Author of the publication

Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges.

, , , and . IEEE Trans. Network and Service Management, 16 (2): 445-458 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet Censorship in Italy: A First Look at 3G/4G Networks., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 737-742. (2016)TaRad: A Thing-Centric Sensing System for Detecting Activities of Daily Living., , , , and . IDCS, volume 11874 of Lecture Notes in Computer Science, page 357-368. Springer, (2019)Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark, , , and . 29th International Teletraffic Congress (ITC 29), Genoa, Italy, (2017)Characterizing and Modeling Traffic of Communication and Collaboration Apps Bloomed With COVID-19 Outbreak., , , , , and . RTSI, page 400-405. IEEE, (2021)Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark, , , and . 29th International Teletraffic Congress (ITC 29), Genoa, Italy, (2017)Available bandwidth measurement in software defined networks., , , , and . SAC, page 651-657. ACM, (2016)Internet censorship in Italy: An analysis of 3G/4G networks., , and . ICC, page 1-6. IEEE, (2017)An experimental evaluation of the impact of heterogeneous scenarios and virtualization on the available bandwidth estimation tools., , , and . M&N, page 1-6. IEEE, (2017)Analyzing internet censorship in Pakistan., , , , , and . RTSI, page 1-6. IEEE, (2016)UANM: a platform for experimenting with available bandwidth estimation tools., , , and . ISCC, page 174-179. IEEE Computer Society, (2010)