This is exactly what obfuscation protocols are built for, and pluggable transports in general.
I recommend trying different pluggable transports, either with a VPN or with Tor, and seeing which ones work.
This is exactly what obfuscation protocols are built for, and pluggable transports in general.