{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:55:43Z","timestamp":1776275743066,"version":"3.50.1"},"reference-count":101,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,20]]},"DOI":"10.1109\/icis61260.2024.10778376","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:06:09Z","timestamp":1734030369000},"page":"113-120","source":"Crossref","is-referenced-by-count":7,"title":["A Survey of Encrypted Traffic Classification: Datasets, Representation, Approaches and Future Thinking"],"prefix":"10.1109","author":[{"given":"Zhihong","family":"Wang","sequence":"first","affiliation":[{"name":"The Third Research Institute of Ministry of Public Security,Shanghai,China"}]},{"given":"Ying","family":"Yang","sequence":"additional","affiliation":[{"name":"The Third Research Institute of Ministry of Public Security,Shanghai,China"}]},{"given":"Yongjian","family":"Wang","sequence":"additional","affiliation":[{"name":"The Third Research Institute of Ministry of Public Security,Shanghai,China"}]}],"member":"263","reference":[{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.073"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.05610"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103519"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/app9163414"},{"key":"ref8","author":"Goldberg","year":"2014","journal-title":"word2vec Explained: deriving Mikolov et al\u2019s negative-sampling word-embedding method[J]"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.02.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.03.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31863-9_10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-32182-6_16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3227500"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3370851"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00071"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119229"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03709-w"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109614"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100613.00161"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683649"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref29","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting[C]","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang","year":"2014"},{"key":"ref30","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique[C]","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes","year":"2016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7849088"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987459"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356534"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2017.1321891"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382208"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SCM50615.2020.9198811"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590451"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692682"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624124"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866397"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761167"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9131-2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-0999-x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2021.0430.48"},{"issue":"4","key":"ref50","first-page":"655","article-title":"Encrypted traffic identification method based on support vector machine[J]","volume":"47","author":"Cheng","year":"2017","journal-title":"Journal of Southeast University"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/PAIS.2018.8598480"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2023.2197172"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"key":"ref54","first-page":"169","article-title":"Effective detection of multimedia protocol tunneling using machine learning[C]","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Barradas","year":"2018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICBASE51474.2020.00058"},{"key":"ref56","first-page":"233","article-title":"In-network qoe and kpi monitoring of mobile youtube traffic: Insights for encrypted ios flows[C]","volume-title":"2018 14th International Conference on Network and Service Management (CNSM)","author":"Or\u0161oli\u0107","year":"2018"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2019.8685901"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101604"},{"issue":"1","key":"ref59","first-page":"64","article-title":"An Improved DoH Traffic Classification Method for XGboost [J]","volume":"28","author":"Li","year":"2023","journal-title":"Journal of Harbin University of Science and Technology"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01399-7_15"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-013-9690-5"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.54"},{"issue":"11","key":"ref64","first-page":"86","article-title":"A network traffic classification method based on improved K-means algorithm[J]","volume":"43","author":"Liu","year":"2017","journal-title":"Electronic technology applications"},{"key":"ref65","article-title":"Research on encrypted traffic classification technology based on SOM-K fusion algorithm [D]","author":"Xiao","year":"2021","journal-title":"Nanjing University of Posts and Telecommunications"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1004.2013.01100"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148916"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2010\/1\/012014"},{"issue":"11","key":"ref69","first-page":"1","article-title":"The applications of deep learning on traffic identification[J]","volume":"24","author":"Wang","year":"2015","journal-title":"BlackHat USA"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155292"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2018.8598055"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2901348"},{"issue":"1","key":"ref75","first-page":"32","article-title":"Encrypted traffic identification method based on deep residual capsule network with attention mechanism[J]","volume":"9","author":"Shi","year":"2023","journal-title":"Chinese Journal of Network and Information Security"},{"issue":"18","key":"ref76","first-page":"114","article-title":"End-to-End Encrypted Traffic Classification Based on Feature Fusion Convolutional Neural Network[J]","volume":"57","author":"Xue","year":"2021","journal-title":"Computer Engineering and Applications"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8669045"},{"key":"ref78","article-title":"How to achieve high classification accuracy with just a few labels: A semisupervised approach using sampled packets[J]","author":"Rezaei","year":"2018","journal-title":"arXiv preprint"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2018.8587975"},{"key":"ref80","article-title":"Augmentation scheme for dealing with imbalanced network traffic classification using deep learning[J]","author":"Hasibi","year":"2019","journal-title":"arXiv preprint"},{"issue":"2","key":"ref81","first-page":"308","article-title":"Defection of malicious encrypted traffic based on LSTM recurrent neural network[J]","volume":"37","author":"Zou","year":"2020","journal-title":"Computer Applications and Software"},{"issue":"11","key":"ref82","first-page":"127","article-title":"Encrypted Traffic Classification Method Based on Multi-Layer Bidirectional SRU and Attention Model[J]","volume":"48","author":"Zhang","year":"2022","journal-title":"Computer Engineering"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3215507"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106531"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TMLCN.2023.3323915"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00087"},{"issue":"1","key":"ref87","article-title":"Research on Encrypted Traffic Classification of Graph Neural Network Based on Attention Mechanism [J]","volume":"9","author":"Yu","year":"2023","journal-title":"Journal of Information Security Research"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35486-1_27"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3630049.3630175"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1360\/SSI-2021-0280"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102663"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3262246"},{"issue":"11","key":"ref95","first-page":"178","article-title":"Encrypted Malicious Traffic Identification Based on CNN CBAM-Bi GRU Attention[J]","volume":"49","author":"Den","year":"2023","journal-title":"Computer Engineering"},{"key":"ref96","first-page":"1","article-title":"Encrypted traffic classification using CNN and BiGRU based on attention mechanism [J\/OL]","author":"Chen","year":"2024","journal-title":"Computer Science"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107258"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3390\/sym13061080"},{"issue":"23","key":"ref99","doi-asserted-by":"crossref","first-page":"246","DOI":"10.54254\/2755-2721\/6\/20230807","article-title":"VPN encrypted traffic identification by joint capsule and bidirectional LSTM network [J]","volume":"59","author":"Yang","year":"2023","journal-title":"Computer Engineering and Applications"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"issue":"8","key":"ref101","first-page":"2471","article-title":"Encrypted traffic classification method based on improved Inception-ResNet[J]","volume":"43","author":"Guo","year":"2023","journal-title":"Journal of Computer Applications"},{"key":"ref102","first-page":"1","article-title":"Attention-based multi-feature fusion encrypted traffic identification method [J\/OL]","author":"Sun","year":"2024","journal-title":"Journal of Shanxi"}],"event":{"name":"2024 IEEE\/ACIS 24th International Conference on Computer and Information Science (ICIS)","location":"Shanghai, China","start":{"date-parts":[[2024,9,20]]},"end":{"date-parts":[[2024,9,22]]}},"container-title":["2024 IEEE\/ACIS 24th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10778263\/10778307\/10778376.pdf?arnumber=10778376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:27:38Z","timestamp":1734071258000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10778376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":101,"URL":"https:\/\/doi.org\/10.1109\/icis61260.2024.10778376","relation":{},"subject":[],"published":{"date-parts":[[2024,9,20]]}}}