{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:11:26Z","timestamp":1763341886551,"version":"3.45.0"},"reference-count":36,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061767","type":"journal-article","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T03:00:56Z","timestamp":1739934056000},"page":"2267-2285","source":"Crossref","is-referenced-by-count":0,"title":["DMF: A Deep Multimodal Fusion-Based Network Traffic Classification Model"],"prefix":"10.32604","volume":"83","author":[{"given":"Xiangbin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qingjun","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Weina","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Qianwei","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Yongjuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunxiang","family":"Gu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3447382","article-title":"A look behind the curtain: traffic classification in an increasingly encrypted web","volume":"5","author":"Akbari","year":"2021","journal-title":"Proc ACM Meas Anal Comput Syst"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","article-title":"Deep learning for encrypted traffic classification: an overview","volume":"57","author":"Rezaei","year":"2019","journal-title":"IEEE Commun Mag"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3510","DOI":"10.1109\/TCC.2023.3293134","article-title":"DCDPI: dynamic and continuous deep packet inspection in secure outsourced middleboxes","volume":"11","author":"Deng","year":"2023","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.1109\/TIFS.2022.3179955","article-title":"Seeing traffic paths: encrypted traffic classification with path signature features","volume":"17","author":"Xu","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref5","series-title":"International Workshop on Intelligent Solutions in Embedded Systems","first-page":"1","article-title":"Traffic classification for portable applications with hardware support","author":"Zejdl","year":"2008"},{"key":"ref6","series-title":"INFOCOM 2009","first-page":"1","article-title":"Packet classification algorithms: from theory to practice","author":"Qi","year":"2009"},{"key":"ref7","series-title":"Network Operations & Management Symposium","first-page":"1","article-title":"Performance improvement of payload signature-based traffic classification system using application traffic temporal locality","author":"Park","year":"2013"},{"key":"ref8","series-title":"2018 IEEE Global Communications Conference (GLOBECOM)","first-page":"1","article-title":"Speeding-up DPI traffic classification with chaining","author":"Doroud","year":"2018"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","article-title":"Deep packet: a novel approach for encrypted traffic classification using deep learning","volume":"24","author":"Lotfollahi","year":"2020","journal-title":"Soft Comput"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"109648","DOI":"10.1016\/j.comnet.2023.109648","article-title":"Deep learning for encrypted traffic classification in the face of data drift: an empirical study","volume":"225","author":"Malekghaini","year":"2023","journal-title":"Comput Netw"},{"key":"ref11","first-page":"516","article-title":"BFCN: a novel classification method of encrypted traffic based on BERT and CNN","volume":"12","author":"Shi","year":"2023","journal-title":"Comput Netw"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TBDATA.2019.2940675","article-title":"Identification of encrypted traffic through attention mechanism based long short term memory","volume":"8","author":"Yao","year":"2022","journal-title":"IEEE Trans Big Data"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"141674","DOI":"10.1109\/ACCESS.2023.3343189","article-title":"CBS: a deep learning approach for encrypted traffic classification with mixed spatio-temporal and statistical features","volume":"11","author":"Seydali","year":"2023","journal-title":"IEEE Access"},{"key":"ref14","series-title":"IEEE INFOCOM 2020\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","first-page":"424","article-title":"App-Net: a hybrid neural network for encrypted mobile traffic classification","author":"Wang","year":"2020"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"106944.1","DOI":"10.1016\/j.comnet.2019.106944","article-title":"MIMETIC: mobile encrypted traffic classification using multimodal deep learning","volume":"165","author":"Aceto","year":"2019","journal-title":"Comput Netw"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"102985","DOI":"10.1016\/j.jnca.2021.102985","article-title":"DISTILLER: encrypted traffic classification via multimodal multitask deep learning","volume":"183\u2013184","author":"Aceto","year":"2021","journal-title":"J Netw Comput Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","article-title":"A novel multimodal deep learning framework for encrypted traffic classification","volume":"31","author":"Lin","year":"2023","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"12113","DOI":"10.1109\/TPAMI.2023.3275156","article-title":"Multimodal learning with transformers: a survey","volume":"45","author":"Xu","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/TNET.2022.3216603","article-title":"ProGraph: robust network traffic identification with graph propagation","volume":"31","author":"Li","year":"2023","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref20","series-title":"32nd USENIX Security Symposium (USENIX Security 23)","first-page":"607","article-title":"Subverting website fingerprinting defenses with robust traffic representation","author":"Shen","year":"2023"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09639-z","article-title":"Network traffic classification using deep learning networks and bayesian data fusion","volume":"30","author":"Izadi","year":"2022","journal-title":"J Netw Syst Manag"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"4124","DOI":"10.1109\/TNSM.2022.3193748","article-title":"Ensemble-based deep learning model for network traffic classification","volume":"19","author":"Aouedi","year":"2022","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/TNSM.2023.3287430","article-title":"Benchmarking class incremental learning in deep learning traffic classification","volume":"21","author":"Bovenzi","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/TNSM.2021.3112283","article-title":"A cost-sensitive deep learning-based approach for network traffic classification","volume":"19","author":"Telikani","year":"2022","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"106531","DOI":"10.1016\/j.engappai.2023.106531","article-title":"TCGNN: packet-grained network traffic classification via Graph Neural Networks","volume":"123","author":"Hu","year":"2023","journal-title":"Eng Appl Artif Intell"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"110372","DOI":"10.1016\/j.comnet.2024.110372","article-title":"DE-GNN: dual embedding with graph neural network for fine-grained encrypted traffic classification","volume":"245","author":"Han","year":"2024","journal-title":"Comput Netw"},{"key":"ref27","series-title":"IEEE International Conference on Intelligence and Security Informatics","first-page":"43","article-title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks","author":"Wang","year":"2017"},{"key":"ref28","series-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","first-page":"1","article-title":"Machine learning based encrypted traffic classification: identifying SSH and Skype","author":"Alshammari","year":"2009"},{"key":"ref29","series-title":"NOMS 2018\u20142018 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"How far can we push flow analysis to identify encrypted anonymity network traffic?","author":"Shahbar","year":"2018"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1587\/transinf.2018EDL8136","article-title":"Symmetric decomposition of convolution kernels","volume":"E102-D","author":"Ou","year":"2019","journal-title":"IEICE Trans Inf Syst"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.neucom.2022.04.033","article-title":"Elliptical convolution kernel: more real visual field","volume":"492","author":"Chen","year":"2022 Jul 1","journal-title":"Neurocomputing"},{"key":"ref32","first-page":"1","author":"Vaswani","year":"2017","journal-title":"31st Annual Conference on Neural Information Processing Systems (NIPS 2017)"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"103300","DOI":"10.1016\/j.cose.2023.103300","article-title":"BoAu: malicious traffic detection with noise labels based on boundary augmentation","volume":"131","author":"jun Yuan","year":"2023","journal-title":"Comput Secur"},{"key":"ref34","series-title":"2017 International Conference on Information Networking (ICOIN)","first-page":"712","article-title":"Malware traffic classification using convolutional neural network for representation learning","author":"Wang","year":"2017"},{"key":"ref35","series-title":"International Conference on Networking and Network Applications","first-page":"220","article-title":"Differential preserving in XGBoost model for encrypted traffic classification","author":"Wang","year":"2022"},{"key":"ref36","first-page":"1","article-title":"Adaptive clustering-based malicious traffic classification at the network edge","author":"Diallo","year":"2021","journal-title":"IEEE INFOCOM 2021\u2014IEEE Conference on Computer Communications"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61767\/TSP_CMC_61767.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:07:21Z","timestamp":1763341641000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":36,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061767","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}