{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T23:30:20Z","timestamp":1772753420947,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/ickii.2018.8569113","type":"proceedings-article","created":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T01:29:45Z","timestamp":1544491785000},"page":"187-190","source":"Crossref","is-referenced-by-count":30,"title":["Tor Traffic Classification from Raw Packet Header using Convolutional Neural Network"],"prefix":"10.1109","author":[{"given":"Minsu","family":"Kim","sequence":"first","affiliation":[]},{"given":"Alagan","family":"Anpalagan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2017.133"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258487"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2696365"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref14","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from over-fitting","volume":"15","author":"srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"key":"ref15","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume":"9","author":"glorot","year":"2010","journal-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref16","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2017","journal-title":"arXiv preprint arXiv 1412 6564"},{"key":"ref17","article-title":"TensorFlow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"arXiv preprint arXiv 1408 1605"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WKDD.2010.83"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref6","first-page":"43","article-title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks","author":"dingledine","year":"2017","journal-title":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI) ISI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref8","first-page":"1","article-title":"Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)","author":"pescape","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2017.8230113"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref9","article-title":"Deep Fingerprinting - Undermining Website Fingerprinting Defenses with Deep Learning","author":"sirinam","year":"2018","journal-title":"arXiv preprint arXiv 1801 04144"}],"event":{"name":"2018 1st IEEE International Conference on Knowledge Innovation and Invention (ICKII)","location":"Jeju","start":{"date-parts":[[2018,7,23]]},"end":{"date-parts":[[2018,7,27]]}},"container-title":["2018 1st IEEE International Conference on Knowledge Innovation and Invention (ICKII)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8543366\/8569041\/08569113.pdf?arnumber=8569113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T04:57:18Z","timestamp":1643259438000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8569113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ickii.2018.8569113","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}