no code implementations • 26 Aug 2019 • Yi Zeng, Zihao Qi, Wen-Cheng Chen, Yanzhe Huang, Xingxin Zheng, Han Qiu
With more encrypted network traffic gets involved in the Internet, how to effectively identify network traffic has become a top priority in the field.