{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:28:19Z","timestamp":1761812899904,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081230","type":"print"},{"value":"9783032081247","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_4","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:29Z","timestamp":1761812609000},"page":"69-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SimSeq: A Robust TLS Traffic Classification Method"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3027-3143","authenticated-orcid":false,"given":"Jinghui","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7597-7273","authenticated-orcid":false,"given":"Fanping","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Barradas, D., Santos, N., Rodrigues, L., Signorello, S., Ramos, F.M., Madeira, A.: Flowlens: enabling efficient flow classification for ml-based network security applications. In: NDSS (2021)","DOI":"10.14722\/ndss.2021.24067"},{"key":"4_CR2","unstructured":"Cao, J., Yang, Z., Sun, K., Li, Q., Xu, M., Han, P.: Fingerprinting $$\\{$$SDN$$\\}$$ applications via encrypted control traffic. In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), pp. 501\u2013515 (2019)"},{"key":"4_CR3","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607. PmLR (2020)"},{"key":"4_CR4","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American chapter of the Association for Computational Linguistics: Human Language Technologies, vol. 1 (long and short papers), pp. 4171\u20134186 (2019)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Jenefa, A., et al.: A robust deep learning-based approach for network traffic classification using cnns and rnns. In: 2023 4th International Conference on Signal Processing and Communication (ICSPC), pp. 106\u2013110. IEEE (2023)","DOI":"10.1109\/ICSPC57692.2023.10125858"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Wang, X., Lai, Y., Wang, Y.: A packet sequence permutation-aware approach to robust network traffic classification. IEEE Network. Lett. (2024)","DOI":"10.1109\/LNET.2024.3435723"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Yu, J.: Et-bert: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference 2022, pp. 633\u2013642 (2022)","DOI":"10.1145\/3485447.3512217"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: Fs-net: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference On Computer Communications, pp. 1171\u20131179. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"4_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109648","volume":"225","author":"N Malekghaini","year":"2023","unstructured":"Malekghaini, N., et al.: Deep learning for encrypted traffic classification in the face of data drift: an empirical study. Comput. Netw. 225, 109648 (2023)","journal-title":"Comput. Netw."},{"key":"4_CR10","unstructured":"Meng, Q., Qian, H., Liu, Y., Xu, Y., Shen, Z., Cui, L.: Unsupervised representation learning for time series: a review. arXiv preprint arXiv:2308.01578 (2023)"},{"issue":"1","key":"4_CR11","doi-asserted-by":"publisher","first-page":"155","DOI":"10.3390\/app12010155","volume":"12","author":"C Oh","year":"2021","unstructured":"Oh, C., Ha, J., Roh, H.: A survey on TLS-encrypted malware network traffic analysis applicable to security operations centers. Appl. Sci. 12(1), 155 (2021)","journal-title":"Appl. Sci."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Rimmer, V., Preuveneers, D., Juarez, M., Van\u00a0Goethem, T., Joosen, W.: Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017)","DOI":"10.14722\/ndss.2018.23105"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2020.3046876","volume":"16","author":"M Shen","year":"2020","unstructured":"Shen, M., Liu, Y., Zhu, L., Du, X., Hu, J.: Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Trans. Inf. Forensics Secur. 16, 2046\u20132059 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TIFS.2021.3050608","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367\u20132380 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"4_CR15","doi-asserted-by":"publisher","first-page":"6212","DOI":"10.1109\/TMC.2023.3319657","volume":"23","author":"S Shi","year":"2023","unstructured":"Shi, S., Guo, Y., Wang, D., Zhu, Y., Han, Z.: Distributionally robust federated learning for network traffic classification with noisy labels. IEEE Trans. Mob. Comput. 23(5), 6212\u20136226 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Wei, J., Zou, K.: Eda: easy data augmentation techniques for boosting performance on text classification tasks. arXiv preprint arXiv:1901.11196 (2019)","DOI":"10.18653\/v1\/D19-1670"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Xie, R., et al.: Rosetta: enabling robust TLS encrypted traffic classification in diverse network environments with tcp-aware traffic augmentation. In: Proceedings of the ACM Turing Award Celebration Conference-China 2023, pp. 131\u2013132 (2023)","DOI":"10.1145\/3603165.3607437"},{"key":"4_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108606","volume":"245","author":"X Yang","year":"2022","unstructured":"Yang, X., Zhang, Z., Cui, R.: Timeclr: a self-supervised contrastive learning framework for univariate time series representation. Knowl.-Based Syst. 245, 108606 (2022)","journal-title":"Knowl.-Based Syst."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Yeh, C.C.M., et\u00a0al.: Toward a foundation model for time series data. In: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, pp. 4400\u20134404 (2023)","DOI":"10.1145\/3583780.3615155"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, R., Wang, J., Chen, X., Ye, X.: Edw-voting: robust realtime traffic classification combined with flow side information. In: 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), pp. 438\u2013442. IEEE (2018)","DOI":"10.1109\/ICACI.2018.8377499"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Zheng, W., Gou, C., Yan, L., Mo, S.: Learning to classify: a flow-based relation network for encrypted traffic classification. In: Proceedings of The Web Conference 2020, pp. 13\u201322 (2020)","DOI":"10.1145\/3366423.3380090"},{"key":"4_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109406","volume":"118","author":"A Zou","year":"2024","unstructured":"Zou, A., Yang, W., Tang, C., Lu, J., Guo, J.: A novel and effective encrypted traffic classification method based on channel attention and deformable convolution. Comput. Electr. Eng. 118, 109406 (2024)","journal-title":"Comput. Electr. Eng."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:37Z","timestamp":1761812617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}