Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

HEDGE: efficient traffic classification of encrypted and compressed packets

F Casino, KKR Choo, C Patsakis - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …

BONIK: A blockchain empowered chatbot for financial transactions

MSI Bhuiyan, A Razzak, MS Ferdous… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
A Chatbot is a popular platform to enable users to interact with a software or website to
gather information or execute actions in an automated fashion. In recent years, chatbots are …

Robust steganography by modifying sign of DCT coefficients

Z Zhu, N Zheng, T Qiao, M Xu - IEEE Access, 2019 - ieeexplore.ieee.org
Modern adaptive image steganography with minimizing a distortion function has high
performance of undetectability. However, when an image with hidden information is attacked …

Identifying DApps and user behaviors on ethereum via encrypted traffic

Y Wang, Z Li, G Gou, G Xiong, C Wang, Z Li - International Conference on …, 2020 - Springer
With the surge in popularity of blockchain, more and more Decentralized Applications
(DApps) are deployed on blockchain platforms. DApps bring convenience to people, but …

Hierarchical identifier: Application to user privacy eavesdropping on mobile payment app

Y Wang, N Zheng, M Xu, T Qiao, Q Zhang, F Yan, J Xu - Sensors, 2019 - mdpi.com
Mobile payment apps have been widely-adopted, which brings great convenience to
people's lives. However, at the same time, user's privacy is possibly eavesdropped and …

Instagram user behavior identification based on multidimensional features

H Wu, Q Wu, G Cheng, S Guo - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
The development of smartphones and social networks has brought great convenience to our
lives. Due to the increasing requirements of user privacy, user data are protected by …

BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs

T Wu, X Xiao, Q Li, Q Liu, G Hu, X Luo… - 2023 20th Annual …, 2023 - ieeexplore.ieee.org
With the increasing popularity of encryption pro-tocols in application and the rapid
development of network applications, traffic classification has become a major challenge for …

ReckDroid: Detecting red packet fraud in Android apps

Y Cheng, X Qi, Y Li, Y Wang - Computers & Security, 2025 - Elsevier
Recently, red packets have appeared widely in various mobile apps. Related security issues
like fraud are gradually coming into the public eye. As a new means of fraud, red packet …

CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification

X Zhou, X Xiao, Q Li, B Zhang, G Hu, X Luo… - Proceedings of the 19th …, 2024 - dl.acm.org
Network traffic classification plays a crucial role in both network management and
monitoring. Recently, an increasing number of Decentralized Applications (DApps) are …