{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:40:58Z","timestamp":1753882858295,"version":"3.41.2"},"reference-count":26,"publisher":"World Scientific Pub Co Pte Ltd","issue":"16","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172003"],"award-info":[{"award-number":["62172003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2022,11,15]]},"abstract":"<jats:p> With the continuous development of encryption technology, the share of encrypted traffic in the network is increasing, which brings great challenges to the traditional methods of rule-based traffic identification. Deep learning is becoming an inspiring methodology to solve the problem. Previous studies have confirmed that time characteristics play an important role in Tor traffic classification. We find that there is a similarity of time characteristics among different programs. This paper proposes an end-to-end classification framework: the temporal sequence of data fluctuation network (TSDFN). It first extracts the temporal sequence of data fluctuation in the original flow and then uses the GRU network to learn the hidden temporal features. Experiments on public data sets validate the effectiveness of our proposal over other methods. <\/jats:p>","DOI":"10.1142\/s0218126622400023","type":"journal-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T14:50:28Z","timestamp":1651243828000},"source":"Crossref","is-referenced-by-count":1,"title":["Temporal Sequence of Data Fluctuation-Based Approach for Tor Program Classification"],"prefix":"10.1142","volume":"31","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"},{"name":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1324-3960","authenticated-orcid":false,"given":"Weidong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"},{"name":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China"}]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"},{"name":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China"}]},{"given":"Xuangou","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"},{"name":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2022,4,27]]},"reference":[{"key":"S0218126622400023BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113321"},{"journal-title":"IEEE Internet Things J.","year":"2021","author":"Yu K.","key":"S0218126622400023BIB002"},{"journal-title":"IEEE Trans. Ind. Informatics","year":"2021","author":"Xu D.","key":"S0218126622400023BIB004"},{"key":"S0218126622400023BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544"},{"key":"S0218126622400023BIB006","first-page":"102936","volume":"61","author":"Huang J.","year":"2021","journal-title":"J. Inf. Security Appl."},{"journal-title":"IEEE Trans. Ind. Informatics","year":"2021","author":"Wang D.","key":"S0218126622400023BIB007"},{"key":"S0218126622400023BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.10.002"},{"key":"S0218126622400023BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3101842"},{"key":"S0218126622400023BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544"},{"key":"S0218126622400023BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000223"},{"key":"S0218126622400023BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3128954"},{"journal-title":"IEEE Consumer Electron. Mag.","year":"2021","author":"Tan L.","key":"S0218126622400023BIB013"},{"key":"S0218126622400023BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.101.2001126"},{"key":"S0218126622400023BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3126830"},{"key":"S0218126622400023BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3139541"},{"key":"S0218126622400023BIB017","series-title":"Network and System security","first-page":"162","volume-title":"Lecture Notes in Computer Science","volume":"9408","author":"Qiu M.","year":"2015"},{"key":"S0218126622400023BIB018","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"S0218126622400023BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071441"},{"key":"S0218126622400023BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"issue":"8","key":"S0218126622400023BIB021","first-page":"1195","volume":"7","author":"Liu H.","year":"2012","journal-title":"J. Netw."},{"issue":"1","key":"S0218126622400023BIB022","first-page":"1","volume":"14","author":"Anderson B.","year":"2016","journal-title":"J. Comput. Virol. Hacking Techn."},{"key":"S0218126622400023BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"S0218126622400023BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"S0218126622400023BIB025","first-page":"1","volume-title":"Proc. 12th Int. Conf. Availability, Reliability and Security","author":"Hodo E.","year":"2017"},{"issue":"11","key":"S0218126622400023BIB026","first-page":"1097","volume":"7","author":"Koluru V. R.","year":"2020","journal-title":"J. Emerg. Technol. Innov. Res."},{"key":"S0218126622400023BIB027","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA50499.2020.9316533"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126622400023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T11:56:23Z","timestamp":1665057383000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126622400023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":26,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2022,11,15]]}},"alternative-id":["10.1142\/S0218126622400023"],"URL":"https:\/\/doi.org\/10.1142\/s0218126622400023","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2022,4,27]]},"article-number":"2240002"}}