{"id":"https://openalex.org/W4225143166","doi":"https://doi.org/10.1142/s0218126622400023","title":"Temporal Sequence of Data Fluctuation-Based Approach for Tor Program Classification","display_name":"Temporal Sequence of Data Fluctuation-Based Approach for Tor Program Classification","publication_year":2022,"publication_date":"2022-04-27","ids":{"openalex":"https://openalex.org/W4225143166","doi":"https://doi.org/10.1142/s0218126622400023"},"language":"en","primary_location":{"id":"doi:10.1142/s0218126622400023","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622400023","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100396872","display_name":"Hao Zhang","orcid":"https://orcid.org/0000-0002-2058-7123"},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Zhang","raw_affiliation_strings":["Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I92178344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079861767","display_name":"Weidong Zhang","orcid":"https://orcid.org/0000-0003-1324-3960"},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weidong Zhang","raw_affiliation_strings":["Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I92178344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029736946","display_name":"Wei Zhao","orcid":"https://orcid.org/0000-0002-1902-3144"},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhao","raw_affiliation_strings":["Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I92178344"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026640557","display_name":"Xuangou Wu","orcid":"https://orcid.org/0000-0002-7912-8757"},"institutions":[{"id":"https://openalex.org/I92178344","display_name":"Anhui University of Technology","ror":"https://ror.org/02qdtrq21","country_code":"CN","type":"education","lineage":["https://openalex.org/I92178344"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuangou Wu","raw_affiliation_strings":["Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China"],"affiliations":[{"raw_affiliation_string":"Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet, Maanshan, P. R. China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, P.\u00a0R.\u00a0China","institution_ids":["https://openalex.org/I92178344"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079861767"],"corresponding_institution_ids":["https://openalex.org/I92178344"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49951868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"31","issue":"16","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7091971635818481},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6926972270011902},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6543917059898376},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.6442992091178894},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6086547374725342},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5652150511741638},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47844696044921875},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3926522433757782},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10720327496528625},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.0826687216758728}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7091971635818481},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6926972270011902},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6543917059898376},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.6442992091178894},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6086547374725342},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5652150511741638},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47844696044921875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3926522433757782},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10720327496528625},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0826687216758728},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218126622400023","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622400023","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6372342641","display_name":null,"funder_award_id":"62172003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2591712613","https://openalex.org/W2743678626","https://openalex.org/W2919493784","https://openalex.org/W2963516518","https://openalex.org/W3092728260","https://openalex.org/W3114031232","https://openalex.org/W3133177552","https://openalex.org/W3145680685","https://openalex.org/W3147822227","https://openalex.org/W3189313199","https://openalex.org/W3201410046","https://openalex.org/W3214309058","https://openalex.org/W3215141990","https://openalex.org/W3217476834","https://openalex.org/W4205829078","https://openalex.org/W4205916405","https://openalex.org/W4300655905"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W4205163163"],"abstract_inverted_index":{"With":[0],"the":[1,7,13,22,38,75,86,93,99,104,114],"continuous":[2],"development":[3],"of":[4,9,25,62,78,89,116],"encryption":[5],"technology,":[6],"share":[8],"encrypted":[10],"traffic":[11,27,53],"in":[12,51,92],"network":[14,81,101],"is":[15,31,59],"increasing,":[16],"which":[17],"brings":[18],"great":[19],"challenges":[20],"to":[21,36,102],"traditional":[23],"methods":[24],"rule-based":[26],"identification.":[28],"Deep":[29],"learning":[30],"becoming":[32],"an":[33,48,71],"inspiring":[34],"methodology":[35],"solve":[37],"problem.":[39],"Previous":[40],"studies":[41],"have":[42],"confirmed":[43],"that":[44,57],"time":[45,63],"characteristics":[46,64],"play":[47],"important":[49],"role":[50],"Tor":[52],"classification.":[54],"We":[55],"find":[56],"there":[58],"a":[60],"similarity":[61],"among":[65],"different":[66],"programs.":[67],"This":[68],"paper":[69],"proposes":[70],"end-to-end":[72],"classification":[73],"framework:":[74],"temporal":[76,87,106],"sequence":[77,88],"data":[79,90,111],"fluctuation":[80,91],"(TSDFN).":[82],"It":[83],"first":[84],"extracts":[85],"original":[94],"flow":[95],"and":[96],"then":[97],"uses":[98],"GRU":[100],"learn":[103],"hidden":[105],"features.":[107],"Experiments":[108],"on":[109],"public":[110],"sets":[112],"validate":[113],"effectiveness":[115],"our":[117],"proposal":[118],"over":[119],"other":[120],"methods.":[121]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
