{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:58:47Z","timestamp":1772823527205,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2019YFB1804003"],"award-info":[{"award-number":["2019YFB1804003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10489-021-03032-8","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T19:02:36Z","timestamp":1642446156000},"page":"10741-10756","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["MTT: an efficient model for encrypted network traffic classification using multi-task transformer"],"prefix":"10.1007","volume":"52","author":[{"given":"Weiping","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Jianhao","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Qizhi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gansen","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"issue":"2","key":"3032_CR1","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","volume":"16","author":"G Aceto","year":"2019","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e9 A (2019) Mobile encrypted traffic using deep learning: Experimental evaluation, lessons learned, and challenges. IEEE Transactions on Network and Service Management 16(2):445\u2013458","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"3032_CR2","unstructured":"Yao H, Liu C, Zhang P, Wu S, Jiang C, Yu S (2019) Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans Big Data"},{"issue":"3","key":"3032_CR3","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2020) Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing 24(3):1999\u20132012","journal-title":"Soft Computing"},{"key":"3032_CR4","doi-asserted-by":"crossref","unstructured":"Wang M, Zheng K, Luo D, Yang Y, Wang X (2020a) An encrypted traffic classification framework based on convolutional neural networks and stacked autoencoders. In: 2020 IEEE 6th international conference on computer and communications (ICCC). IEEE, pp 634\u2013641","DOI":"10.1109\/ICCC51575.2020.9344978"},{"key":"3032_CR5","doi-asserted-by":"crossref","unstructured":"Shapira T, Shavitt Y (2019) Flowpic: Encrypted internet traffic classification is as easy as image recognition. In: IEEE INFOCOM 2019-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 680\u2013687","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"3032_CR6","doi-asserted-by":"publisher","first-page":"106214","DOI":"10.1016\/j.knosys.2020.106214","volume":"209","author":"C Hu","year":"2020","unstructured":"Hu C, Wang Y, Gu J (2020) Cross-domain intelligent fault classification of bearings based on tensor-aligned invariant subspace learning and two-dimensional convolutional neural networks. Knowledge-Based Systems 209:106214","journal-title":"Knowledge-Based Systems"},{"key":"3032_CR7","doi-asserted-by":"crossref","unstructured":"Cui S, Jiang B, Cai Z, Lu Z, Liu S, Liu J (2019) A session-packets-based encrypted traffic classification using capsule neural networks. In: 2019 IEEE 21st international conference on high performance computing and communications; IEEE 17th international conference on smart city; IEEE 5th international conference on data science and systems (HPCC\/SmartCity\/DSS). IEEE, pp 429\u2013436","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00071"},{"key":"3032_CR8","doi-asserted-by":"publisher","first-page":"132950","DOI":"10.1109\/ACCESS.2020.3010637","volume":"8","author":"Z Bu","year":"2020","unstructured":"Bu Z, Zhou B, Cheng P, Zhang K, Ling ZH (2020) Encrypted network traffic classification using deep and parallel network-in-network models. IEEE Access 8:132950\u2013132959","journal-title":"IEEE Access"},{"key":"3032_CR9","doi-asserted-by":"crossref","unstructured":"Ma Q, Huang W, Jin Y, Mao J (2021) Encrypted traffic classification based on traffic reconstruction. In: 2021 4th International conference on artificial intelligence and big data (ICAIBD). IEEE, pp 572\u2013576","DOI":"10.1109\/ICAIBD51990.2021.9459072"},{"key":"3032_CR10","doi-asserted-by":"crossref","unstructured":"Sun B, Yang W, Yan M, Wu D, Zhu Y, Bai Z (2020) An encrypted traffic classification method combining graph convolutional network and autoencoder. In: 2020 IEEE 39th international performance computing and communications conference (IPCCC). IEEE, pp 1\u20138","DOI":"10.1109\/IPCCC50635.2020.9391542"},{"key":"3032_CR11","doi-asserted-by":"crossref","unstructured":"Vu L, Thuy HV, Nguyen QU, Ngoc TN, Nguyen DN, Hoang DT, Dutkiewicz E (2018) Time series analysis for encrypted traffic classification: A deep learning approach. In: 2018 18th international symposium on communications and information technologies (ISCIT). IEEE, pp 121\u2013126","DOI":"10.1109\/ISCIT.2018.8587975"},{"issue":"1","key":"3032_CR12","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.comnet.2011.09.007","volume":"56","author":"CN Lu","year":"2012","unstructured":"Lu CN, Huang CY, Lin YD, Lai YC (2012) Session level flow classification by packet size distribution and session grouping. Computer Networks 56(1):260\u2013272","journal-title":"Computer Networks"},{"issue":"1","key":"3032_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M Crotti","year":"2007","unstructured":"Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Computer Communication Review 37(1):5\u201316","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"5","key":"3032_CR14","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1002\/nem.1981","volume":"27","author":"KS Shim","year":"2017","unstructured":"Shim KS, Ham JH, Sija BD, Kim MS (2017) Application traffic classification using payload size sequence signature. International Journal of Network Management 27(5):1981","journal-title":"International Journal of Network Management"},{"key":"3032_CR15","unstructured":"Lin T, Wang Y, Liu X, Qiu X (2021) A survey of transformers.\u00a0arXiv:21060 4554. Accessed 8 June 2021"},{"key":"3032_CR16","doi-asserted-by":"crossref","unstructured":"Zou Z, Ge J, Zheng H, Wu Y, Han C, Yao Z (2018) Encrypted traffic classification with a convolutional long short-term memory neural network. In: 2018 IEEE 20th international conference on high performance computing and communications; IEEE 16th International conference on smart city; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE, pp 329\u2013334","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"3032_CR17","doi-asserted-by":"crossref","unstructured":"Rezaei S, Liu X (2020) Multitask learning for network traffic classification. In: 2020 29th International conference on computer communications and networks (ICCCN). IEEE, pp 1\u20139","DOI":"10.1109\/ICCCN49398.2020.9209652"},{"issue":"9","key":"3032_CR18","doi-asserted-by":"publisher","first-page":"10362","DOI":"10.1109\/TVT.2020.3005724","volume":"69","author":"A Rago","year":"2020","unstructured":"Rago A, Piro G, Boggia G, Dini P (2020) Multi-task learning at the mobile edge: An effective way to combine traffic classification and prediction. IEEE Transactions on Vehicular Technology 69(9):10362\u201310374","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3032_CR19","doi-asserted-by":"crossref","unstructured":"Cheng J, He R, Yuepeng E, Wu Y, You J, Li T (2020) Real-time encrypted traffic classification via lightweight neural networks. In: GLOBECOM 2020-2020 IEEE global communications conference. IEEE, pp 1\u20136","DOI":"10.1109\/GLOBECOM42002.2020.9322309"},{"key":"3032_CR20","doi-asserted-by":"publisher","first-page":"114363","DOI":"10.1016\/j.eswa.2020.114363","volume":"167","author":"X Ren","year":"2021","unstructured":"Ren X, Gu H, Wei W (2021) Tree-rnn: Tree structural recurrent neural network for network traffic classification. Expert Systems with Applications 167:114363","journal-title":"Expert Systems with Applications"},{"key":"3032_CR21","doi-asserted-by":"publisher","first-page":"108267","DOI":"10.1016\/j.comnet.2021.108267","volume":"196","author":"G Xie","year":"2021","unstructured":"Xie G, Li Q, Jiang Y (2021) Self-attentive deep learning method for online traffic classification and its interpretability. Computer Networks 196:108267","journal-title":"Computer Networks"},{"issue":"1","key":"3032_CR22","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s11554-019-00930-6","volume":"17","author":"L Guo","year":"2020","unstructured":"Guo L, Wu Q, Liu S, Duan M, Li H, Sun J (2020) Deep learning-based real-time vpn encrypted traffic identification methods. Journal of Real-Time Image Processing 17(1):103\u2013114","journal-title":"Journal of Real-Time Image Processing"},{"key":"3032_CR23","doi-asserted-by":"publisher","first-page":"107258","DOI":"10.1016\/j.comnet.2020.107258","volume":"176","author":"C Dong","year":"2020","unstructured":"Dong C, Zhang C, Lu Z, Liu B, Jiang B (2020) Cetanalytics: Comprehensive effective traffic information analytics for encrypted traffic classification. Computer Networks 176:107258","journal-title":"Computer Networks"},{"issue":"1","key":"3032_CR24","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/TPDS.2012.98","volume":"24","author":"J Zhang","year":"2012","unstructured":"Zhang J, Xiang Y, Wang Y, Zhou W, Xiang Y, Guan Y (2012) Network traffic classification using correlation information. IEEE Transactions on Parallel and Distributed systems 24(1):104\u2013117","journal-title":"IEEE Transactions on Parallel and Distributed systems"},{"issue":"1","key":"3032_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0162-3","volume":"6","author":"JM Johnson","year":"2019","unstructured":"Johnson JM, Khoshgoftaar TM (2019) Survey on deep learning with class imbalance. Journal of Big Data 6(1):1\u201354","journal-title":"Journal of Big Data"},{"key":"3032_CR26","doi-asserted-by":"crossref","unstructured":"Wang P, Li S, Ye F, Wang Z, Zhang M (2020b) Packetcgan: Exploratory study of class imbalance for encrypted traffic classification using cgan. In: ICC 2020-2020 IEEE international conference on communications (ICC). IEEE, pp 1\u20137","DOI":"10.1109\/ICC40277.2020.9148946"},{"key":"3032_CR27","doi-asserted-by":"crossref","unstructured":"Soleymanpour S, Sadr H, Soleimandarabi MN (2021) Cscnn: Cost-sensitive convolutional neural network for encrypted traffic classification. Neural Process Lett :1\u201327","DOI":"10.1007\/s11063-021-10534-6"},{"key":"3032_CR28","doi-asserted-by":"crossref","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407\u2013414","DOI":"10.5220\/0005740704070414"},{"issue":"1","key":"3032_CR29","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1007379606734","volume":"28","author":"R Caruana","year":"1997","unstructured":"Caruana R (1997) Multitask learning. Machine Learning 28(1):41\u201375","journal-title":"Machine Learning"},{"key":"3032_CR30","doi-asserted-by":"crossref","unstructured":"Vu L, Bui CT, Nguyen QU (2017) A deep learning based method for handling imbalanced problem in network traffic classification. In: Proceedings of the eighth international symposium on information and communication technology, pp 333\u2013339","DOI":"10.1145\/3155133.3155175"},{"key":"3032_CR31","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.neucom.2018.07.091","volume":"343","author":"SE G\u00f3mez","year":"2019","unstructured":"G\u00f3mez SE, Hern\u00e1ndez-Callejo L, Mart\u00ednez BC, S\u00e1nchez-Esguevillas AJ (2019) Exploratory study on class imbalance and solutions for network traffic classification. Neurocomputing 343:100\u2013119","journal-title":"Neurocomputing"},{"key":"3032_CR32","unstructured":"Ba JL, Kiros JR, Hinton GE (2016) Layer normalization. arXiv:16070 6450. Accessed 21 July 2016"},{"key":"3032_CR33","doi-asserted-by":"crossref","unstructured":"Guo M, Haque A, Huang DA, Yeung S, Fei-Fei L (2018) Dynamic task prioritization for multitask learning. In: Proceedings of the european conference on computer vision (ECCV), pp 270\u2013287","DOI":"10.1007\/978-3-030-01270-0_17"},{"key":"3032_CR34","doi-asserted-by":"crossref","unstructured":"Liu S, Johns E, Davison AJ (2019) End-to-end multi-task learning with attention. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 1871\u20131880","DOI":"10.1109\/CVPR.2019.00197"},{"issue":"4","key":"3032_CR35","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1007\/s10489-020-02011-9","volume":"51","author":"C Hu","year":"2021","unstructured":"Hu C, He S, Wang Y (2021) A classification method to detect faults in a rotating machinery based on kernelled support tensor machine and multilinear principal component analysis. Applied Intelligence 51(4):2609\u20132621","journal-title":"Applied Intelligence"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-03032-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-03032-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-03032-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T07:41:45Z","timestamp":1655710905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-03032-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":35,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["3032"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-03032-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"23 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}