongbo Han and Changqing Zhang and Huazhu Fu and Joey Tianyi Zhou},
	year         = 2021,
	journal      = {CoRR},
	volume       = {abs/2102.02051},
	url          = {https://arxiv.org/abs/2102.02051},
	archiveprefix = {arXiv},
	eprint       = {2102.02051},
	timestamp    = {Tue, 09 Feb 2021 13:35:56 +0100},
	biburl       = {https://dblp.org/rec/journals/corr/abs-2102-02051.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-06170,
	title        = {Deep Partial Multi-View Learning},
	author       = {Changqing Zhang and Yajie Cui and Zongbo Han and Joey Tianyi Zhou and Huazhu Fu and Qinghua Hu},
	year         = 2020,
	journal      = {CoRR},
	volume       = {abs/2011.06170},
	url          = {https://arxiv.org/abs/2011.06170},
	archiveprefix = {arXiv},
	eprint       = {2011.06170},
	timestamp    = {Wed, 18 Nov 2020 16:48:35 +0100},
	biburl       = {https://dblp.org/rec/journals/corr/abs-2011-06170.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/KanSC16,
	title        = {Multi-view Deep Network for Cross-View Classification},
	author       = {Meina Kan and Shiguang Shan and Xilin Chen},
	year         = 2016,
	booktitle    = {2016 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2016, Las Vegas, NV, USA, June 27-30, 2016},
	publisher    = {{IEEE} Computer Society},
	pages        = {4847--4855},
	doi          = {10.1109/CVPR.2016.524},
	url          = {https://doi.org/10.1109/CVPR.2016.524},
	timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
	biburl       = {https://dblp.org/rec/conf/cvpr/KanSC16.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/HuZPL19,
	title        = {Scalable Deep Multimodal Learning for Cross-Modal Retrieval},
	author       = {Peng Hu and Liangli Zhen and Dezhong Peng and Pei Liu},
	year         = 2019,
	booktitle    = {Proceedings of the 42nd International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, {SIGIR} 2019, Paris, France, July 21-25, 2019},
	publisher    = {{ACM}},
	pages        = {635--644},
	doi          = {10.1145/3331184.3331213},
	url          = {https://doi.org/10.1145/3331184.3331213},
	timestamp    = {Sat, 30 Nov 2019 12:53:56 +0100},
	biburl       = {https://dblp.org/rec/conf/sigir/HuZPL19.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShafiqTBDG21,
	title        = {CorrAUC: {A} Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques},
	author       = {Muhammad Shafiq and Zhihong Tian and Ali Kashif Bashir and Xiaojiang Du and Mohsen Guizani},
	year         = 2021,
	journal      = {{IEEE} Internet Things J.},
	volume       = 8,
	number       = 5,
	pages        = {3242--3254},
	doi          = {10.1109/JIOT.2020.3002255},
	url          = {https://doi.org/10.1109/JIOT.2020.3002255},
	timestamp    = {Tue, 02 Mar 2021 11:25:11 +0100},
	biburl       = {https://dblp.org/rec/journals/iotj/ShafiqTBDG21.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/HuLT18,
	title        = {Sharable and Individual Multi-View Metric Learning},
	author       = {Junlin Hu and Jiwen Lu and Yap{-}Peng Tan},
	year         = 2018,
	journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
	volume       = 40,
	number       = 9,
	pages        = {2281--2288},
	doi          = {10.1109/TPAMI.2017.2749576},
	url          = {https://doi.org/10.1109/TPAMI.2017.2749576},
	timestamp    = {Sun, 06 Dec 2020 18:19:49 +0100},
	biburl       = {https://dblp.org/rec/journals/pami/HuLT18.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GarciaGSZ14,
	title        = {An empirical comparison of botnet detection methods},
	author       = {Sebasti{\'{a}}n Garc{\'{\i}}a and Martin Grill and Jan Stiborek and Alejandro Zunino},
	year         = 2014,
	journal      = {Comput. Secur.},
	volume       = 45,
	pages        = {100--123},
	doi          = {10.1016/j.cose.2014.05.011},
	url          = {https://doi.org/10.1016/j.cose.2014.05.011},
	timestamp    = {Thu, 20 Feb 2020 13:19:30 +0100},
	biburl       = {https://dblp.org/rec/journals/compsec/GarciaGSZ14.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cacic/ErquiagaGG17,
	title        = {Observer Effect: How Intercepting {HTTPS} Traffic Forces Malware to Change Their Behavior},
	author       = {Mar{\'{\i}}a Jos{\'{e}} Erquiaga and Sebasti{\'{a}}n Garc{\'{\i}}a and Carlos Garc{\'{\i}}a Garino},
	year         = 2017,
	booktitle    = {Computer Science - {CACIC} 2017 - 23rd Argentine Congress, La Plata, Argentina, October 9-13, 2017, Revised Selected Papers},
	publisher    = {Springer},
	series       = {Communications in Computer and Information Science},
	volume       = 790,
	pages        = {272--281},
	doi          = {10.1007/978-3-319-75214-3\_26},
	url          = {https://doi.org/10.1007/978-3-319-75214-3\_26},
	timestamp    = {Fri, 11 Dec 2020 16:09:34 +0100},
	biburl       = {https://dblp.org/rec/conf/cacic/ErquiagaGG17.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{stratodatasets,
	title        = {Stratosphere Laboratory Datasets},
	author       = {Stratosphere},
	year         = 2015,
	note         = {Retrieved March 13, 2020, from \url{https://www.stratosphereips.org/datasets-overview}}
}
@article{DBLP:journals/sac/SmolaS04,
	title        = {A tutorial on support vector regression},
	author       = {Alexander J. Smola and Bernhard Sch{\"{o}}lkopf},
	year         = 2004,
	journal      = {Stat. Comput.},
	volume       = 14,
	number       = 3,
	pages        = {199--222},
	doi          = {10.1023/B:STCO.0000035301.49549.88},
	url          = {https://doi.org/10.1023/B:STCO.0000035301.49549.88},
	timestamp    = {Wed, 25 Mar 2020 09:32:01 +0100},
	biburl       = {https://dblp.org/rec/journals/sac/SmolaS04.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ShakhnarovichDI08,
	title        = {Nearest-Neighbor Methods in Learning and Vision},
	author       = {Gregory Shakhnarovich and Trevor Darrell and Piotr Indyk},
	year         = 2008,
	journal      = {{IEEE} Trans. Neural Networks},
	volume       = 19,
	number       = 2,
	pages        = 377,
	doi          = {10.1109/TNN.2008.917504},
	url          = {https://doi.org/10.1109/TNN.2008.917504},
	timestamp    = {Sun, 28 May 2017 13:22:18 +0200},
	biburl       = {https://dblp.org/rec/journals/tnn/ShakhnarovichDI08.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/LiuLTXXLKZ21,
	title        = {Efficient and Effective Regularized Incomplete Multi-View Clustering},
	author       = {Xinwang Liu and Miaomiao Li and Chang Tang and Jingyuan Xia and Jian Xiong and Li Liu and Marius Kloft and En Zhu},
	year         = 2021,
	journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
	volume       = 43,
	number       = 8,
	pages        = {2634--2646},
	doi          = {10.1109/TPAMI.2020.2974828},
	url          = {https://doi.org/10.1109/TPAMI.2020.2974828},
	timestamp    = {Sat, 31 Jul 2021 17:22:10 +0200},
	biburl       = {https://dblp.org/rec/journals/pami/LiuLTXXLKZ21.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/LiuZLWTYSWG19,
	title        = {Late Fusion Incomplete Multi-View Clustering},
	author       = {Xinwang Liu and Xinzhong Zhu and Miaomiao Li and Lei Wang and Chang Tang and Jianping Yin and Dinggang Shen and Huaimin Wang and Wen Gao},
	year         = 2019,
	journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
	volume       = 41,
	number       = 10,
	pages        = {2410--2423},
	doi          = {10.1109/TPAMI.2018.2879108},
	url          = {https://doi.org/10.1109/TPAMI.2018.2879108},
	timestamp    = {Sat, 30 May 2020 20:02:14 +0200},
	biburl       = {https://dblp.org/rec/journals/pami/LiuZLWTYSWG19.bib},
	bibsource    = {dblp computer science bibliography, https://dblp.org}
}
