{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:49:07Z","timestamp":1766594947567,"version":"3.48.0"},"reference-count":64,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T00:00:00Z","timestamp":1766534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Fundamental Research Funds for the Central Universitie","award":["ZY20250330"],"award-info":[{"award-number":["ZY20250330"]}]},{"name":"China Metallurgical Geology Bureau","award":["CMGBKY202407"],"award-info":[{"award-number":["CMGBKY202407"]}]},{"name":"Shaoguan Data Industry Research Institute"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>While ensuring the accuracy of encrypted malicious traffic detection, improving model training speed remains a challenge. In order to solve this challenge, we propose CNNRes-DIndRNN for detecting encrypted malicious traffic classification. This model uses 1D-CNN to capture local feature relationships between data and IndRNN to capture their global dependency relationships. This method uses Zeek (version 7.0.0) to filter TLS datasets and NetTiSA to build time-series features that help models identify malicious behaviors. Combine time-series and encrypted features, then encode them with XLNet to improve model learning ability and speed training. In the final step, the encoded data is fed into CNNRes-DIndRNN. The results on five datasets including CTU-13 and MCFP showed that CNNRes-DIndRNN achieved 99.81% accuracy in binary classification and 99.67% in multi-class classification. These results represent improvements of 0.50\u20137.78% (binary) and 0.93\u201312.26% (multi-class) over all baseline methods. In performance comparisons, CNNRes-DIndRNN achieved the fastest training and testing times. It achieves the best comprehensive performance while maintaining high recognition accuracy.<\/jats:p>","DOI":"10.3390\/fi18010008","type":"journal-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:41:19Z","timestamp":1766594479000},"page":"8","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CNNRes-DIndRNN: A New Method for Detecting TLS-Encrypted Malicious Traffic"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1869-2377","authenticated-orcid":false,"given":"Jinsha","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"given":"Xiaoying","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"given":"Chunhui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"given":"Qingjie","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"given":"Guoqing","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7327-7978","authenticated-orcid":false,"given":"Xinyu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9655-5048","authenticated-orcid":false,"given":"Fangfang","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6044-1617","authenticated-orcid":false,"given":"Ruize","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"given":"Panpan","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]},{"given":"Shuai","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Institute of Disaster Prevention, Langfang 065201, China"},{"name":"Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"ref_1","unstructured":"(2025, April 27). Cybersecurity Report 2025. Available online: https:\/\/www.checkpoint.com.cn\/support\/."},{"key":"ref_2","unstructured":"Zscaler ThreatLabz (2025, April 27). 2023 ThreatLabz State of Encrypted Attacks Report. Available online: https:\/\/www.zscaler.com\/resources\/2023-threatlabz-state-of-encrypted-attacks-report."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A. (2018, January 22\u201324). Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), Funchal, Portugal.","DOI":"10.5220\/0006639801080116"},{"key":"ref_4","unstructured":"Stratosphere Laboratory (2020, March 13). Stratosphere Laboratory Datasets. Available online: https:\/\/www.stratosphereips.org\/datasets-overview."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","article-title":"An empirical comparison of botnet detection methods","volume":"45","author":"Grill","year":"2014","journal-title":"Comput. Secur."},{"key":"ref_6","unstructured":"Shafiq, M., Zeadally, S., and Merabti, M. (2025, September 10). ISCX VPN-NonVPN Traffic Dataset [EB\/OL]. Canadian Institute for Cybersecurity. Available online: https:\/\/www.unb.ca\/cic\/datasets\/vpn.html."},{"key":"ref_7","unstructured":"Wang, W., Zhu, M., Zeng, X., and Yang, Z. (2017). USTC-TFC2016: A Large-Scale Dataset for Network Traffic Classification [Dataset], University of Science and Technology of China (USTC). Available online: https:\/\/github.com\/davidyslu\/USTC-TFC2016."},{"key":"ref_8","unstructured":"The Zeek Project (2025, September 10). Zeek: Open Source Network Security Monitoring, Available online: https:\/\/zeek.org\/."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"110147","DOI":"10.1016\/j.comnet.2023.110147","article-title":"Nettisa: Extended ip flow with time-series features for universal bandwidth-constrained high-speed network traffic classification","volume":"240","author":"Koumar","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_10","unstructured":"Yang, Z., Dai, Z., Yang, Y., Carbonell, J., Salakhutdinov, R., and Le, Q.V. (2019, January 8\u201314). XlNet: Generalized autoregressive pretraining for language understanding. Proceedings of the 33rd International Conference on Neural Information Processing Systems, Vancouver, BC, Canada."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., and Tofanelli, P. (2007, January 27\u201331). Revealing skype traffic: When randomness plays with you. Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan.","DOI":"10.1145\/1282380.1282386"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Korczy\u0144ski, M., and Andrzej, D. (May, January 27). Markov chain fingerprinting to classify encrypted traffic. Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6848005"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s13635-016-0030-7","article-title":"HTTPS traffic analysis and client identification using passive SSL\/TLS fingerprinting","volume":"2016","year":"2016","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1830","DOI":"10.1109\/TIFS.2017.2692682","article-title":"Classification of encrypted traffic with second-order Markov chains and application attribute bigrams","volume":"12","author":"Shen","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s11416-017-0306-6","article-title":"Deciphering malware\u2019s use of TLS (without decryption)","volume":"14","author":"Anderson","year":"2018","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.eswa.2019.01.064","article-title":"Feature analysis of encrypted malicious traffic","volume":"125","author":"Shekhawat","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"de Lucia, M.J., and Cotton, C. (2019, January 12\u201314). Detection of encrypted malicious network traffic using machine learning. Proceedings of the MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), Norfolk, VA, USA.","DOI":"10.1109\/MILCOM47813.2019.9020856"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Dai, R., Gao, C., Lang, B., Yang, L., Liu, H., and Chen, S. (2019, January 15\u201317). SSL malicious traffic detection based on multi-view features. Proceedings of the 2019 9th International Conference on Communication and Network Security, Chongqing, China.","DOI":"10.1145\/3371676.3371697"},{"key":"ref_19","first-page":"163","article-title":"Malicious traffic detection combining features of packet payload and stream fingerprint","volume":"46","author":"Hu","year":"2020","journal-title":"Comput. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ferriyan, A., Thamrin, A.H., Takeda, K., and Murai, J. (2022). Encrypted malicious traffic detection based on Word2Vec. Electronics, 11.","DOI":"10.3390\/electronics11050679"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Brzuska, C., Delignat-Lavaud, A., Egger, C., Fournet, C., Kohbrok, K., and Kohlweiss, M. (2022, January 5\u20139). Key-Schedule Security for the TLS 1.3 Standard. Proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan.","DOI":"10.1007\/978-3-031-22963-3_21"},{"key":"ref_22","unstructured":"Xue, D., Kallitsis, M., Houmansadr, A., and Ensafi, R. (2024, January 14\u201316). Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes. Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA. Available online: https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/xue-fingerprinting."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., and Ghorbani, A.A. (2016, January 19\u201321). Characterization of encrypted and VPN traffic using time-related features. Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), Rome, Italy.","DOI":"10.5220\/0005740704070414"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Vu, L., Thuy, H.V., Nguyen, Q.U., Ngoc, T.N., Nguyen, D.N., Hoang, D.T., and Dutkiewicz, E. (2018, January 26\u201329). Time series analysis for encrypted traffic classification: A deep learning approach. Proceedings of the 2018 18th International Symposium on Communications and Information Technologies (ISCIT), Bangkok, Thailand.","DOI":"10.1109\/ISCIT.2018.8587975"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Shapira, T., and Shavitt, Y. (May, January 29). Flowpic: Encrypted internet traffic classification is as easy as image recognition. Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France.","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"102809","DOI":"10.1016\/j.cose.2022.102809","article-title":"Uncovering APT malware traffic using deep learning combined with time sequence and association analysis","volume":"120","author":"Niu","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_27","first-page":"297","article-title":"Encrypted traffic classification based on network flow time-space series","volume":"41","author":"Tang","year":"2024","journal-title":"Comput. Appl. Softw."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Koumar, J., Hynek, K., and \u010cejka, T. (November, January 30). Network traffic classification based on single flow time series analysis. Proceedings of the 2023 19th International Conference on Network and Service Management (CNSM), Niagara Falls, ON, Canada.","DOI":"10.23919\/CNSM59352.2023.10327876"},{"key":"ref_29","unstructured":"Mikolov, T., Chen, K., Corrado, G., and Dean, J. (2013). Efficient estimation of word representations in vector space. arXiv."},{"key":"ref_30","first-page":"2227","article-title":"Deep Contextualized Word Representations","volume":"Volume 1 (Long Papers)","author":"Peters","year":"2018","journal-title":"Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies"},{"key":"ref_31","unstructured":"Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K. (2019, January 2\u20137). Bert: Pre-training of deep bidirectional transformers for language understanding. Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Minneapolis, MN, USA."},{"key":"ref_32","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., and Polosukhin, I. (2017, January 4\u20139). Attention is all you need. Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, CA, USA."},{"key":"ref_33","first-page":"31","article-title":"CNN-based encrypted C&C communication traffic identification method","volume":"45","author":"Cheng","year":"2019","journal-title":"Comput. Eng."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"141787","DOI":"10.1109\/ACCESS.2020.3013849","article-title":"The weighted word2vec paragraph vectors for anomaly detection over HTTP traffic","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"114936","DOI":"10.1109\/ACCESS.2023.3325727","article-title":"PAC-GPT: A novel approach to generating synthetic network traffic with GPT-3","volume":"11","author":"Kholgh","year":"2023","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"137618","DOI":"10.1109\/ACCESS.2024.3465045","article-title":"Empowering network security: Bert transformer learning approach and mlp for intrusion detection in imbalanced network traffic","volume":"12","author":"Ali","year":"2024","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"128444","DOI":"10.1016\/j.neucom.2024.128444","article-title":"Deep learning and pre-training technology for encrypted traffic classification: A comprehensive review","volume":"617","author":"Dong","year":"2024","journal-title":"Neurocomputing"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., and Yang, Z. (2017, January 22\u201324). End-to-end encrypted traffic classification with one-dimensional convolution neural networks. Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China.","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref_39","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., and Sheng, Y. (2017, January 11\u201313). Malware traffic classification using convolutional neural network for representation learning. Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Nang, Vietnam."},{"key":"ref_40","first-page":"18","article-title":"BotCatcher: Botnet detection system based on deep learning","volume":"39","author":"Wu","year":"2018","journal-title":"J. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","article-title":"Deep packet: A novel approach for encrypted traffic classification using deep learning","volume":"24","author":"Lotfollahi","year":"2020","journal-title":"Soft Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"102985","DOI":"10.1016\/j.jnca.2021.102985","article-title":"DISTILLER: Encrypted traffic classification via multimodal multitask deep learning","volume":"183","author":"Aceto","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_43","first-page":"148","article-title":"Fast Identification Method of Malicious TLS Traffic Based on CNN-SIndRNN","volume":"48","author":"Li","year":"2022","journal-title":"Comput. Eng."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Bader, O., Lichy, A., Hajaj, C., Dubin, R., and Dvir, A. (2022, January 8\u201311). MalDIST: From encrypted traffic classification to malware traffic detection and classification. Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700625"},{"key":"ref_45","first-page":"139","article-title":"Multi-view encryption malicious traffic detection method combined with co-training","volume":"50","author":"Huo","year":"2023","journal-title":"J. Xidian Univ."},{"key":"ref_46","first-page":"209","article-title":"Malicious TLS Traffic Detection Based on Graph Representation","volume":"10","author":"Zhao","year":"2024","journal-title":"J. Inf. Secur. Res."},{"key":"ref_47","first-page":"36","article-title":"Encrypted traffic classification method based on Low-Dimensional Second-order Markov matrix","volume":"61","author":"Guo","year":"2024","journal-title":"J. Sichuan Univ. (Nat. Sci.)"},{"key":"ref_48","unstructured":"Canadian Institute for Cybersecurity (2025, September 10). CIC-IDS2018 Dataset [EB\/OL]. Available online: https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html."},{"key":"ref_49","unstructured":"UCI KDD Archive (2025, September 10). KDD Cup 1999 Data [Dataset]. Available online: https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"ref_50","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., and Stoyanov, V. (2019). Roberta: A robustly optimized bert pretraining approach. arXiv."},{"key":"ref_51","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., and Soricut, R. (2019). Albert: A lite bert for self-supervised learning of language representations. arXiv."},{"key":"ref_52","unstructured":"Majumdar, S. (2025, September 10). Keras-IndRNN: Implementation of IndRNN in Keras. Available online: https:\/\/github.com\/titu1994\/Keras-IndRNN."},{"key":"ref_53","unstructured":"Lundberg, S.M., and Lee, S.-I. (2017, January 4\u20139). A unified approach to interpreting model predictions. Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, CA, USA."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Chen, T., and Carlos, G. (2016, January 13\u201317). XGBoost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA.","DOI":"10.1145\/2939672.2939785"},{"key":"ref_55","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref_56","unstructured":"XGBoost Developers (2025, September 10). XGBoost Documentation. Available online: https:\/\/xgboost.readthedocs.io\/."},{"key":"ref_57","unstructured":"Hugging Face (2025, September 10). Hugging Face Library. Available online: https:\/\/huggingface.co\/."},{"key":"ref_58","unstructured":"Hugging Face (2025, September 10). XLNet Model Documentation. Available online: https:\/\/huggingface.co\/transformers\/model_doc\/xlnet.html."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Cho, K., Van Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., and Bengio, Y. (2014). Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv.","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1207\/s15516709cog1402_1","article-title":"Finding structure in time","volume":"14","author":"Elman","year":"1990","journal-title":"Cogn. Sci."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"2673","DOI":"10.1109\/78.650093","article-title":"Bidirectional recurrent neural networks","volume":"45","author":"Schuster","year":"1997","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Graves, A.H., and Schmidhuber, J. (August, January 31). Framewise phoneme classification with bidirectional LSTM networks. Proceedings of the 2005 IEEE International Joint Conference on Neural Networks, Montreal, QC, Canada.","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Li, S., Li, W., Cook, C., Zhu, C., and Gao, Y. (2018, January 18\u201323). Independently recurrent neural network (IndRNN): Building a longer and deeper RNN. Proceedings of the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00572"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/8\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:16Z","timestamp":1766594836000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,24]]},"references-count":64,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["fi18010008"],"URL":"https:\/\/doi.org\/10.3390\/fi18010008","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,24]]}}}