{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:56:23Z","timestamp":1772042183770,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/tma.2018.8506558","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:53:55Z","timestamp":1540511635000},"page":"1-8","source":"Crossref","is-referenced-by-count":99,"title":["Mobile Encrypted Traffic Classification Using Deep Learning"],"prefix":"10.23919","author":[{"given":"Giuseppe","family":"Aceto","sequence":"first","affiliation":[]},{"given":"Domenico","family":"Ciuonzo","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Montieri","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Pescape","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"131","article-title":"Multi-classification approaches for classifying mobile app traffic","volume":"103","author":"aceto","year":"2018","journal-title":"Elsevier Journal"},{"key":"ref11","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref12","article-title":"The Applications of Deep Learning on Traffic Identification","author":"wang","year":"2010","journal-title":"Black Hat USA"},{"key":"ref13","article-title":"Mal-ware traffic classification using CNN for representation learning","author":"wang","year":"0","journal-title":"IEEE ICOIN'17"},{"key":"ref14","article-title":"End-to-end encrypted traffic classification with one-dimensional CNNs","author":"wang","year":"0","journal-title":"IEEE ISI' 17"},{"key":"ref15","article-title":"Deep packet: A novel approach for encrypted traffic classification using DL","author":"lotfollahi","year":"2017","journal-title":"ArXiv"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref17","article-title":"Who do you sync you are? smartphone fingerprinting via application behaviour","author":"st\u00f6ber","year":"0","journal-title":"ACM WiSec'13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346855"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466645"},{"key":"ref3","article-title":"Studying TLS usage in Android apps","author":"razaghpanah","year":"0","journal-title":"ACM CoNEXT' 17"},{"key":"ref6","article-title":"Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic","author":"saltaformaggio","year":"0","journal-title":"Proc USENIX WOOT'16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790097"},{"key":"ref8","first-page":"130","article-title":"Network traffic application identification based on message size analysis","volume":"58","author":"hajjar","year":"2015","journal-title":"Elsevier Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref2","article-title":"Ericsson mobility report","volume":"5964","author":"heuveldop","year":"2017","journal-title":"Ericsson AB Technol Emerg Business Stockholm Sweden Tech Rep EAB-17"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref9","article-title":"High performance traffic classification based on message size sequence and distribution","volume":"76","author":"lu","year":"2016","journal-title":"Elsevier Inc"},{"key":"ref20","article-title":"Can Android applications be identified using only TCP\/IP headers of their launch time traffic?","author":"alan","year":"0","journal-title":"ACM WiSec'16"},{"key":"ref22","article-title":"Automated feature extraction for website fingerprinting through Deep Learning","author":"rimmer","year":"2017","journal-title":"ArXiv"},{"key":"ref21","article-title":"Characterization of encrypted and VPN traffic using time-related features","author":"gil","year":"0","journal-title":"SciTePress ICISSP'16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6786614"},{"key":"ref23","article-title":"Traffic analysis with deep learning","author":"oh","year":"2017","journal-title":"ArXiv"}],"event":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","location":"Vienna","start":{"date-parts":[[2018,6,26]]},"end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488332\/8506485\/08506558.pdf?arnumber=8506558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:25:54Z","timestamp":1643232354000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506558\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/tma.2018.8506558","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}