{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:00Z","timestamp":1772119980734,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Innovation Fund of the Engineering Research Center of Integration","award":["1311020"],"award-info":[{"award-number":["1311020"]}]},{"name":"Application of Digital Learning Technology, Ministry of Education","award":["1311002"],"award-info":[{"award-number":["1311002"]}]},{"DOI":"10.13039\/501100009159","name":"Lianyungang Science and Technology Bureau","doi-asserted-by":"publisher","award":["CG2322"],"award-info":[{"award-number":["CG2322"]}],"id":[{"id":"10.13039\/501100009159","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China, 2023","award":["YFB3209803"],"award-info":[{"award-number":["YFB3209803"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62002047"],"award-info":[{"award-number":["62002047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01893-7","type":"journal-article","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:37:07Z","timestamp":1737074227000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A steganographic backdoor attack scheme on encrypted traffic"],"prefix":"10.1007","volume":"18","author":[{"given":"Bing","family":"Rao","sequence":"first","affiliation":[]},{"given":"Guiqin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Qiaolong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Dajiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mingsheng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Feiyan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"1893_CR1","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding, 4171\u20134186"},{"key":"1893_CR2","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown T, Mann B, Ryder N, Subbiah M, Kaplan JD, Dhariwal P, Neelakantan A, Shyam P, Sastry G, Askell A et al (2020) Language models are few-shot learners. Adv Neural Inf Process Syst 33:1877\u20131901","journal-title":"Adv Neural Inf Process Syst"},{"key":"1893_CR3","doi-asserted-by":"crossref","unstructured":"Wang Q, Xiao P, Li X, Qiu Y, Zheng T, Qin Z (2024) Taas: Trust assessment as a service for secure communication of green edge-assisted uav network. Peer-to-peer Netw Appl, 1\u201316","DOI":"10.1007\/s12083-024-01701-2"},{"issue":"3","key":"1893_CR4","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1007\/s12083-023-01478-w","volume":"16","author":"P Victor","year":"2023","unstructured":"Victor P, Lashkari AH, Lu R, Sasi T, Xiong P, Iqbal S (2023) Iot malware: An attribute-based taxonomy, detection mechanisms and challenges. Peer-to-peer Netw Appl 16(3):1380\u20131431","journal-title":"Peer-to-peer Netw Appl"},{"key":"1893_CR5","doi-asserted-by":"crossref","unstructured":"Maarouf R, Sattar D, Matrawy A (2021) Evaluating resilience of encrypted traffic classification against adversarial evasion attacks. In: 2021 IEEE Symposium on Computers and Communications (ISCC), pp 1\u20136. IEEE","DOI":"10.1109\/ISCC53001.2021.9631407"},{"key":"1893_CR6","doi-asserted-by":"crossref","unstructured":"Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1625\u20131634. IEEE","DOI":"10.1109\/CVPR.2018.00175"},{"key":"1893_CR7","doi-asserted-by":"crossref","unstructured":"Ding Y, Zhu G, Chen D, Qin X, Cao M, Qin Z (2022) Adversarial sample attack and defense method for encrypted traffic data. IEEE Trans Intell Transp Syst 23(10):18024\u201318039. IEEE","DOI":"10.1109\/TITS.2022.3154884"},{"key":"1893_CR8","doi-asserted-by":"crossref","unstructured":"Shen L, Ji S, Zhang X, Li J, Chen J, Shi J, Fang C, Yin J, Wang T (2021) Backdoor pre-trained models can transfer to all. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 3141\u20133158","DOI":"10.1145\/3460120.3485370"},{"key":"1893_CR9","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1007\/s12083-020-01031-z","volume":"14","author":"M Xue","year":"2021","unstructured":"Xue M, He C, Wang J, Liu W (2021) Backdoors hidden in facial features: A novel invisible backdoor attack against face recognition systems. Peer-to-peer Netw Appl 14:1458\u20131474","journal-title":"Peer-to-peer Netw Appl"},{"key":"1893_CR10","doi-asserted-by":"crossref","unstructured":"Liu K, Dolan-Gavitt B, Garg S (2018) Fine-pruning: Defending against backdooring attacks on deep neural networks. In: International Symposium on Research in Attacks, Intrusions, and Defenses, pp 273\u2013294. Springer","DOI":"10.1007\/978-3-030-00470-5_13"},{"issue":"1","key":"1893_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TNNLS.2022.3182979","volume":"35","author":"Y Li","year":"2022","unstructured":"Li Y, Jiang Y, Li Z et al (2022) Backdoor learning: A survey. IEEE Trans Neural Netw Learn Syst 35(1):5\u201322","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1893_CR12","first-page":"134","volume":"4","author":"Y Gao","year":"2020","unstructured":"Gao Y, Doan BG, Zhang Z, Ma S, Zhang J, Fu A, Nepal S, Kim H (2020) Backdoor attacks and countermeasures on deep learning: A comprehensive review. IEEE Open J Comput Soc 4:134\u2013146","journal-title":"IEEE Open J Comput Soc"},{"key":"1893_CR13","unstructured":"Gu T, Dolan-Gavitt B, Garg S (2017) Badnets: Identifying vulnerabilities in the machine learning model supply chain. CoRR abs\/1708.06733"},{"key":"1893_CR14","first-page":"3570","volume":"192","author":"X Chen","year":"2017","unstructured":"Chen X, Liu C, Li B, Lu K, Song D (2017) Targeted backdoor attacks on deep learning systems using data poisoning. Procedia Comput Sci 192:3570\u20133579","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"1893_CR15","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.1007\/s12083-022-01377-6","volume":"15","author":"C Chen","year":"2022","unstructured":"Chen C, Wei L, Zhang L, Peng Y, Ning J (2022) Mp-badnet+: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private dnns. Peer-to-peer Netw Appl 15(6):2457\u20132473","journal-title":"Peer-to-peer Netw Appl"},{"issue":"1","key":"1893_CR16","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/s12083-022-01434-0","volume":"16","author":"H Zhang","year":"2023","unstructured":"Zhang H, Gu J, Zhang Z, Du L, Zhang Y, Ren Y, Zhang J, Li H (2023) Backdoor attacks against deep reinforcement learning based traffic signal control systems. Peer-to-peer Netw Appl 16(1):466\u2013474","journal-title":"Peer-to-peer Netw Appl"},{"key":"1893_CR17","volume":"120","author":"B Chen","year":"2018","unstructured":"Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T, Molloy I, Srivastava B (2018) Detecting backdoor attacks on deep neural networks by activation clustering. Computers & Security 120:102814","journal-title":"Computers & Security"},{"key":"1893_CR18","doi-asserted-by":"crossref","unstructured":"Wang Y, Su Z, Zhang N, Xing R, Liu D, Luan TH, Shen X (2022) A survey on metaverse: Fundamentals, security, and privacy. IEEE Commun Surv Tutor 25(1):319\u2013352. IEEE","DOI":"10.1109\/COMST.2022.3202047"},{"key":"1893_CR19","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Zeng X al (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp 712\u2013717. IEEE","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"1893_CR20","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.eswa.2019.01.064","volume":"125","author":"AS Shekhawat","year":"2019","unstructured":"Shekhawat AS, Di Troia F, Stamp M (2019) Feature analysis of encrypted malicious traffic. Expert Syst Appl 125:130\u2013141","journal-title":"Expert Syst Appl"},{"key":"1893_CR21","doi-asserted-by":"crossref","unstructured":"Wang P, Li S, Ye F, Wang Z, Zhang M (2020) Packetcgan: Exploratory study of class imbalance for encrypted traffic classification using cgan. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp 1\u20137. IEEE","DOI":"10.1109\/ICC40277.2020.9148946"},{"issue":"1","key":"1893_CR22","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s12083-023-01595-6","volume":"17","author":"F Li","year":"2024","unstructured":"Li F, Shen H, Mai J, Wang T, Dai Y, Miao X (2024) Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection. Peer-to-peer Netw Appl 17(1):227\u2013245","journal-title":"Peer-to-peer Netw Appl"},{"key":"1893_CR23","doi-asserted-by":"crossref","unstructured":"Shahbaz R, Liu X (2019) Deep learning for encrypted traffic classification: An overview. IEEE Commun Mag 57(5):76\u201381. IEEE","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"1893_CR24","doi-asserted-by":"crossref","unstructured":"Liu C, He L, Xiong G et al (2019) Fs-net: A flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference On Computer Communications, pp 1171\u20131179. IEEE","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"1893_CR25","doi-asserted-by":"crossref","unstructured":"He Y, Li W (2020) Image-based encrypted traffic classification with convolution neural networks. In: 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), pp 271\u2013278. IEEE","DOI":"10.1109\/DSC50466.2020.00048"},{"key":"1893_CR26","doi-asserted-by":"crossref","unstructured":"Shen M, Zhang J, Zhu L, Xu K, Du X, Liu Y (2019) Encrypted traffic classification of decentralized applications on ethereum using feature fusion. In: Proceedings of the International Symposium on Quality of Service, pp 1\u201310","DOI":"10.1145\/3326285.3329053"},{"key":"1893_CR27","doi-asserted-by":"crossref","unstructured":"Wang B, Yao Y, Shan S, Li H, Viswanath B, Zheng H, Zhao BY (2019) Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp 707\u2013723. IEEE","DOI":"10.1109\/SP.2019.00031"},{"key":"1893_CR28","doi-asserted-by":"crossref","unstructured":"Li Y, Li Y, Wu B et al (2021) Invisible backdoor attack with sample-specific triggers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp 16463\u201316472. IEEE","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"1893_CR29","doi-asserted-by":"crossref","unstructured":"Liu Y, Ma X, Bailey J et al (2020) Reflection backdoor: A natural backdoor attack on deep neural networks. In: European Conference on Computer Vision, pp 182\u2013199. Springer","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"1893_CR30","doi-asserted-by":"crossref","unstructured":"Doan K, Lao Y, Zhao W et al (2021) Lira: Learnable, imperceptible and robust backdoor attacks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp 11966\u201311976. IEEE","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"1893_CR31","doi-asserted-by":"crossref","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp 407\u2013414","DOI":"10.5220\/0005740704070414"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01893-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01893-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01893-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:35:23Z","timestamp":1747460123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01893-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,17]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1893"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01893-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4581072\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,17]]},"assertion":[{"value":"14 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All participants provided informed consent, ensuring their voluntary participation and understanding of the research\u2019s purpose, procedures, potential risks, and benefits. Confidentiality and anonymity were strictly maintained throughout the study, with data securely stored and accessible only to the research team.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"All participants in this study provided explicit consent for their anonymized data to be used in publications arising from this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"72"}}