{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T04:54:19Z","timestamp":1776228859765,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:00:00Z","timestamp":1769126400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:00:00Z","timestamp":1769126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Natural Science Foundation of Shandong Province of China under Grants","award":["No. ZR2023QF096"],"award-info":[{"award-number":["No. ZR2023QF096"]}]},{"name":"the Natural Science Foundation of Shandong Province","award":["No.ZR2023LZH004"],"award-info":[{"award-number":["No.ZR2023LZH004"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10922-025-10011-8","type":"journal-article","created":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T11:38:39Z","timestamp":1769168319000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FGFR-Net: An Improved Residual Network Encrypted Traffic Classification Model Based on Byte-Level Traffic Graphs"],"prefix":"10.1007","volume":"34","author":[{"given":"Yi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shanshan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenxiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,23]]},"reference":[{"issue":"5","key":"10011_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76\u201381 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"10011_CR2","doi-asserted-by":"crossref","unstructured":"Bader, O., et al.: MalDIST: From encrypted traffic classification to malware traffic detection and classification. In: 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC) (2022)","DOI":"10.1109\/CCNC49033.2022.9700625"},{"key":"10011_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.comnet.2014.11.001","volume":"76","author":"T Bujlow","year":"2015","unstructured":"Bujlow, T., Carela-Espa\u00f1ol, V., Barlet-Ros, P.: Independent comparison of popular DPI tools for traffic classification. Comput. Netw. 76, 75\u201389 (2015)","journal-title":"Comput. Netw."},{"issue":"2","key":"10011_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2023.102361","volume":"15","author":"RT Elmaghraby","year":"2024","unstructured":"Elmaghraby, R.T., et al.: Encrypted network traffic classification based on machine learning. Ain Shams Eng. J 15(2), 102361 (2024)","journal-title":"Ain Shams Eng. J"},{"key":"10011_CR5","doi-asserted-by":"crossref","unstructured":"Lin, X., et al.: Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference 2022 (2022)","DOI":"10.1145\/3485447.3512217"},{"key":"10011_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103175","volume":"128","author":"X Ma","year":"2023","unstructured":"Ma, X., et al.: EETC: An extended encrypted traffic classification algorithm based on variant resnet network. Comput. Secur. 128, 103175 (2023)","journal-title":"Comput. Secur."},{"key":"10011_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109602","volume":"224","author":"W Zhu","year":"2023","unstructured":"Zhu, W., et al.: ILETC: incremental learning for encrypted traffic classification using generative replay and exemplar. Comput. Netw. 224, 109602 (2023)","journal-title":"Comput. Netw."},{"key":"10011_CR8","unstructured":"Xu, K., et al.: How powerful are graph neural networks?. arXiv preprint arXiv:1810.00826 (2018)"},{"key":"10011_CR9","doi-asserted-by":"crossref","unstructured":"Dai, J., et al.: Deformable convolutional networks. In: Proceedings of the IEEE International Conference on Computer Vision (2017)","DOI":"10.1109\/ICCV.2017.89"},{"key":"10011_CR10","unstructured":"Sifre, L., St\u00e9phane, M.: Rigid-motion scattering for texture classification. arXiv preprint arXiv:1403.1687 (2014)"},{"key":"10011_CR11","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J.Y., et al.: CBAM: convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV) 3-19 (2018)","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"10011_CR12","doi-asserted-by":"crossref","unstructured":"Cui, Y., Jia, M., Lin, T.Y., et al.: Class-balanced loss based on effective number of samples. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 9268\u20139277 (2019)","DOI":"10.1109\/CVPR.2019.00949"},{"key":"10011_CR13","doi-asserted-by":"crossref","unstructured":"Van Ede, T., et al.: Flowprint: semi-supervised mobile-app fingerprinting on encrypted network traffic. In: Network and Distributed System Security Symposium (NDSS), vol. 27 (2020)","DOI":"10.14722\/ndss.2020.24412"},{"issue":"3","key":"10011_CR14","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi, M., et al.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. 24(3), 1999\u20132012 (2020)","journal-title":"Soft. Comput."},{"issue":"1","key":"10011_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","volume":"13","author":"VF Taylor","year":"2017","unstructured":"Taylor, V.F., et al.: Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans. Inf. Forensic. Secur. 13(1), 63\u201378 (2017)","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"10011_CR16","doi-asserted-by":"crossref","unstructured":"Panchenko, A., et al.: Website fingerprinting at internet scale. NDSS (2016)","DOI":"10.14722\/ndss.2016.23477"},{"key":"10011_CR17","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: 25th USENIX security symposium (USENIX security 16) (2016)"},{"key":"10011_CR18","doi-asserted-by":"crossref","unstructured":"Al-Naami, K., et al.: Adaptive encrypted traffic fingerprinting with bi-directional dependence. In: Proceedings of the 32nd Annual Conference on Computer Security Applications (2016)","DOI":"10.1145\/2991079.2991123"},{"key":"10011_CR19","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"10011_CR20","doi-asserted-by":"crossref","unstructured":"Sirinam, P., et al.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018)","DOI":"10.1145\/3243734.3243768"},{"key":"10011_CR21","doi-asserted-by":"crossref","unstructured":"Liu, C., et al.: FS-Net : a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference On Computer Communications. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"10011_CR22","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TIFS.2021.3050608","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen, M., et al.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367\u20132380 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10011_CR23","doi-asserted-by":"crossref","unstructured":"He, H.Y., Zhi Guo Y., Xiang N.C.: PERT: payload encoding representation from transformer for encrypted traffic classification. In: 2020 ITU kaleidoscope: industry-driven digital transformation (ITU K). IEEE (2020)","DOI":"10.23919\/ITUK50268.2020.9303204"},{"issue":"3","key":"10011_CR24","doi-asserted-by":"publisher","first-page":"516","DOI":"10.3390\/electronics12030516","volume":"12","author":"Z Shi","year":"2023","unstructured":"Shi, Z., et al.: BFCN: a novel classification method of encrypted traffic based on BERT and CNN. Electronics 12(3), 516 (2023)","journal-title":"Electronics"},{"key":"10011_CR25","doi-asserted-by":"crossref","unstructured":"He, K., et al.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"10011_CR26","doi-asserted-by":"crossref","unstructured":"Lim, H.-K., et al.: Packet-based network traffic classification using deep learning. In: 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","DOI":"10.1109\/ICAIIC.2019.8669045"},{"issue":"4","key":"10011_CR27","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TLA.2023.10128928","volume":"21","author":"C Su","year":"2023","unstructured":"Su, C., Liu, Y., Xie, X.: Fine-grained traffic classification based on improved residual convolutional network in software defined networks. IEEE Lat. Am. Trans. 21(4), 565\u2013572 (2023)","journal-title":"IEEE Lat. Am. Trans."},{"key":"10011_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109406","volume":"118","author":"A Zou","year":"2024","unstructured":"Zou, A., et al.: A novel and effective encrypted traffic classification method based on channel attention and deformable convolution. Comput. Electr. Eng. 118, 109406 (2024)","journal-title":"Comput. Electr. Eng."},{"key":"10011_CR29","doi-asserted-by":"crossref","unstructured":"Sun, B., et al.: An encrypted traffic classification method combining graph convolutional network and autoencoder. In: 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) (2020)","DOI":"10.1109\/IPCCC50635.2020.9391542"},{"key":"10011_CR30","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., et al.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP) (2016)","DOI":"10.5220\/0005740704070414"},{"key":"10011_CR31","unstructured":"Wang, W., et al.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN) (2017)"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-10011-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-10011-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-10011-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T04:02:17Z","timestamp":1776225737000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-10011-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,23]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["10011"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-10011-8","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,23]]},"assertion":[{"value":"3 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"37"}}