{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:41:07Z","timestamp":1775886067570,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00930-6","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:02:35Z","timestamp":1576490555000},"page":"103-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Deep learning-based real-time VPN encrypted traffic identification methods"],"prefix":"10.1007","volume":"17","author":[{"given":"Lulu","family":"Guo","sequence":"first","affiliation":[]},{"given":"Qianqiong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Huijie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,2]]},"reference":[{"issue":"9","key":"930_CR1","first-page":"154","volume":"37","author":"P Wubin","year":"2016","unstructured":"Wubin, P., Guang, C., Xiaojun, G., et al.: Review and perspective on encrypted traffic identification research[J]. Trans. Commun. 37(9), 154\u2013167 (2016) (in Chinese)","journal-title":"Trans. Commun."},{"issue":"9","key":"930_CR2","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1587\/transinf.2016EDP7490","volume":"E100D","author":"L Qi","year":"2017","unstructured":"Qi, L., Zhou, Z., Jiguo, Yu., Liu, Q.: Data-sparsity tolerant web service recommendation approach based on improved collaborative filtering. IEICE Trans. Inf. Syst. E100D(9), 2092\u20132099 (2017)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"3","key":"930_CR3","first-page":"111","volume":"30","author":"W Wei","year":"2017","unstructured":"Wei, W., Zhang, H., Li, B., et al.: Active Identification of VPN server based on correlation detecting[J]. Ind. Control Comput. 30(3), 111\u2013112 (2017) (in Chinese)","journal-title":"Ind. Control Comput."},{"key":"930_CR4","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., et al.: Characterization of encrypted and VPN traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), pp. 407\u2013414 (2016)","DOI":"10.5220\/0005740704070414"},{"issue":"2","key":"930_CR5","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1080\/23742917.2017.1321891","volume":"1","author":"S Bagui","year":"2017","unstructured":"Bagui, S., Fang, X., Kalaimannan, E., et al.: Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features. J. Cyber Secur. Technol. 1(2), 108\u2013126 (2017)","journal-title":"J. Cyber Secur. Technol."},{"key":"930_CR6","doi-asserted-by":"crossref","unstructured":"Yamansavascilar, B., Guvensan, M.A., Yavuz, A.G., et al.: Application identification via network traffic classification. In: IEEE International Conference on Computing, Networking and Communications (ICNC). IEEE, pp. 843\u2013848 (2017)","DOI":"10.1109\/ICCNC.2017.7876241"},{"key":"930_CR7","unstructured":"Wang, Z.: The applications of deep learning on traffic identification[J]. BlackHat USA, 24p (2015)"},{"key":"930_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2","author":"M Lotfollahi","year":"2017","unstructured":"Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., et al.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. (2017). https:\/\/doi.org\/10.1007\/s00500-019-04030-2","journal-title":"Soft. Comput."},{"key":"930_CR9","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, pp. 43\u201348 (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"930_CR10","unstructured":"Li, D., Zhu, Y., Lin. W.: Mobile app traffic identification based on visual perception feature[J]. J. Comput. App. 2019(4) (in Chinese)"},{"key":"930_CR11","doi-asserted-by":"publisher","DOI":"10.14132\/j.cnki.1673-5439.2018.06.006","author":"X Chen","year":"2018","unstructured":"Chen, X., Wang, P., Yu, J.: CNN based encrypted traffic identification method. J. Nanjing Univ. Posts Telecommun. Nat. Sci. Edn. (2018). https:\/\/doi.org\/10.14132\/j.cnki.1673-5439.2018.06.006","journal-title":"J. Nanjing Univ. Posts Telecommun. Nat. Sci. Edn."},{"issue":"11","key":"930_CR12","doi-asserted-by":"publisher","first-page":"140","DOI":"10.19678\/j.issn.1000-3428.0052059","volume":"44","author":"P Wang","year":"2018","unstructured":"Wang, P., Chen, X.: SAE-based encrypted traffic identification method. Comput. Eng. 44(11), 140\u2013147 (2018). https:\/\/doi.org\/10.19678\/j.issn.1000-3428.0052059","journal-title":"Comput. Eng."},{"key":"930_CR13","unstructured":"Wang, W., Zhu, M., Zeng, X., et al.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN). IEEE, pp. 712\u2013717 (2017)"},{"issue":"19","key":"930_CR14","first-page":"184","volume":"53","author":"Q Jia","year":"2017","unstructured":"Jia, Q., Wang, X., Zhou, L., et al.: New Local feature description algorithm based on improved convolutional auto-encoder[J]. Comput.\nEng. Appl. 53(19), 184\u2013191 (2017) (in Chinese)","journal-title":"Comput. Eng. Appl."},{"key":"930_CR15","unstructured":"Zhao, J., Mathieu, M., Goroshin, R., et al.: Stacked what-where auto-encoders[J] (2015). http:\/\/arXiv.org\/abs\/1506.02351"},{"issue":"3","key":"930_CR16","doi-asserted-by":"publisher","first-page":"697","DOI":"10.32604\/cmc.2019.05375","volume":"58","author":"F Xu","year":"2019","unstructured":"Xu, F., Zhang, X., Xin, Z., et al.: Investigation on the Chinese text sentiment analysis based on convolutional neural networks in deep learning[J]. Comput. Mater. Contin 58(3), 697\u2013709 (2019)","journal-title":"Comput. Mater. Contin"},{"issue":"1","key":"930_CR17","first-page":"297","volume":"59","author":"L Pan","year":"2019","unstructured":"Pan, L., Qin, J., Chen, H., et al.: Image augmentation-based food recognition with convolutional neural networks[J]. CMC Comput. Mater. Contin. 59(1), 297\u2013313 (2019)","journal-title":"CMC Comput. Mater. Contin."},{"issue":"2","key":"930_CR18","first-page":"451","volume":"58","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Xiang, B., Song, Y., et al.: An improved unsupervised image segmentation method based on multi-objective particle swarm optimization clustering algorithm[J]. CMC Comput. Mater. Contin. 58(2), 451\u2013461 (2019). (ISBN:978-1-4503-0000-0\/18\/06)","journal-title":"CMC Comput. Mater. Contin."},{"issue":"2","key":"930_CR19","doi-asserted-by":"publisher","first-page":"379","DOI":"10.32604\/cmc.2019.04059","volume":"58","author":"X Hong","year":"2019","unstructured":"Hong, X., Zheng, X., Xia, J., et al.: Cross-lingual non-ferrous metals related news recognition method based on CNN with a limited bi-lingual dictionary[J]. Comput. Mater. Contin. 58(2), 379\u2013389 (2019)","journal-title":"Comput. Mater. Contin."},{"issue":"5","key":"930_CR20","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76\u201381 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"930_CR21","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp 249\u2013256 (2010)"},{"issue":"13","key":"930_CR22","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Mu, Y., Wu, Q.M.J.: Coverless Image steganography using partial-duplicate image retrieval[J]. Soft Comput. 23(13), 4927\u20134938 (2019)","journal-title":"Soft Comput."},{"key":"930_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2019.2919570","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Wu, J.Q.M., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans Big Data (2019). https:\/\/doi.org\/10.1109\/tbdata.2019.2919570","journal-title":"IEEE Trans Big Data"},{"key":"930_CR24","doi-asserted-by":"crossref","unstructured":"Yildirim, T., Radcliffe, P.J.: VoIP traffic classification in IPSec tunnels. In: 2010 International Conference on Electronics and Information Engineering. IEEE, Vol 1, pp V1-151\u2013V1-157 (2010)","DOI":"10.1109\/ICEIE.2010.5559900"},{"issue":"1","key":"930_CR25","first-page":"125","volume":"16","author":"E Ximenes","year":"2017","unstructured":"Ximenes, E., Yeo, K.C., Azam, S., et al.: Performance analysis of various encryption techniques in communication network[J]. Asian J. Inf. Technol. 16(1), 125\u2013130 (2017)","journal-title":"Asian J. Inf. Technol."},{"key":"930_CR26","doi-asserted-by":"crossref","unstructured":"Singh, K.K.V.V., Gupta, H.: A new approach for the security of VPN. In: Proceedings of the Second International conference on Information and Communication Technology for Competitive Strategies. ACM, 13p (2016)","DOI":"10.1145\/2905055.2905219"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00930-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00930-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00930-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T01:27:09Z","timestamp":1606786029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00930-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["930"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00930-6","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,2]]},"assertion":[{"value":"30 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}