{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:46:03Z","timestamp":1770270363021,"version":"3.49.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"National Key Technologies Research and Development Program of China","award":["2018YFD0401404"],"award-info":[{"award-number":["2018YFD0401404"]}]},{"name":"Natural Science Foundation of the Jiangsu Higher Education Institutions of China","award":["17KJB520023"],"award-info":[{"award-number":["17KJB520023"]}]},{"name":"NUPTSF","award":["NY217143"],"award-info":[{"award-number":["NY217143"]}]},{"DOI":"10.13039\/100010743","name":"Nanjing Forestry University","doi-asserted-by":"publisher","award":["GXL016 and CX2016026"],"award-info":[{"award-number":["GXL016 and CX2016026"]}],"id":[{"id":"10.13039\/100010743","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702282, 61802192, 61502250 and 7180112"],"award-info":[{"award-number":["61702282, 61802192, 61502250 and 7180112"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1177\/1550147718817292","type":"journal-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T08:11:03Z","timestamp":1544170263000},"page":"155014771881729","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Mobile app identification for encrypted network flows by traffic correlation"],"prefix":"10.1177","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6584-7593","authenticated-orcid":false,"given":"Gaofeng","family":"He","sequence":"first","affiliation":[{"name":"College of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Bingfeng","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Nanjing Forestry University, Nanjing, China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China"}]},{"given":"Haiting","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"bibr2-1550147718817292","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.12"},{"key":"bibr5-1550147718817292","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"issue":"6","key":"bibr6-1550147718817292","doi-asserted-by":"crossref","first-page":"1899","DOI":"10.1109\/JIOT.2017.2707465","volume":"4","author":"Ling Z","year":"2017","journal-title":"IEEE Internet Things"},{"key":"bibr8-1550147718817292","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2014.02.009","volume":"43","author":"Shabtai A","year":"2014","journal-title":"Comput Secur"},{"issue":"4","key":"bibr9-1550147718817292","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3017427","volume":"49","author":"Tam K","year":"2017","journal-title":"ACM Comput Surv"},{"issue":"4","key":"bibr10-1550147718817292","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MIC.2016.77","volume":"20","author":"Tongaonkar A.","year":"2016","journal-title":"IEEE Internet Comput"},{"issue":"3","key":"bibr11-1550147718817292","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"Callado A","year":"2009","journal-title":"IEEE Commun Surv Tut"},{"key":"bibr12-1550147718817292","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0849-9"},{"issue":"3","key":"bibr13-1550147718817292","first-page":"540","volume":"24","author":"He GF","year":"2013","journal-title":"J Softw"},{"issue":"18","key":"bibr14-1550147718817292","doi-asserted-by":"crossref","first-page":"5640","DOI":"10.1002\/cpe.3593","volume":"27","author":"He G","year":"2015","journal-title":"Concurr Comp Pract E"},{"key":"bibr15-1550147718817292","first-page":"1481","volume-title":"Proceedings of the conference on computer communications","author":"Xu Q"},{"key":"bibr16-1550147718817292","first-page":"439","volume-title":"Proceedings of the 21st annual international conference on mobile computing and networking","author":"Yao H"},{"key":"bibr17-1550147718817292","first-page":"1","volume-title":"Proceedings of the 35th international conference on computer communications","author":"Ranjan G"},{"issue":"14","key":"bibr18-1550147718817292","doi-asserted-by":"crossref","first-page":"3927","DOI":"10.1002\/cpe.3703","volume":"28","author":"Sun J","year":"2016","journal-title":"Concurr Comp Pract E"},{"key":"bibr19-1550147718817292","first-page":"439","volume-title":"Proceedings of the European symposium on security and privacy","author":"Taylor VF"},{"key":"bibr20-1550147718817292","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","volume":"13","author":"Taylor VF","year":"2018","journal-title":"IEEE T Inf Foren Sec"},{"key":"bibr21-1550147718817292","first-page":"279","volume-title":"Proceedings of the 5th international conference on advanced cloud and big data","author":"He G"},{"key":"bibr23-1550147718817292","author":"Gargenta M.","year":"2011","journal-title":"Learning Android"},{"key":"bibr25-1550147718817292","first-page":"329","volume-title":"Proceedings of the ACM SIGCOMM conference on Internet measurement","author":"Xu Q"},{"key":"bibr26-1550147718817292","first-page":"809","volume-title":"Proceedings of the international conference on computer communications","author":"Dai S"},{"key":"bibr27-1550147718817292","first-page":"61","volume-title":"Proceedings of the 9th conference on security & privacy in wireless and mobile networks","author":"Alan HF"},{"key":"bibr28-1550147718817292","first-page":"63","volume-title":"Proceedings of the 14th international conference on passive and active network measurement","author":"Tongaonkar A"},{"key":"bibr29-1550147718817292","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486018"},{"key":"bibr30-1550147718817292","first-page":"263","volume-title":"Proceedings of the international conference on passive and active network measurement","author":"Schomp K"},{"key":"bibr31-1550147718817292","first-page":"727","volume-title":"Proceedings of the 17th international conference on machine learning","volume":"1","author":"Pelleg D"},{"key":"bibr32-1550147718817292","first-page":"226","volume-title":"Proceedings of the 2nd international conference on knowledge discovery and data mining","author":"Ester M"},{"key":"bibr33-1550147718817292","volume-title":"Data mining: concepts and techniques","author":"Han J","year":"2011"},{"key":"bibr34-1550147718817292","first-page":"25","volume-title":"Proceedings of the international workshop on big data and information security","author":"Zhang J"},{"issue":"4","key":"bibr35-1550147718817292","first-page":"24","volume":"7","author":"Mehta P","year":"2017","journal-title":"Database Syst J"},{"issue":"11","key":"bibr36-1550147718817292","doi-asserted-by":"crossref","first-page":"2932","DOI":"10.1109\/TPDS.2013.307","volume":"25","author":"Wang Y","year":"2014","journal-title":"IEEE T Parall Distr"},{"key":"bibr37-1550147718817292","first-page":"41","volume-title":"Proceedings of the 16th international conference on neural information processing systems","author":"Schultz M"},{"key":"bibr38-1550147718817292","volume-title":"Learning Android application programming: a hands-on guide to building Android applications","author":"Talbot J","year":"2013"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718817292","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718817292","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718817292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T08:11:33Z","timestamp":1544170293000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718817292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":32,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,12,7]]},"published-print":{"date-parts":[[2018,12]]}},"alternative-id":["10.1177\/1550147718817292"],"URL":"https:\/\/doi.org\/10.1177\/1550147718817292","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}