@article{DBLP:journals/cmc/Jiyuancmcmaldetect,
	title        = {MalDetect: A Structure of Encrypted Malware Traffic Detection},
	author       = {Jiyuan Liu and Yingzhi Zeng and Jiangyong Shi and Yuexiang Yang and Rui Wang and Liangzhong He},
	year         = 2020,
	journal      = {Computers, Materials and Continua},
	volume       = 60,
	number       = {},
	pages        = {721--739},
}
@inproceedings{radivilova2018decrypting,
	title        = {Decrypting SSL/TLS traffic for hidden threats detection},
	author       = {Tamara {Radivilova} and Lyudmyla {Kirichenko} and Dmytro {Ageyev} and Maxim {Tawalbeh} and Vitalii {Bulakh}},
	year         = 2018,
	booktitle    = {2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)},
	pages        = {143--146},
	notes        = {Sourced from Microsoft Academic - https://academic.microsoft.com/paper/3106355239}
}
@inproceedings{DBLP:conf/sigcomm/SherryLPR15,
	title        = {BlindBox: Deep Packet Inspection over Encrypted Traffic},
	author       = {Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy},
	year         = 2015,
	booktitle    = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015},
	publisher    = {{ACM}},
	pages        = {213--226},
}
@inproceedings{DBLP:conf/ccs/NingPLCC19,
	title        = {PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules},
	author       = {Jianting Ning and Geong Sen Poh and Jia{-}Ch'ng Loh and Jason Chia and Ee{-}Chien Chang},
	year         = 2019,
	booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
	publisher    = {{ACM}},
	pages        = {1657--1670},
}
@article{DBLP:journals/iacr/LaiYSLSSL20,
	title        = {Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes},
	author       = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu},
	year         = 2020,
	journal      = {{IACR} Cryptol. ePrint Arch.},
	volume       = 2020,
	pages        = 20,
}
@inproceedings{DBLP:conf/esorics/NingHPXLWD20,
	title        = {Pine: Enabling Privacy-Preserving Deep Packet Inspection on {TLS} with Rule-Hiding and Fast Connection Establishment},
	author       = {Jianting Ning and Xinyi Huang and Geong Sen Poh and Shengmin Xu and Jia{-}Ch'ng Loh and Jian Weng and Robert H. Deng},
	year         = 2020,
	booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}},
	publisher    = {Springer},
	series       = {Lecture Notes in Computer Science},
	volume       = 12308,
	pages        = {3--22},
}
@inproceedings{DBLP:conf/ccs/CanardDKPS17,
	title        = {BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic},
	author       = {S{\'{e}}bastien Canard and A{\"{\i}}da Diop and Nizar Kheir and Marie Paindavoine and Mohamed Sabt},
	year         = 2017,
	booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017},
	publisher    = {{ACM}},
	pages        = {561--574},
}
@article{DBLP:journals/corr/abs-2010-16388,
	title        = {A survey and analysis of {TLS} interception mechanisms and motivations},
	author       = {Xavier de Carn{\'{e}} de Carnavalet and Paul C. van Oorschot},
	year         = 2020,
	journal      = {CoRR},
	volume       = {abs/2010.16388},
	archiveprefix = {arXiv},
	eprint       = {2010.16388}
}
@article{DBLP:journals/corr/abs-2101-04338,
	title        = {A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes},
	author       = {Geong Sen Poh and Dinil Mon Divakaran and Hoon Wei Lim and Jianting Ning and Achintya Desai},
	year         = 2021,
	journal      = {CoRR},
	volume       = {abs/2101.04338},
	archiveprefix = {arXiv},
	eprint       = {2101.04338}
}
@inproceedings{DBLP:conf/ccs/AndersonM16,
	title        = {Identifying Encrypted Malware Traffic with Contextual Flow Data},
	author       = {Blake Anderson and David A. McGrew},
	year         = 2016,
	booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
	publisher    = {{ACM}},
	pages        = {35--46},
}
@inproceedings{DBLP:conf/kdd/AndersonM17,
	title        = {Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity},
	author       = {Blake Anderson and David A. McGrew},
	year         = 2017,
	booktitle    = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017},
	publisher    = {{ACM}},
	pages        = {1723--1732},
}
@article{DBLP:journals/virology/AndersonPM18,
	title        = {Deciphering malware's use of {TLS} (without decryption)},
	author       = {Blake Anderson and Subharthi Paul and David A. McGrew},
	year         = 2018,
	journal      = {J. Comput. Virol. Hacking Tech.},
	volume       = 14,
	number       = 3,
	pages        = {195--211},
}
@misc{david2018identifying,
	title        = {Identifying and using DNS contextual flows},
	author       = {Mcgrew {David} and Anderson Blake {Harrell} and Wing Daniel {G} and Andreasen {Flemming}},
	year         = 2018,
	notes        = {Sourced from Microsoft Academic - https://academic.microsoft.com/paper/2886476867}
}
@article{DBLP:journals/ton/FanGRCQ17,
	title        = {SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox},
	author       = {Jingyuan Fan and Chaowen Guan and Kui Ren and Yong Cui and Chunming Qiao},
	year         = 2017,
	journal      = {{IEEE/ACM} Trans. Netw.},
	volume       = 25,
	number       = 6,
	pages        = {3753--3766},
}
@inproceedings{DBLP:conf/nsdi/LanSPRL16,
	title        = {Embark: Securely Outsourcing Middleboxes to the Cloud},
	author       = {Chang Lan and Justine Sherry and Raluca Ada Popa and Sylvia Ratnasamy and Zhi Liu},
	year         = 2016,
	booktitle    = {13th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016},
	publisher    = {{USENIX} Association},
	pages        = {255--273},
}
@inproceedings{DBLP:conf/infocom/YuanWLW16,
	title        = {Privacy-preserving deep packet inspection in outsourced middleboxes},
	author       = {Xingliang Yuan and Xinyu Wang and Jianxiong Lin and Cong Wang},
	year         = 2016,
	booktitle    = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
	publisher    = {{IEEE}},
	pages        = {1--9},
}
@article{DBLP:journals/ccr/NaylorSVLBLPRS15,
	title        = {Multi-Context {TLS} (mcTLS): Enabling Secure In-Network Functionality in {TLS}},
	author       = {David Naylor and Kyle Schomp and Matteo Varvello and Ilias Leontiadis and Jeremy Blackburn and Diego R. L{\'{o}}pez and Konstantina Papagiannaki and Pablo Rodr{\'{\i}}guez Rodr{\'{\i}}guez and Peter Steenkiste},
	year         = 2015,
	journal      = {Comput. Commun. Rev.},
	volume       = 45,
	number       = 5,
	pages        = {199--212},
}
@inproceedings{DBLP:conf/conext/NaylorLGKS17,
	title        = {And Then There Were More: Secure Communication for More Than Two Parties},
	author       = {David Naylor and Richard Li and Christos Gkantsidis and Thomas Karagiannis and Peter Steenkiste},
	year         = 2017,
	booktitle    = {Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017},
	publisher    = {{ACM}},
	pages        = {88--100},
}
@inproceedings{DBLP:conf/sp/BhargavanBDFO18,
	title        = {A Formal Treatment of Accountable Proxying Over {TLS}},
	author       = {Karthikeyan Bhargavan and Ioana Boureanu and Antoine Delignat{-}Lavaud and Pierre{-}Alain Fouque and Cristina Onete},
	year         = 2018,
	booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}},
	publisher    = {{IEEE} Computer Society},
	pages        = {799--816},
}
@inproceedings{DBLP:conf/ndss/LeeSLCCCK19,
	title        = {maTLS: How to Make {TLS} middlebox-aware?},
	author       = {Hyunwoo Lee and Zach Smith and Junghwan Lim and Gyeongjae Choi and Selin Chun and Taejoong Chung and Ted Taekyoung Kwon},
	year         = 2019,
	booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019},
	publisher    = {The Internet Society},
}
@inproceedings{DBLP:conf/aaai/0003LWZY21,
	title        = {Hierarchical Multiple Kernel Clustering},
	author       = {Jiyuan Liu and Xinwang Liu and Siwei Wang and Sihang Zhou and Yuexiang Yang},
	year         = 2021,
	booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021},
	publisher    = {{AAAI} Press},
	pages        = {8671--8679},
}
@article{DBLP:journals/tkde/LiuLXLZWY22,
	title        = {Optimal Neighborhood Multiple Kernel Clustering With Adaptive Local Kernels},
	author       = {Jiyuan Liu and Xinwang Liu and Jian Xiong and Qing Liao and Sihang Zhou and Siwei Wang and Yuexiang Yang},
	year         = 2022,
	journal      = {{IEEE} Trans. Knowl. Data Eng.},
	volume       = 34,
	number       = 6,
	pages        = {2872--2885},
}
@article{DBLP:journals/pami/LiuLYLX23,
	title        = {Contrastive Multi-View Kernel Learning},
	author       = {Jiyuan Liu and Xinwang Liu and Yuexiang Yang and Qing Liao and Yuanqing Xia},
	year         = 2023,
	journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
	volume       = 45,
	number       = 8,
	pages        = {9552--9566},
}
@article{DBLP:journals/tnn/LiuLYGKH22,
	title        = {Multiview Subspace Clustering via Co-Training Robust Data Representation},
	author       = {Jiyuan Liu and Xinwang Liu and Yuexiang Yang and Xifeng Guo and Marius Kloft and Liangzhong He},
	year         = 2022,
	journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
	volume       = 33,
	number       = 10,
	pages        = {5177--5189},
}
@inproceedings{DBLP:conf/iccv/0003LYL0LS21,
	title        = {One-pass Multi-view Clustering for Large-scale Data},
	author       = {Jiyuan Liu and Xinwang Liu and Yuexiang Yang and Li Liu and Siqi Wang and Weixuan Liang and Jiangyong Shi},
	year         = 2021,
	booktitle    = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021},
	publisher    = {{IEEE}},
	pages        = {12324--12333},
}
@inproceedings{DBLP:conf/aaai/NieCL17,
	title        = {Multi-View Clustering and Semi-Supervised Classification with Adaptive Neighbours},
	author       = {Feiping Nie and Guohao Cai and Xuelong Li},
	year         = 2017,
	booktitle    = {Proceedings of the Thirty-First {AAAI} Conference on Artificial Intelligence, February 4-9, 2017, San Francisco, California, {USA}},
	publisher    = {{AAAI} Press},
	pages        = {2408--2414},
}
@inproceedings{DBLP:conf/acml/BoKZSC19,
	title        = {Latent Multi-view Semi-Supervised Classification},
	author       = {Xiaofan Bo and Zhao Kang and Zhitong Zhao and Yuanzhang Su and Wenyu Chen},
	year         = 2019,
	booktitle    = {Proceedings of The 11th Asian Conference on Machine Learning, {ACML} 2019, 17-19 November 2019, Nagoya, Japan},
	publisher    = {{PMLR}},
	series       = {Proceedings of Machine Learning Research},
	volume       = 101,
	pages        = {348--362},
}
@article{DBLP:journals/corr/abs-2102-02051,
	title        = {Trusted Multi-View Classification},
	author       = {Zongbo Han and Changqing Zhang and Huazhu Fu and Joey Tianyi Zhou},
	year         = 2021,
	journal      = {CoRR},
	volume       = {abs/2102.02051},
	archiveprefix = {arXiv},
	eprint       = {2102.02051}
}
@article{DBLP:journals/corr/abs-2011-06170,
	title        = {Deep Partial Multi-View Learning},
	author       = {Changqing Zhang and Yajie Cui and Zongbo Han and Joey Tianyi Zhou and Huazhu Fu and Qinghua Hu},
	year         = 2020,
	journal      = {CoRR},
	volume       = {abs/2011.06170},
	archiveprefix = {arXiv},
	eprint       = {2011.06170}
}
@inproceedings{DBLP:conf/cvpr/KanSC16,
	title        = {Multi-view Deep Network for Cross-View Classification},
	author       = {Meina Kan and Shiguang Shan and Xilin Chen},
	year         = 2016,
	booktitle    = {2016 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2016, Las Vegas, NV, USA, June 27-30, 2016},
	publisher    = {{IEEE} Computer Society},
	pages        = {4847--4855},
}
@inproceedings{DBLP:conf/sigir/HuZPL19,
	title        = {Scalable Deep Multimodal Learning for Cross-Modal Retrieval},
	author       = {Peng Hu and Liangli Zhen and Dezhong Peng and Pei Liu},
	year         = 2019,
	booktitle    = {Proceedings of the 42nd International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, {SIGIR} 2019, Paris, France, July 21-25, 2019},
	publisher    = {{ACM}},
	pages        = {635--644},
}
@article{DBLP:journals/iotj/ShafiqTBDG21,
	title        = {CorrAUC: {A} Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques},
	author       = {Muhammad Shafiq and Zhihong Tian and Ali Kashif Bashir and Xiaojiang Du and Mohsen Guizani},
	year         = 2021,
	journal      = {{IEEE} Internet Things J.},
	volume       = 8,
	number       = 5,
	pages        = {3242--3254},
}
@article{DBLP:journals/pami/HuLT18,
	title        = {Sharable and Individual Multi-View Metric Learning},
	author       = {Junlin Hu and Jiwen Lu and Yap{-}Peng Tan},
	year         = 2018,
	journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
	volume       = 40,
	number       = 9,
	pages        = {2281--2288},
}
@article{DBLP:journals/compsec/GarciaGSZ14,
	title        = {An empirical comparison of botnet detection methods},
	author       = {Sebasti{\'{a}}n Garc{\'{\i}}a and Martin Grill and Jan Stiborek and Alejandro Zunino},
	year         = 2014,
	journal      = {Comput. Secur.},
	volume       = 45,
	pages        = {100--123},
}
@inproceedings{DBLP:conf/cacic/ErquiagaGG17,
	title        = {Observer Effect: How Intercepting {HTTPS} Traffic Forces Malware to Change Their Behavior},
	author       = {Mar{\'{\i}}a Jos{\'{e}} Erquiaga and Sebasti{\'{a}}n Garc{\'{\i}}a and Carlos Garc{\'{\i}}a Garino},
	year         = 2017,
	booktitle    = {Computer Science - {CACIC} 2017 - 23rd Argentine Congress, La Plata, Argentina, October 9-13, 2017, Revised Selected Papers},
	publisher    = {Springer},
	series       = {Communications in Computer and Information Science},
	volume       = 790,
	pages        = {272--281},
}
@misc{stratodatasets,
	title        = {Stratosphere Laboratory Datasets},
	author       = {Stratosphere},
	year         = 2015,
	note         = {Retrieved March 13, 2020, from \url{https://www.stratosphereips.org/datasets-overview}}
}
@article{DBLP:journals/sac/SmolaS04,
	title        = {A tutorial on support vector regression},
	author       = {Alexander J. Smola and Bernhard Sch{\"{o}}lkopf},
	year         = 2004,
	journal      = {Stat. Comput.},
	volume       = 14,
	number       = 3,
	pages        = {199--222},
}
@article{DBLP:journals/tnn/ShakhnarovichDI08,
	title        = {Nearest-Neighbor Methods in Learning and Vision},
	author       = {Gregory Shakhnarovich and Trevor Darrell and Piotr Indyk},
	year         = 2008,
	journal      = {{IEEE} Trans. Neural Networks},
	volume       = 19,
	number       = 2,
	pages        = 377,
}
@article{DBLP:journals/pami/LiuLTXXLKZ21,
	title        = {Efficient and Effective Regularized Incomplete Multi-View Clustering},
	author       = {Xinwang Liu and Miaomiao Li and Chang Tang and Jingyuan Xia and Jian Xiong and Li Liu and Marius Kloft and En Zhu},
	year         = 2021,
	journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
	volume       = 43,
	number       = 8,
	pages        = {2634--2646},
}
@article{DBLP:journals/pami/LiuZLWTYSWG19,
	title        = {Late Fusion Incomplete Multi-View Clustering},
	author       = {Xinwang Liu and Xinzhong Zhu and Miaomiao Li and Lei Wang and Chang Tang and Jianping Yin and Dinggang Shen and Huaimin Wang and Wen Gao},
	year         = 2019,
	journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
	volume       = 41,
	number       = 10,
	pages        = {2410--2423},
}
@article{DBLP:journals/compsec/LichyBDDH23,
	title        = {When a {RF} beats a {CNN} and GRU, together - {A} comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification},
	author       = {Adi Lichy and Ofek Bader and Ran Dubin and Amit Dvir and Chen Hajaj},
	year         = 2023,
	journal      = {Comput. Secur.},
	volume       = 124,
	pages        = 103000,
}
@inproceedings{DBLP:conf/raid/FuLQZZYLD22,
	title        = {Encrypted Malware Traffic Detection via Graph-based Network Analysis},
	author       = {Zhuoqun Fu and Mingxuan Liu and Yue Qin and Jia Zhang and Yuan Zou and Qilei Yin and Qi Li and Haixin Duan},
	year         = 2022,
	booktitle    = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
	publisher    = {{ACM}},
	pages        = {495--509},
}
@inproceedings{DBLP:conf/iccS/GuoSCXZ21,
	title        = {{MGEL:} {A} Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features},
	author       = {Juncheng Guo and Yafei Sang and Peng Chang and Xiaolin Xu and Yongzheng Zhang},
	year         = 2021,
	booktitle    = {Computational Science - {ICCS} 2021 - 21st International Conference, Krakow, Poland, June 16-18, 2021, Proceedings, Part {II}},
	publisher    = {Springer},
	series       = {Lecture Notes in Computer Science},
	volume       = 12743,
	pages        = {195--208},
}
@inproceedings{DBLP:conf/ictc/KimKHR22,
	title        = {Revisiting TLS-Encrypted Traffic Fingerprinting Methods for Malware Family Classification},
	author       = {Hyundo Kim and Minsu Kim and Joonseo Ha and Heejun Roh},
	year         = 2022,
	booktitle    = {13th International Conference on Information and Communication Technology Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October 19-21, 2022},
	publisher    = {{IEEE}},
	pages        = {1273--1278},
}
@article{liu2024onraen,
	title        = {On the Correlation Measurement of Data Representations},
	author       = {Jiyuan Liu and Xinwang Liu and Zhiping Cai and En Zhu and Rusheng Ju},
	year         = 2024,
	journal      = {Chinese Journal of Computers},
	volume       = 47,
	pages        = {1568--1581},
	issue        = 7
}
