Fig. 2From: Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognitionThe method of constructing the flow graphBack to article page