CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification

C Dong, C Zhang, Z Lu, B Liu, B Jiang - Computer Networks, 2020 - Elsevier
… unbroken in protecting users’ privacy, existing studies have … : (i) the effectiveness of the
framework design for encrypted traffic … As a countermeasure, we suggest that in such a case the …

A differential-private framework for urban traffic flows estimation via taxi companies

Z Cai, X Zheng, J Yu - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
… novel framework for privacy-preserved traffic sharing among … In this case, we formulate
the traffic flow sharing as a max–… This section evaluates the effectiveness of our algorithms …

Encrypted DNS--> privacy? A traffic analysis perspective

S Siby, M Juarez, C Diaz, N Vallina-Rodriguez… - arXiv preprint arXiv …, 2019 - arxiv.org
traffic analysis proposed in the standard and show that they are not effective. We find that
in the case of encrypted DNS, contrary to web traffic… its effectiveness to that of Web traffic

A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
traffic analysis techniques that aim to harm user privacy. … First, we divide the works based
on their use case and … learning aided capsule network for efficient classification. Their …

HEDGE: efficient traffic classification of encrypted and compressed packets

F Casino, KKR Choo, C Patsakis - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
privacy risks and challenges associated with such a trend. A typical measure is to perform
network traffic monitoring to prioritise and balance trafficefficient way, and in the former case

Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach

W Li, H Guo, M Nejad, CC Shen - IEEE access, 2020 - ieeexplore.ieee.org
… However, these schemes were not efficient to be used in practice. … , which makes ZKRP a
special case of ZKSM. ZKRP allows the … In the beginning, a CV riding over the area covered by …

Trafficsliver: Fighting website fingerprinting attacks with traffic splitting

W De la Cadena, A Mitseva, J Hiller… - Proceedings of the …, 2020 - dl.acm.org
… In particular, we analyze the efficiency of these strategies against … In the case of encrypted
web traffic, our proxy performs a man… and propose a trade-off between privacy protection and …

Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G

J Wang, H Han, H Li, S He… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
efficiency but neglects privacy security of the IoT data, eg, data analysis for network traffic
, but previous efforts to recover the network traffic data tensor have focused on increasing …

Intelligent route planning on large road networks with efficiency and privacy

Q Liu, P Hou, G Wang, T Peng, S Zhang - Journal of Parallel and Distributed …, 2019 - Elsevier
traffic status. Extensive experiments on real data sets demonstrate the effectiveness of our
work. … Especially, for the case that the source s and the target t are in the same leaf node, it …

Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city

F Wang, G Li, Y Wang, W Rafique… - ACM Transactions on …, 2023 - dl.acm.org
… , a privacy-aware, accurate, and time-efficient traffic flow … first models the distributed traffic
sensor data with privacy into … traffic data recorded by sensors is often sensitive and covers