4.5 Article

Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces

Mohammad Saidur Rahman et al.

Summary: The paper introduces a novel defense technique called Mockingbird, which utilizes adversarial examples to resist Website Fingerprinting attacks, effectively reducing attack accuracy and bandwidth overhead.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Artificial Intelligence

Deep packet: a novel approach for encrypted traffic classification using deep learning

Mohammad Lotfollahi et al.

SOFT COMPUTING (2020)

Article Computer Science, Information Systems

Large-Scale Mobile App Identification Using Deep Learning

Shahbaz Rezaei et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges

Giuseppe Aceto et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Article Computer Science, Information Systems

Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey

Fannia Pacheco et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Theory & Methods

Robust Smartphone App Identification via Encrypted Network Traffic Analysis

Vincent F. Taylor et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

QoS-Classifier for VPN and Non-VPN traffic based on time-related features

Julian Andres Caicedo-Munoz et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

Datanet: Deep learning Based Encrypted Network Traffic Classification in SDN Home Gateway

Pan Wang et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Theory & Methods

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

Payap Sirinam et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Article Computer Science, Information Systems

Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things

Manuel Lopez-Martin et al.

IEEE ACCESS (2017)

Proceedings Paper Computer Science, Information Systems

Towards Evaluating the Robustness of Neural Networks

Nicholas Carlini et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Article Computer Science, Theory & Methods

A Survey of Predictive Modeling on Im balanced Domains

Paula Branco et al.

ACM COMPUTING SURVEYS (2016)

Article Engineering, Electrical & Electronic

Deep Neural Networks for Acoustic Modeling in Speech Recognition

Geoffrey Hinton et al.

IEEE SIGNAL PROCESSING MAGAZINE (2012)

Article Computer Science, Hardware & Architecture

Quantifying the accuracy of the ground truth associated with Internet traffic traces

Maurizio Dusi et al.

COMPUTER NETWORKS (2011)