[1] Dharmapurikar S, Krishnamurthy P, Sproull T, et al. Deep packet inspection using parallel Bloom filters[C]//11th Symposium on High Performance Interconnects, 2003:44-51. [2] Wang W, Zhu M, Wang J L, et al. End-to-end encrypted traffic classification with onedimensional convolution neural networks[C]//2017 IEEE International Conference on Intelligence and Security Informatics (ISI), 2017:43-48. [3] Cui S S, Jiang B, Cai Z Z, et al. A session-packets-based encrypted traffic classification using capsule neural networks[C]//2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2019:429-436. [4] Rajasegaran J, Jayasundara V, Jayasekara S, et al. DeepCaps:going deeper with capsule networks[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019:10717-10725. [5] Chen Z T, He K, Li J, et al. Seq2Img:a sequence-to-image based approach towards IP traffic classification using convolutional neural networks[C]//2017 IEEE International Conference on Big Data (Big Data), 2017:1271-1276. [6] Rosipal R, Trejo L J. Kernel partial least squares regression in reproducing kernel Hilbert space[J]. Journal of Machine Learning Research, 2001, 2:97-123. [7] Wang X, Chen S H, Su J S. App-net:a hybrid neural network for encrypted mobile traffic classification[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2020:424-429. [8] He K M, Zhang X Y, Ren S Q, et al. Deep residual learning for image recognition[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016:770-778. [9] Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks[J]. Communications of the ACM, 2017, 60(6):84-90. [10] Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition[DB/OL]. 2014[2021-09-22]. https://arxiv.org/abs/1409.1556. [11] Szegedy C, Liu W, Jia Y Q, et al. Going deeper with convolutions[C]//2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015:1-9. [12] Draper-Gil G, Lashkari A H, Mamun M S I, et al. Characterization of encrypted and VPN traffic using time-related features[C]//International Conference on Information Systems Security and Privacy (ICISSP), 2016:407-414. |