Research Article

Network Traffic Obfuscation against Traffic Classification

Figure 6

Gradient iterative attack algorithm. (a) Basic iterative method. (b) Momentum iteration method.
(a)
(b)