Research Article

Network Traffic Obfuscation against Traffic Classification

Figure 8

Comparison of four white-box attack algorithms.