[1] MICHAEL S.Malicious DNS traffic in Tor:analysis and countermeasures[C]//Proceedings of IEEE ICISSP'19.Washington D.C.,USA:IEEE Press,2019:536-543. [2] CHAKRAVARTY S,BARBERA M V,PORTOKALIDIS G,et al.On the effectiveness of traffic analysis against anonymity networks using flow records[C]//Proceedings of Passive and Active Measurement Conference.Los Angeles,USA:[s.n.],2014:1-10. [3] HE G,YANG M,LUO J,et al.Inferring application type information from tor encrypted traffic[C]//Proceedings of the 2nd IEEE International Conference on Advanced Cloud and Big Data.Washington D.C.,USA:IEEE Press,2015:145-456. [4] ARASH H L,GERARD D G,MOHAMMAD S,et al.Characterization of Tor traffic using time based features[C]//Proceedings of IEEE ICISSP'19.Washington D.C.,USA:IEEE Press,2017:253-262. [5] 潘逸涵,张爱新.基于深度学习的Tor流量识别方法[J].通信技术,2019,52(12):2982-2986. PAN Y H,ZHANG A X.Tor traffic identification method based on deep learning[J].Communications Technology,2019,52(12):2982-2986.(in Chinese) [6] KARAMLOU T,VELEZ D A,NIGRO J J.Encrypted prediction:a hacker's perspective[J].The Journal of Thoracic and Cardiovascular Surgery,2017,154(6):2038-2040. [7] 李若鹏.基于大数据的网络异常行为检测平台的设计与实现[D].广州:华南理工大学,2018. LI R P.Design and Implementation of network abnormal behavior detection platform based on big data[D].Guangzhou:South China University of Technology,2018.(in Chinese) [8] YIN Z J,ZHANG H,LIU Q.Analysis and research of BPF filter based on Libpcap[J].Advanced Materials Research,2013(655):1774-1778. [9] LIU W X,JUN C,YU W,et al.Fine-grained flow classification using deep learning for software defined data center networks[J].Journal of Network and Computer Applications,2020,168(3):1-10. [10] SAON C V,CHARLIE G,ADRIANO T F,et al.Intermittent slug flow identification and characterization from pressure signature[J].Mechanical Systems and Signal Processing,2021,148:107-148. [11] BOMMISETTY R M,PRAKASH O,KHARE A.Keyframe extraction using Pearson correlation coefficient and color moments[J].Multimedia Systems,2020,26(3):267-299. [12] TOSTES A I J, SILVA T H.STRIP:a short-term traffic Jam prediction based on logistic regression[C]//Proceedings of the 84th IEEE Vehicular Technology Conference.Washington D.C.,USA:IEEE Press,2016:1-5. [13] NAKIK D,LOŠKOVSKA S,TRAJKOVIK V.Fully connected emergency intervention for the critical home care system[J].Studies in Health Technology and Informatics,2011,165:88-93. [14] ZHANG C L,WU J X.Improving CNN linear layers with power mean non-linearity[J].Pattern Recognition,2019,89:12-21. [15] OOYANG W B,XU B,HOU J,et al.Fabric defect detection using activation layer embedded convolutional neural network[J].IEEE Access,2019,7:70130-70140. [16] MICHAEL H,MARC D,ATSUNORI O.Feature based domain adaptation for neural network language models with Factorised hidden layers[J].IEICE Transactions on Information and Systems,2019,102(3):598-608. [17] LANG S,BRAVO-MAROUEZ F,BECKHAM C.WekaDeeplearning4j:a deep learning package for Weka based on deeplearning4j[J].Knowl-Based Systems,2019,178:48-50. [18] DEDETURK B K,AKAY B.Spam filtering using a logistic regression model trained by an artificial bee colony algorithm[J].Applied Soft Computing,2020,91:106-129. [19] CHAO T Y,JUNG C L,ENDAH K.NetFlow monitoring and cyberattack detection using deep learning with Ceph[J].IEEE Access,2020,8:7842-7850. [20] 王军,赵凯,程勇.基于遮挡感知卷积神经网络的面部表情识别方法[J/OL].计算机工程:1-11[2020-08-10].https://doi:10.19678/j.issn.1000-3428.0059166. WANG J,ZHAO K,CHENG Y.Facial expression recognition based on convolutional neural network with occlusion perception[J/OL].Computer Engineering:1-11[2020-08-10].https://doi:10.19678/j.issn.1000-3428.0059166. (in Chinese) |