{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T22:12:34Z","timestamp":1766182354711,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756056"},{"type":"electronic","value":"9789819756063"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5606-3_2","type":"book-chapter","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:03:33Z","timestamp":1722243813000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Block Cipher Algorithms Identification Scheme Based on KFDA"],"prefix":"10.1007","author":[{"given":"Rongna","family":"Xie","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xinru","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Guozhen","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"2_CR1","unstructured":"Rao, M.B.: Classification of RSA and IDEA Ciphers. Indian Institute of Technology, Kanpur (2003)"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Zhicheng, Z., Yaqun, Z., Fengmei, L.: Recognition scheme of block cipher system based on randomness test. Journal of Cryptography 6(2), 177\u2013190. (2019) https:\/\/doi.org\/10.13868\/j.cnki.jcr.000293","DOI":"10.13868\/j.cnki.jcr.000293"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1007\/s11063-022-11005-2","volume":"55","author":"K Yuan","year":"2023","unstructured":"Yuan, K., Huang, Y., Li, J., et al.: A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model. Neural. Process. Lett. 55, 3185\u20133203 (2023). https:\/\/doi.org\/10.1007\/s11063-022-11005-2","journal-title":"Neural. Process. Lett."},{"issue":"03","key":"2_CR4","first-page":"79","volume":"9","author":"X Ruiqi","year":"2023","unstructured":"Ruiqi, X., Manman, L., Shaozhen, C.: Group cipher structure recognition based on machine learning. Journal of Network and Information Security 9(03), 79\u201389 (2023)","journal-title":"Journal of Network and Information Security"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Chou, J.W., Lin, S.D., Cheng, C.M.: On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. In: Acm Workshop on Security and Artificial Intelligence, pp. 105\u2013110. (2012) https:\/\/doi.org\/10.1145\/2381896.2381912","DOI":"10.1145\/2381896.2381912"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Mishra, S., Bhattacharjya, A.: Pattern analysis of cipher text: A combined approach. In: 2013 Inter-national Conference on Recent Trends in Information Technology (ICRTIT), pages 393\u2013398. (2013) https:\/\/doi.org\/10.1109\/ICRTIT.2013.6844236","DOI":"10.1109\/ICRTIT.2013.6844236"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Wang, X., Chen, Y., Wang, Q., et al.: A Password Regime Recognition Scheme Combining Feature Selection and Ensemble Learning. Computer Engineering, 47(01), 139\u2013145+153. (2021) https:\/\/doi.org\/10.19678\/j.issn.1000-3428.0056918","DOI":"10.19678\/j.issn.1000-3428.0056918"},{"issue":"003","key":"2_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3969\/j.issn.1008-2956.2015.03.011","volume":"000","author":"W Yang","year":"2015","unstructured":"Yang, W., Tao, W., Jindong, L.: Research on a new method of statistical detection of block cipher algorithm ciphertext. Journal of Ordnance Engineering College 000(003), 58\u201364 (2015). https:\/\/doi.org\/10.3969\/j.issn.1008-2956.2015.03.011","journal-title":"Journal of Ordnance Engineering College"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Liangtao, H., Zhicheng, Z., Yaqun, Z.: Hierarchical recognition scheme of cryptosystem based on random forest. Journal of Computer 41(002), 382\u2013399. (2018) https:\/\/doi.org\/10.11897\/SP.J.1016.2018.0038","DOI":"10.11897\/SP.J.1016.2018.0038"},{"issue":"01","key":"2_CR10","first-page":"156","volume":"53","author":"T Cheng","year":"2020","unstructured":"Cheng, T., Man, C., Qingbing, J.: Sequence cipher recognition based on ciphertext-only data. Communication Technology 53(01), 156\u2013160 (2020)","journal-title":"Communication Technology"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Satadal, S., Niloy, G., Pradipta, D., Sandip, C.: Exploiting Diversity in Android TLS Implementations for Mobile App Traffic Classification. In: The World Wide Web Conference (WWW \u201819). Association for Computing Machinery, New York, NY, USA, 1657\u20131668. (2019) https:\/\/doi.org\/10.1145\/3308558.3313738","DOI":"10.1145\/3308558.3313738"},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"516","DOI":"10.3390\/electronics12030516","volume":"12","author":"Z Shi","year":"2023","unstructured":"Shi, Z., Luktarhan, N., Song, Y., Tian, G.: BFCN: A Novel Classification Method of Encrypted Traffic Based on BERT and CNN. Electronics 12(3), 516 (2023). https:\/\/doi.org\/10.3390\/electronics12030516","journal-title":"Electronics"},{"issue":"1","key":"2_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/TCSVT.2003.818352","volume":"14","author":"Q Liu","year":"2004","unstructured":"Liu, Q., Hanqing, L., Ma, S.: Improving kernel Fisher discriminant analysis for face recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 42\u201349 (2004). https:\/\/doi.org\/10.1109\/TCSVT.2003.818352","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR14","unstructured":"UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/"},{"key":"2_CR15","unstructured":"Caltech-256 Object Category Dataset. https:\/\/authors.library.caltech.edu\/records\/5sv1j-ytw97"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5606-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:03:52Z","timestamp":1722243832000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5606-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756056","9789819756063"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5606-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}