|
[1]
|
Aceto, G., Ciuonzo, D., Montieri, A. and Pescape, A. (2018) Mobile Encrypted Traffic Classification Using Deep Learning. 2018 Network Traffic Measurement and Analysis Conference (TMA), Vienna, 26-29 June 2018, 1-8. [Google Scholar] [CrossRef]
|
|
[2]
|
Wang, P., Ye, F., Chen, X. and Qian, Y. (2018) Datanet: Deep Learning Based Encrypted Network Traffic Classification in SDN Home Gateway. IEEE Access, 6, 55380-55391. [Google Scholar] [CrossRef]
|
|
[3]
|
Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H. and Saberian, M. (2017) Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning. Soft Computing, 24, 1999-2012. http://www.arxiv.org [Google Scholar] [CrossRef]
|
|
[4]
|
Wang, W., Zhu, M., Wang, J., Zeng, X. and Yang, Z. (2017) End-to-End Encrypted Traffic Classification with One-Dimensional Convolution Neural Networks. 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, 22-24 July 2017, 43-48. [Google Scholar] [CrossRef]
|
|
[5]
|
Wang, W., Zhu, M., Zeng, X., Ye, X. and Sheng, Y. (2017) Malware Traffic Classification Using Convolutional Neural Network for Representation Learning. 2017 International Conference on Information Networking (ICOIN), Da Nang, 11-13 January 2017, 712-717. [Google Scholar] [CrossRef]
|
|
[6]
|
Chen, Z., He, K., Li, J. and Geng, Y. (2017) Seq2Img: A Sequence-to-Image Based Approach Towards IP Traffic Classification Using Convolutional Neural Networks. 2017 IEEE International Conference on Big Data (Big Data), Boston, 11-14 December 2017, 1271-1276. [Google Scholar] [CrossRef]
|
|
[7]
|
Chen, X., Yu, J., Ye, F. and Wang, P. (2018) A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways. 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Athens, 12-15 August 2018, 41-45. [Google Scholar] [CrossRef]
|
|
[8]
|
Wang, Z. (2015) The Application of Deep Learning on Traffic Identification. http://www.blackhat.com
|
|
[9]
|
Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A. and Lloret, J. (2017) Network Traffic Classifier with Convolutional and Recurrent Neural Networks for Internet of Things. IEEE Access, 5, 18042-18050. [Google Scholar] [CrossRef]
|
|
[10]
|
Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., et al. (2018) HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection. IEEE Access, 6, 1792-1806. [Google Scholar] [CrossRef]
|
|
[11]
|
Wang, P., Wang, Z., Ye, F. and Chen, X. (2021) ByteSGAN: A Semi-Supervised Generative Adversarial Network for Encrypted Traffic Classification in SDN Edge Gateway. Computer Networks, 200, Article 108535. [Google Scholar] [CrossRef]
|
|
[12]
|
Srivastava, N., Hinton, G., Krizhevsky, A., et al. (2014) Dropout: A Simple Way to Prevent Neural Networks from Overfitting. The Journal of Machine Learning Research, 15, 1929-1958.
|
|
[13]
|
Iliyasu, A.S. and Deng, H. (2020) Semi-Supervised Encrypted Traffic Classification with Deep Convolutional Generative Adversarial Networks. IEEE Access, 8, 118-126. [Google Scholar] [CrossRef]
|
|
[14]
|
Aouedi, O., Piamrat, K. and Bagadthey, D. (2020) A Semi-Supervised Stacked Autoencoder Approach for Network Traffic Classification. 2020 IEEE 28th International Conference on Network Protocols (ICNP), Madrid, 13-16 October 2020, 1-6. [Google Scholar] [CrossRef]
|