{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:24:59Z","timestamp":1773246299442,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["No.2022M712370"],"award-info":[{"award-number":["No.2022M712370"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Program for Innovative Research Team in University of Tianjin","award":["No. TD13-5034"],"award-info":[{"award-number":["No. TD13-5034"]}]},{"DOI":"10.13039\/501100010229","name":"Natural Science Foundation of Tianjin Municipal Science and Technology Commission","doi-asserted-by":"publisher","award":["No. H2021202008"],"award-info":[{"award-number":["No. H2021202008"]}],"id":[{"id":"10.13039\/501100010229","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project of Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, Anhui University","award":["No. MMC202108"],"award-info":[{"award-number":["No. MMC202108"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s00500-025-10462-w","type":"journal-article","created":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T21:58:07Z","timestamp":1739138287000},"page":"645-662","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Trustworthy deep learning for encrypted traffic classification"],"prefix":"10.1007","volume":"29","author":[{"given":"Zheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Yanbei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Changqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wanjin","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"key":"10462_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944","volume":"165","author":"G Aceto","year":"2019","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e8 A (2019) Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput Netw 165:106944","journal-title":"Comput Netw"},{"key":"10462_CR2","doi-asserted-by":"crossref","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e9 A (2021) Distiller: encrypted traffic classification via multimodal multitask deep learning. J Netw Comput Appl 102985","DOI":"10.1016\/j.jnca.2021.102985"},{"key":"10462_CR3","doi-asserted-by":"crossref","unstructured":"Akbari I, Salahuddin MA, Ven L, Limam N, Boutaba R, Mathieu B, Moteau S, Tuffin S (2021) A look behind the curtain: Traffic classification in an increasingly encrypted web 5(1)","DOI":"10.1145\/3447382"},{"issue":"2","key":"10462_CR4","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1080\/23742917.2017.1321891","volume":"1","author":"S Bagui","year":"2017","unstructured":"Bagui S, Fang X, Kalaimannan E, Bagui SC, Sheehan J (2017) Comparison of machine-learning algorithms for classification of vpn network traffic flow using time-related features. J Cyber Secur Technol 1(2):108\u2013126","journal-title":"J Cyber Secur Technol"},{"key":"10462_CR5","doi-asserted-by":"crossref","unstructured":"Bar-Yanai R, Langberg M, Peleg D, Roditty L (2010) Realtime classification for encrypted traffic. In: International symposium on experimental algorithms. Springer, pp 373\u2013385","DOI":"10.1007\/978-3-642-13193-6_32"},{"key":"10462_CR6","doi-asserted-by":"crossref","unstructured":"Beliard C, Finamore A, Rossi D (2020) Opening the deep pandora box: explainable traffic classification. In: IEEE INFOCOM 2020\u2014IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 1292\u20131293","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162704"},{"issue":"8","key":"10462_CR7","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio Y, Courville A, Vincent P (2013) Representation learning: a review and new perspectives. IEEE Trans Pattern Anal Mach Intell 35(8):1798\u20131828","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10462_CR8","unstructured":"Corbi\u00e8re C, Thome N, Bar-Hen A, Cord M, P\u00e9rez P (2019) Addressing failure prediction by learning model confidence. arXiv preprint arXiv:1910.04851"},{"issue":"5","key":"10462_CR9","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2677046.2677048","volume":"44","author":"SE Coull","year":"2014","unstructured":"Coull SE, Dyer KP (2014) Traffic analysis of encrypted messaging services: Apple imessage and beyond. ACM SIGCOMM Comput Commun Rev 44(5):5\u201311","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"1","key":"10462_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M Crotti","year":"2007","unstructured":"Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput Commun Rev 37(1):5\u201316","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"1","key":"10462_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","volume":"26","author":"A Dainotti","year":"2012","unstructured":"Dainotti A, Pescape A, Claffy KC (2012) Issues and future directions in traffic classification. IEEE Netw 26(1):35\u201340","journal-title":"IEEE Netw"},{"key":"10462_CR12","unstructured":"Dai J, Xu X, Gao H, Wang X, Xiao F (2022) Shape: A simultaneous header and payload encoding model for encrypted traffic classification. IEEE Trans Netw Serv Manag:1\u20131"},{"key":"10462_CR13","doi-asserted-by":"crossref","unstructured":"Davis J, Goadrich M (2006) The relationship between precision-recall and roc curves. In: Proceedings of the 23rd international conference on machine learning, pp 233\u2013240","DOI":"10.1145\/1143844.1143874"},{"key":"10462_CR14","doi-asserted-by":"crossref","unstructured":"Di\u00a0Mauro M, Longo M (2015) Revealing encrypted webrtc traffic via machine learning tools. In: 2015 12th international joint conference on e-business and telecommunications (ICETE), vol 4. IEEE, pp 259\u2013266","DOI":"10.5220\/0005542202590266"},{"issue":"3\u20134","key":"10462_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3233\/AF-170176","volume":"6","author":"M Dixon","year":"2017","unstructured":"Dixon M, Klabjan D, Bang JH (2017) Classification-based financial markets prediction using deep neural networks. Algorithm Finance 6(3\u20134):67\u201377","journal-title":"Algorithm Finance"},{"key":"10462_CR16","doi-asserted-by":"crossref","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407\u2013414","DOI":"10.5220\/0005740704070414"},{"key":"10462_CR17","doi-asserted-by":"crossref","unstructured":"Fauvel K, Finamore A, Chen F, Rossi D (2022) A lightweight, efficient and explainable-by-design convolutional neural network for internet traffic classification","DOI":"10.1145\/3580305.3599762"},{"issue":"8","key":"10462_CR18","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to roc analysis. Pattern Recogn Lett 27(8):861\u2013874","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"10462_CR19","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2013","unstructured":"Finsterbusch M, Richter C, Rocha E, Muller J-A, Hanssgen K (2013) A survey of payload-based traffic classification approaches. IEEE Commun Surv Tutor 16(2):1135\u20131156","journal-title":"IEEE Commun Surv Tutor"},{"key":"10462_CR20","unstructured":"Gal Y, Ghahramani Z (2016) Dropout as a bayesian approximation: Representing model uncertainty in deep learning. In: International conference on machine learning. PMLR, pp 1050\u20131059"},{"key":"10462_CR21","doi-asserted-by":"crossref","unstructured":"Goo Y-H, Shim K-S, Lee S-K, Kim M-S (2016) Payload signature structure for accurate application traffic classification. In: 2016 18th Asia-Pacific network operations and management symposium (APNOMS). IEEE, pp 1\u20134","DOI":"10.1109\/APNOMS.2016.7737287"},{"key":"10462_CR22","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"10462_CR23","doi-asserted-by":"crossref","unstructured":"Hecker S, Dai D, Van\u00a0Gool L (2018) Failure prediction for autonomous driving. In: 2018 IEEE intelligent vehicles symposium (IV). IEEE, pp 1792\u20131799","DOI":"10.1109\/IVS.2018.8500495"},{"key":"10462_CR24","unstructured":"Hendrycks D, Gimpel K (2017) A baseline for detecting misclassified and out-of-distribution examples in neural networks. In: International conference on learning representations. ICLR"},{"key":"10462_CR25","doi-asserted-by":"crossref","unstructured":"Huang H, Deng H, Chen J, Han L, Wang W (2018) Automatic multi-task learning system for abnormal network traffic detection. Int J Emerg Technol Learn 13(4)","DOI":"10.3991\/ijet.v13i04.8466"},{"key":"10462_CR26","doi-asserted-by":"crossref","unstructured":"Janai J, G\u00fcney F, Behl A, Geiger A et al (2020) Computer vision for autonomous vehicles: Problems, datasets and state of the art. Found Trends\u00ae Comput Gr Vis 12(1\u20133):1\u2013308","DOI":"10.1561\/0600000079"},{"key":"10462_CR27","doi-asserted-by":"crossref","unstructured":"Kumano Y, Ata S, Nakamura N, Nakahira Y, Oka I (2014) Towards real-time processing for application identification of encrypted traffic. In: 2014 International conference on computing, networking and communications (ICNC). IEEE, pp 136\u2013140","DOI":"10.1109\/ICCNC.2014.6785319"},{"key":"10462_CR28","unstructured":"Lakshminarayanan B, Pritzel A, Blundell C (2017) Simple and scalable predictive uncertainty estimation using deep ensembles. Adv Neural Inf Process Syst 30"},{"key":"10462_CR29","doi-asserted-by":"publisher","first-page":"18042","DOI":"10.1109\/ACCESS.2017.2747560","volume":"5","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5:18042\u201318050","journal-title":"IEEE Access"},{"issue":"3","key":"10462_CR30","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2020) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24(3):1999\u20132012","journal-title":"Soft Comput"},{"key":"10462_CR31","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1155\/2018\/9385947","volume":"2018","author":"VA Maksimenko","year":"2018","unstructured":"Maksimenko VA, Kurkin SA, Pitsik EN, Musatov VY, Runnova AE, Efremova TY, Hramov AE, Pisarchik AN (2018) Artificial neural network classification of motor-related eeg: an increase in classification accuracy by reducing signal complexity. Complexity 2018:90","journal-title":"Complexity"},{"key":"10462_CR32","volume-title":"Foundations of statistical natural language processing","author":"CD Manning","year":"1999","unstructured":"Manning CD, Sch\u00fctze H (1999) Foundations of statistical natural language processing. MIT Press, Cambridge"},{"key":"10462_CR33","doi-asserted-by":"crossref","unstructured":"Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: International workshop on passive and active network measurement. Springer, pp 41\u201354","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"10462_CR34","unstructured":"Moore A, Zuev D, Crogan M (2013) Discriminators for use in flow-based classification. Technical report"},{"key":"10462_CR35","unstructured":"Mukhoti J, Kulharia V, Sanyal A, Golodetz S, Torr P, Dokania P (2020) Calibrating deep neural networks using focal loss. In: Advances in neural information processing systems, vol 33, pp 15288\u201315299"},{"key":"10462_CR36","unstructured":"M\u00fcller R, Kornblith S, Hinton GE (2019) When does label smoothing help? In: Advances in neural information processing systems, vol 32, pp 1\u20139"},{"issue":"4","key":"10462_CR37","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1109\/TNSM.2021.3098157","volume":"18","author":"A Nascita","year":"2021","unstructured":"Nascita A, Montieri A, Aceto G, Ciuonzo D, Persico V, Pescap\u00e9 A (2021) Xai meets mobile traffic classification: Understanding and improving multimodal deep learning architectures. IEEE Trans Netw Serv Manage 18(4):4225\u20134246","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"10462_CR38","doi-asserted-by":"crossref","unstructured":"Nascita A, Montieri A, Aceto G, Ciuonzo D, Persico V, Pescap\u00e9 A (2023) Improving performance, reliability, and feasibility in multimodal multitask traffic classification with xai. IEEE Trans Netw Serv Manag:1\u20131","DOI":"10.1109\/COMST.2024.3504955"},{"key":"10462_CR39","doi-asserted-by":"crossref","unstructured":"Nguyen A, Yosinski J, Clune J (2015) Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 427\u2013436","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"10462_CR40","unstructured":"Park J-S, Yoon S-H, Kim M-S (2013) Performance improvement of payload signature-based traffic classification system using application traffic temporal locality. In: 2013 15th Asia-Pacific network operations and management symposium (APNOMS). IEEE, pp 1\u20136"},{"issue":"5","key":"10462_CR41","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. IEEE Commun Mag 57(5):76\u201381","journal-title":"IEEE Commun Mag"},{"key":"10462_CR42","doi-asserted-by":"crossref","unstructured":"Rezaei S, Liu X (2020) Multitask learning for network traffic classification. In: 2020 29th International conference on computer communications and networks (ICCCN). IEEE, pp 1\u20139","DOI":"10.1109\/ICCCN49398.2020.9209652"},{"issue":"3","key":"10462_CR43","doi-asserted-by":"publisher","first-page":"0118432","DOI":"10.1371\/journal.pone.0118432","volume":"10","author":"T Saito","year":"2015","unstructured":"Saito T, Rehmsmeier M (2015) The precision-recall plot is more informative than the roc plot when evaluating binary classifiers on imbalanced datasets. PLoS ONE 10(3):0118432","journal-title":"PLoS ONE"},{"issue":"2","key":"10462_CR44","doi-asserted-by":"publisher","first-page":"0212356","DOI":"10.1371\/journal.pone.0212356","volume":"14","author":"N Shahid","year":"2019","unstructured":"Shahid N, Rappon T, Berta W (2019) Applications of artificial neural networks in health care organizational decision-making: a scoping review. PLoS ONE 14(2):0212356","journal-title":"PLoS ONE"},{"key":"10462_CR45","unstructured":"Van\u00a0Amersfoort J, Smith L, Teh YW, Gal Y (2020) Uncertainty estimation using a single deep deterministic neural network. In: International conference on machine learning. PMLR, pp 9690\u20139700"},{"issue":"5","key":"10462_CR46","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1002\/nem.1901","volume":"25","author":"P Velan","year":"2015","unstructured":"Velan P, \u010cerm\u00e1k M, \u010celeda P, Dra\u0161ar M (2015) A survey of methods for encrypted traffic classification and analysis. Int J Netw Manage 25(5):355\u2013374","journal-title":"Int J Netw Manage"},{"key":"10462_CR47","doi-asserted-by":"crossref","unstructured":"Vu L, Bui CT, Nguyen QU (2017) A deep learning based method for handling imbalanced problem in network traffic classification. In: Proceedings of the eighth international symposium on information and communication technology, pp 333\u2013339","DOI":"10.1145\/3155133.3155175"},{"issue":"11","key":"10462_CR48","first-page":"1","volume":"24","author":"Z Wang","year":"2015","unstructured":"Wang Z (2015) The applications of deep learning on traffic identification. BlackHat USA 24(11):1\u201310","journal-title":"BlackHat USA"},{"key":"10462_CR49","doi-asserted-by":"crossref","unstructured":"Wang X, Parish DJ (2010) Optimised multi-stage tcp traffic classifier based on packet size distributions. In: 2010 Third international conference on communication theory, reliability, and quality of service. IEEE, pp 98\u2013103","DOI":"10.1109\/CTRQ.2010.24"},{"key":"10462_CR50","doi-asserted-by":"crossref","unstructured":"Wang D, Zhang L, Yuan Z, Xue Y, Dong Y (2014) Characterizing application behaviors for classifying p2p traffic. In: 2014 International conference on computing, networking and communications (ICNC). IEEE, pp 21\u201325","DOI":"10.1109\/ICCNC.2014.6785298"},{"key":"10462_CR51","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 43\u201348","DOI":"10.1109\/ISI.2017.8004872"},{"key":"10462_CR52","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International conference on information networking (ICOIN). IEEE, pp 712\u2013717","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"10462_CR53","doi-asserted-by":"publisher","first-page":"54024","DOI":"10.1109\/ACCESS.2019.2912896","volume":"7","author":"P Wang","year":"2019","unstructured":"Wang P, Chen X, Ye F, Sun Z (2019) A survey of techniques for mobile service encrypted traffic classification using deep learning. IEEE Access 7:54024\u201354033","journal-title":"IEEE Access"},{"key":"10462_CR54","doi-asserted-by":"crossref","unstructured":"Wang P, Bouaynaya NC, Mihaylova L, Wang J, Zhang Q, He R (2020) Bayesian neural networks uncertainty quantification with cubature rules. In: 2020 International joint conference on neural networks (IJCNN). IEEE, pp 1\u20137","DOI":"10.1109\/IJCNN48605.2020.9207214"},{"key":"10462_CR55","doi-asserted-by":"crossref","unstructured":"Yamansavascilar B, Guvensan MA, Yavuz AG, Karsligil ME (2017) Application identification via network traffic classification. In: 2017 International conference on computing, networking and communications (ICNC). IEEE, pp 843\u2013848","DOI":"10.1109\/ICCNC.2017.7876241"},{"issue":"2","key":"10462_CR56","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MCOM.001.2100736","volume":"60","author":"T Zhang","year":"2022","unstructured":"Zhang T, Qiu H, Mellia M, Li Y, Li H, Xu K (2022) Interpreting ai for networking: where we are and where we are going. IEEE Commun Mag 60(2):25\u201331","journal-title":"IEEE Commun Mag"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10462-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10462-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10462-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T02:04:10Z","timestamp":1739844250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10462-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10462"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10462-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2107276\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"9 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No Conflict of interest with anyone.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}