{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:02Z","timestamp":1776926342391,"version":"3.51.2"},"reference-count":39,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066367","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T02:45:41Z","timestamp":1751337941000},"page":"5279-5298","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["NetST: Network Encrypted Traffic Classification Based on Swin Transformer"],"prefix":"10.32604","volume":"84","author":[{"given":"Jianwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hongying","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zengyu","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"IEEE INFOCOM 2019\u2014IEEE Conference on Computer Communications; 2019 Apr 29\u2013May 2; Paris, France","first-page":"1171","article-title":"FS-Net: a flow sequence network for encrypted traffic classification","author":"Liu"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"5757","DOI":"10.1007\/s00521-023-09366-3","article-title":"The deep learning applications in IoT-based bio- and medical informatics: a systematic literature review","volume":"36","author":"Amiri","year":"2024","journal-title":"Neural Comput Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4598","DOI":"10.3390\/rs14184598","article-title":"TRQ3DNet: a 3D quasi-recurrent and transformer based network for hyperspectral image denoising","volume":"14","author":"Pang","year":"2022","journal-title":"Remote Sens"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3599730","article-title":"CUR transformer: a convolutional unbiased regional transformer for image denoising","volume":"19","author":"Xu","year":"2023","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"6753","DOI":"10.1007\/s10489-022-03785-w","article-title":"TC-net: transformer combined with CNN for image denoising","volume":"53","author":"Xue","year":"2023","journal-title":"Appl Intell"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"107013","DOI":"10.1016\/j.engappai.2023.107013","article-title":"CTRAN: CNN-transformer-based network for natural language understanding","volume":"126","author":"Rafiepour","year":"2023","journal-title":"Eng Appl Artif Intell"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1186\/s40537-023-00842-0","article-title":"Survey of transformers and towards ensemble learning using transformers for natural language processing","volume":"11","author":"Zhang","year":"2024","journal-title":"J Big Data"},{"key":"ref8","series-title":"Proceedings of the 2022 Australasian Computer Science Week; 2022 Feb 14\u201318; Brisbane, Australia","first-page":"74","article-title":"A CNN based encrypted network traffic classifier","author":"Okonkwo"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"58031","DOI":"10.1109\/ACCESS.2024.3391022","article-title":"Classifying malware traffic using images and deep convolutional neural network","volume":"12","author":"Davis","year":"2024","journal-title":"IEEE Access"},{"key":"ref10","first-page":"5420","article-title":"Yet another traffic classifier: a masked autoencoder based traffic transformer with multi-level flow representation","volume":"37","author":"Zhao","year":"2023","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","article-title":"A novel multimodal deep learning framework for encrypted traffic classification","volume":"31","author":"Lin","year":"2023","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref12","series-title":"Proceedings of the ACM Web Conference 2022; 2022 Apr 25\u201329; Lyon, France","first-page":"633","article-title":"ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification","author":"Lin"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"619","DOI":"10.32604\/iasc.2023.036701","article-title":"MTC: a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN","volume":"37","author":"Wang","year":"2023","journal-title":"Intell Autom Soft Comput"},{"key":"ref14","series-title":"IEEE\/CVF International Conference on Computer Vision (ICCV); 2021 Oct 10\u201317; Montreal, QC, Canada","first-page":"9992","article-title":"Swin Transformer: hierarchical vision transformer using shifted windows","author":"Liu"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.comcom.2022.02.003","article-title":"Fast and lean encrypted Internet traffic classification","volume":"186","author":"Roy","year":"2022","journal-title":"Comput Commun"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"103175","DOI":"10.1016\/j.cose.2023.103175","article-title":"EETC: an extended encrypted traffic classification algorithm based on variant ResNet network","volume":"128","author":"Ma","year":"2023","journal-title":"Comput Secur"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"108024","DOI":"10.1016\/j.compeleceng.2022.108024","article-title":"Network traffic classification using convolutional neural network and ant-lion optimization","volume":"101","author":"Izadi","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref18","series-title":"IEEE INFOCOM 2019\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 2019 Apr 29\u2013May 2; Paris, France","first-page":"680","article-title":"FlowPic: encrypted internet traffic classification is as easy as image recognition","author":"Shapira"},{"key":"ref19","unstructured":"Zhang H, Xiao X, Yu L, Li Q, Ling Z, Zhang Y, et al. One train for two tasks: an encrypted traffic classification framework using supervised contrastive learning. arXiv:2402.07501. 2024."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"100475","DOI":"10.1016\/j.eij.2024.100475","article-title":"CoTNeT: contextual transformer network for encrypted traffic classification","volume":"26","author":"Huang","year":"2024","journal-title":"Egypt Inform J"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"109406","DOI":"10.1016\/j.compeleceng.2024.109406","article-title":"A novel and effective encrypted traffic classification method based on channel attention and deformable convolution","volume":"118","author":"Zou","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref22","series-title":"Australasian Conference on Information Security and Privacy; 2023 Jul 5\u20137; Brisbane, QLD, Australia","first-page":"630","article-title":"Encrypted network traffic classification with higher order graph neural network","author":"Okonkwo"},{"key":"ref23","first-page":"40","article-title":"Research on mobile application classification technology for unidirectional encrypted traffic","volume":"13","author":"Zhang","year":"2024","journal-title":"J Integr Technol"},{"key":"ref24","first-page":"97","article-title":"Homogeneous traffic identification method for encrypted mobile applications based on graph attention mechanism","volume":"2","author":"Sun","year":"2024","journal-title":"J Cybersecur"},{"key":"ref25","series-title":"2011 International Conference on Computer Science and Service System (CSSS); 2011 Jun 27\u201329; Nanjing, China","first-page":"914","article-title":"Traffic classification based on port connection pattern","author":"Cheng","year":"2011"},{"key":"ref26","series-title":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT); 2017 Dec 18\u201320; Taipei, Taiwan","first-page":"288","article-title":"Identification of abnormal network traffic using support vector machine","author":"Kong"},{"key":"ref27","first-page":"76","article-title":"A network traffic classification method using support vector machine with feature weighted-degree","volume":"15","author":"He","year":"2017","journal-title":"J Digit Inf Manag"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"7489","DOI":"10.1007\/s11227-020-03372-1","article-title":"THS-IDPC: a three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection","volume":"76","author":"Chen","year":"2020","journal-title":"J Supercomput"},{"key":"ref29","series-title":"MILCOM 2015\u20142015 IEEE Military Communications Conference; 2015 Oct 26\u201328; Tampa, FL, USA","first-page":"330","article-title":"Malware traffic detection using tamper resistant features","author":"Berkay Celik"},{"key":"ref30","series-title":"2017 International Conference on Information Networking (ICOIN); 2017 Jan 11\u201313; Da Nang, Vietnam","first-page":"712","article-title":"Malware traffic classification using convolutional neural network for representation learning","author":"Wang"},{"key":"ref31","series-title":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI); 2017 Jul 22\u201324; Beijing, China","first-page":"43","article-title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks","author":"Wang"},{"key":"ref32","series-title":"2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS); 2020 Sep 28\u201330; Takamatsu, Japan","article-title":"Sessionvideo: a novel approach for encrypted traffic classification via 3D-CNN model","author":"Wang"},{"key":"ref33","series-title":"IEEE INFOCOM 2020\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 2020 Jul 6\u20139; Toronto, ON, Canada","first-page":"424","article-title":"App-net: a hybrid neural network for encrypted mobile traffic classification","author":"Wang"},{"key":"ref34","series-title":"18th International Forum on Digital TV and Wireless Multimedia Communications; 2021 Dec 3\u20134; Shanghai, China","first-page":"401","article-title":"Traffic classification based on CNN-LSTM hybrid network","author":"Kong"},{"key":"ref35","series-title":"International Conference on Emerging Networking Architecture and Technologies; 2022 Nov 15\u201317; Shenzhen, China","first-page":"545","article-title":"Network traffic classification based on LSTM + CNN and attention mechanism","author":"Liu"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-981-99-1145-5_24","author":"Wu","year":"2023","journal-title":"3D imaging\u2014multidimensional signal processing and deep learning"},{"key":"ref37","series-title":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy; 2024 Mar 1\u20133; Nanjing, China","article-title":"CTCRNN: a hybrid CNN-BiLSTM based classification method for industrial IoT encrypted traffic based on spatiotemporal features","author":"Zhao"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","article-title":"Deep packet: a novel approach for encrypted traffic classification using deep learning","volume":"24","author":"Lotfollahi","year":"2020","journal-title":"Soft Comput"},{"key":"ref39","series-title":"2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC); 2020 Jul 27\u201330; Hong Kong, China","first-page":"271","article-title":"Image-based encrypted traffic classification with convolution neural networks","author":"He"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66367\/TSP_CMC_66367.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:29Z","timestamp":1776923129000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":39,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066367","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}